What’s the Difference Between Secure Comms and Secure Systems? (.PDF Download)

Oct. 21, 2015

In today’s cyberspace, security issues arise in two contexts: during communication between two computing systems and within the computing system itself. In this article we’ll contrast the types of threats that characterize the two environments and the measures that can be taken to address them...

Register or Sign in below to download the full article in .PDF format, including high resolution graphics and schematics when applicable.

Sponsored

Same Sky Solutions—Select a Fan for Forced Air Cooling

This presentation will provide an overview on proper fan selection, including system profiling, determining a system’s cooling requirements, and an outline of fan types and features...

How sensor fusion is driving vehicle autonomy forward

As ADAS technology extends to critical, time-sensitive applications such as emergency braking, front-collision warning and avoidance, and blind-spot detection combining data...

The Basics of Ultrasonic Sensors

This video delves into the basics of ultrasonic sensors, including how they work, understanding beam angles, a comparison of strengths and limitations, and more.

High-end corner radar reference design

View the TI TIDEP-01027 reference design block diagram, schematic, bill of materials (BOM), description, features and design files and start designing.