What’s the Difference Between Secure Comms and Secure Systems? (.PDF Download)

Oct. 21, 2015

In today’s cyberspace, security issues arise in two contexts: during communication between two computing systems and within the computing system itself. In this article we’ll contrast the types of threats that characterize the two environments and the measures that can be taken to address them...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

Powering next-generation ADAS processors with TI Functional Safety-Compliant buck regulators

The TPS62883-Q1 buck converter delivers up to 30A, supports stackable architectures for over 100A, and meets ASIL D functional safety standards for ADAS. Its high accuracy, flexible...

RPL-3.0 Thermally-Enhanced Buck Converter

RECOM's RPL-3.0 series is a DC/DC converter in a compact 3mm x 3mm x 1.45mm ten-pad LGA package. It has an input range of 3VDC to 18VDC and the output voltage can be set with ...

Altech Disconnect Switches

This video shows you how Altech's Disconnect Switches works.

How to Select, Use, and Maintain Coaxial Connectors for RF Applications

Radio frequency (RF) circuits are proliferating in both wired and wireless communications, including Wi-Fi and various wireless technologies being used for the Internet of Things...