Sort by:

185 Results
Understanding secure connectivity in IoT devices

Understanding secure connectivity in embedded systems and IoT devices

This is a series of five videos that explains how secure network connectivity and secure remote updates work from the perspective of the underlying security technologies:

Designing a High-Power Bidirectional AC/DC Power Supply Using SiC FETs

High-power bidirectional AC/DC power supplies are widely used as uninterruptible power supplies (UPS), energy storage systems (ESS) and onboard chargers (OBC) with with vehicle-to-grid (V2G) capability. Compared to the traditional approach ¡V using one unidirectional rectifier and one unidirectional inverter to achieve a bidirectional energy flow ¡V a bidirectional rectifier can provide advantages such as smaller size, higher power density and higher efficiency. This paper reviews topologies, design considerations and design challenges of high power bidirectional AC/DC power supplies.

Rapid prototyping conclusions

Conclusion of rapid prototyping with call to action examples, simple and complex demonstrations.

Rapid prototyping advanced topics

These videos cover advanced rapid prototyping topics .

Rapid prototyping training series

Rapid prototyping: Getting started with TI solutions

How many times have you said, “I would like to prototype an idea with TI silicon but I can not get software resources" or “I don’t know how to prototype/program.”

This training shows you how to get started prototyping on TI solutions with minimal or no programming, including the following tasks:

Rapid prototyping fundamentals training series

Rapid prototyping fundamental functions

These videos provide understanding of the fundamental functions used for rapid prototyping on TI solutions with minimal or no programming, including the following:

  • Implementing necessary prototyping functions such clocks/GPIO, Read A/D, I2C/SMBus, etc.
  • Seamless interface of various analog EVMs for customer “proof of concept”
  • Standalone UI – Button, (GP Input - GPIO), LCD Display (“Hello”), Music, Serial Interface (Putty, Echo)

Capacitive Touch Basics with MSP430 MCUs featuring CapTIvate Technology

This section of the video series provides an introduction to capacitive touch using MSP430 MCUs with CapTIvate technology as well as how to get started with CapTIvate Design Center and CapTIvate development tools.

Fundamental PCB Layout and Design Guidelines of MSP430 MCUs with CapTIvate Technology

This training covers the fundamental design techniques required to implement a successful capacitive sensing hardware design. This series will explore a number of design topics, including:  Basic layout guidelines overlays, back lighting; Dealing with moisture; Self capacitance sensors; Mutual capacitance sensors; and Proximity sensors.

Introduction to EMC Challenges and Design with CapTIvate MCUs

This video series provides a reference on designing capacitive touch capabilities to withstand EMC challenges commonly found in human machine interface applications.

Application Demos of Capacitive Touch Featuring MSP430 MCUs with CapTIvate Technology

Capacitive sensing enables buttons, sliders, wheels and proximity features to be added to a wide-range of applications including building and home access panels and security systems, appliances, personal electronics and more. Watch the videos in this series to get an idea of the capabilities CapTIvate technology can bring to your next application.

BOOSTXL-CAPKEYPAD Capacitive Touch BoosterPack Module Introduction and Demos

This series provides an overview of the BOOSTXL-CAPKEYPAD capacitive touch BoosterPack plug-in module. The BoosterPack features the MSP430FR2522 MCU and allows developers to evaluate capacitive touch capabilities for their next design. The videos provide an overview of the BoosterPack and the out-of-box demos using the CapTIvate Programmer board and the MSP430FR6989 and MSP430F5529 LaunchPad development kits.

MSP Crypto Bootloader Training Series

In-field firmware updates are becoming an increasingly popular feature supported on products that are deployed to the field; however, this feature is also very commonly exploited by attackers, and if vulnerable, can compromise the security of the system.

185 Results
arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki