Microcontrollers
White Paper 1: The Need for Security
With the recent rise of the Internet of Things (IoT), 14 billion devices are now connected. However,...
Realtime Deembedding with the R&S®RTP
Deembedding, often a necessary and complex task, is made easier with an integrated hardware and software...
The Past, Present and Future of Cybersecurity for Embedded Systems
The only system that's safe from cyberthreats is one that's never powered on. While this is an overstatement...
Interfacing Microcontrollers to the Industrial World
Utilizing embedded microcontrollers for industrial applications requires special attention given the...
Optimise beamforming: From bits to RF beams
Radar, satellite communications and 5G NR use AAS with phased array antennas for beamforming. Hybrid...
The Energy Harvesting Tipping Point for Wireless Sensor Applications
Ever since the first watermills and windmills were used to generate electricity, energy harvesting has...
2:1 MIPI CSI-2 Bridge Soft IP
In some cases, mobile Application Processors (AP) may not have enough interfaces to support the number...
Gate Drive Measurement Considerations
One of the primary purposes of a gate driver is to enable power switches to turn on and off faster, improving...
Threat-based Analysis Method for IoT Devices
By all accounts, Internet of Things (IoT) devices are forecasted to become ubiquitous. These devices,...
Ultimate Guide to Functional Safety and Safety Certification
Functional safety actively prevents the failure of a system from causing harm to people and property....
The Need for Security
With the recent rise of the Internet of Things (IoT), 14 billion devices are now connected. However,...
Sign up for Electronic Pro Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
