Hint: separate multiple terms with commas

E.g., 10/23/2019

E.g., 10/23/2019

Hint: separate multiple terms with commas

E.g., 10/23/2019

E.g., 10/23/2019

Sort by:

846 Results
SimpleLink Academy for Wi-Fi

TI Drivers

The SimpleLink SDK includes TI Drivers, a robust set of intuitive, functional APIs that offer portable, feature-rich access to peripherals.  The TI Drivers API exposes the functionality of the hardware-specific drivers in the same way across all TI SimpleLink devices, giving developers portable, feature-rich access to a variety of peripherals. TI drivers are open source [Berkeley Software Distribution license (BSD)] and built on a hardware abstraction layer, offering full access to the device’s complete capability.

SimpleLink Academy for Wi-Fi

POSIX

The SimpleLink™ SDK features POSIX (Portable Operating System Interface), which is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. Through POSIX-compliant APIs, developers can maintain 100% application code portability between various OS/kernels.

SimpleLink Academy for Wi-Fi

TI-RTOS

The SimpleLink SDK comes integrated with TI-RTOS. Checkout the trainings below to learn about multi-threaded applications & the features available with TI-RTOS.

Introduction

This section covers wireless network trends, key technologies, and problem statements for smart grid IoT. 

6LoWPAN-based Wireless Network Protocols

This section covers system-level deep dive on key wireless network protocols of 6LoWPAN, RPL, and CoAP for smart grid IoT. 

System-Level Examples for Wireless Networks on Smart Grid IoT

This section covers system-level examples for wireless networks on smart grid IoT. We will provide software- and system-level details for two system examples: 6LoWPAN-Contiki and sub-1GHz sensor to cloud industrial IoT gateway reference design. 

Summary

This section summarizes the wireless network challenges and solutions for a smarter grid IoT training series. 

Introduction

This section covers what is meter tampering, why is this a problem for utility providers, and some common ways a meter is tampered.

Detecting case tamper attacks using inductive switches

The first line of defense against tampering by bypassing current, reversing connections, and disconnecting leads is the meter case. Due to this, it is common for utilities to require some form of intrusion detection system to detect when someone opens a case.  In this section, we will cover how to detect someone trying to open the case of a meter.

Detecting magnetic tampering using hall-effect sensors

For anti-tampering, it is common to try to detect the presence of a strong magnet. In this section, we will cover the use of hall sensors for low-power detection of strong magnetic fields in three dimensions.  Details on our magnetic tamper detection reference design, TIDA-00839, will be provided as well as some of the design considerations that were kept in mind when creating this reference design.  

Hardening a meter against magnetic tamper attacks

In this section, we will cover how to harden a meter against these magnetic tamper attacks by using shunts for current sensors. For poly-phase implementations, I will go over how to use isolated delta sigma modulators to add the necessary isolation to use shunt current sensors and create magnetically immune poly-phase energy measurement systems. The TIDA-00601 and TIDA-01094 reference designs, which show how to implement a poly-phase isolated shunt measurement system, will be discussed as well as the associated AMC1304 high-side power supplies used in these designs.

Summary

In this section, a summary of the entire “Securing Smart Meters from Attack with TI Analog” training module would be covered.  This summary would cover the “Detecting case tamper attacks using inductive switches “, “Detecting magnetic tampering using hall-effect sensors “,  and “Hardening a meter against magnetic tamper attacks “ sections of the training series. Links will be provided for the reference designs and design tools that were discussed during this training series.

Debugging Embedded Linux Systems

Debugging Embedded Linux Systems training series teaches the techniques of debugging kernel issues that may be encountered in embedded Linux systems. It explains the Linux kernel logging system and logging API, illustrates how to locate a particular device driver, and demonstrates how to read kernel oops logs.

How-to Videos

This section contains task-specific videos that demonstrate how to perform debugging techniques on embedded Linux systems.

Learn about multiplexers

TI Precision Labs - Multiplexers: On-resistance Flatness and On-capacitance

This TI Precision Labs training video provides an overview of the on-resistance and on-capacitance parameters of multiplexers. It explains how on-resistance can cause gain error and non-linearity, as well as how on-capacitance can affect settling behavior of multiplexers.

Learn about multiplexers

TI Precision Labs - Multiplexers: Leakage Current and Charge Injection

This TI Precision Labs training video provides an overview of leakage current and charge injection. It explains how leakage current can cause offset errors in high input impedance data acquisition systems and how charge injection introduces output voltage error when multiplexer switches are turned on or off.

Learn about multiplexers

TI Precision Labs - Multiplexers: Electrical Overstress

This TI Precision Labs training video provides an overview of multiplexer electrical overstress conditions. The goal of this series is to understand what causes electrical overstress damage as well as some methods for protecting against the damage using external components. The multiplexer highlighted in this video series is the MUX36S08.

TI-RSLK

TI-RSLK Module 1 Running code on the LaunchPad using CCS

The purpose of this module is to learn software development methodology and understand how to set up an Integrated Development Environment (IDE), to then import and export Code Composer Studio (CCS) projects, as well as critical debugging information to understand the memory usage and performance of the software on the processor.

846 Results
arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki