Microcontrollers
2:1 MIPI CSI-2 Bridge Soft IP
In some cases, mobile Application Processors (AP) may not have enough interfaces to support the number...
The Energy Harvesting Tipping Point for Wireless Sensor Applications
Ever since the first watermills and windmills were used to generate electricity, energy harvesting has...
Ultimate Guide to Functional Safety and Safety Certification
Functional safety actively prevents the failure of a system from causing harm to people and property....
Dual Protocol Transceivers Ease the Design of Industrial Interfaces
This white paper discusses the industry's most commonly used interface standards, RS-232 and RS-485,...
Optimise beamforming: From bits to RF beams
Radar, satellite communications and 5G NR use AAS with phased array antennas for beamforming. Hybrid...
XMOS Technology Whitepaper
Designers for electronic products are challenged by requests for customized and differentiated complex...
The Past, Present and Future of Cybersecurity for Embedded Systems
The only system that's safe from cyberthreats is one that's never powered on. While this is an overstatement...
Flash Corruption: Software Bug or Supply Voltage Fault?
Flash memory is commonly used to store firmware in embedded systems. Occasionally, the firmware stored...
Threat-based Analysis Method for IoT Devices
By all accounts, Internet of Things (IoT) devices are forecasted to become ubiquitous. These devices,...
Tips and Tricks on How to Verify Control Loop Stability
In a design of a modern switch-mode power supplies (SMPS), the designer has to ensure that the converter...
Top Motor Braking Trends In The Automotive Industry
Brakes are some of the most crucial safety components in automobiles. Used to slow a vehicle's momentum...
Sign up for Electronic Pro Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
