This is a series of five videos that explains how secure network connectivity and secure remote updates work from the perspective of the underlying security technologies:
High-power bidirectional AC/DC power supplies are widely used as uninterruptible power supplies (UPS), energy storage systems (ESS) and onboard chargers (OBC) with with vehicle-to-grid (V2G) capability. Compared to the traditional approach ¡V using one unidirectional rectifier and one unidirectional inverter to achieve a bidirectional energy flow ¡V a bidirectional rectifier can provide advantages such as smaller size, higher power density and higher efficiency. This paper reviews topologies, design considerations and design challenges of high power bidirectional AC/DC power supplies.
How many times have you said, “I would like to prototype an idea with TI silicon but I can not get software resources" or “I don’t know how to prototype/program.”
This training shows you how to get started prototyping on TI solutions with minimal or no programming, including the following tasks:
These videos provide understanding of the fundamental functions used for rapid prototyping on TI solutions with minimal or no programming, including the following:
- Implementing necessary prototyping functions such clocks/GPIO, Read A/D, I2C/SMBus, etc.
- Seamless interface of various analog EVMs for customer “proof of concept”
- Standalone UI – Button, (GP Input - GPIO), LCD Display (“Hello”), Music, Serial Interface (Putty, Echo)
This training covers the fundamental design techniques required to implement a successful capacitive sensing hardware design. This series will explore a number of design topics, including: Basic layout guidelines overlays, back lighting; Dealing with moisture; Self capacitance sensors; Mutual capacitance sensors; and Proximity sensors.
In-field firmware updates are becoming an increasingly popular feature supported on products that are deployed to the field; however, this feature is also very commonly exploited by attackers, and if vulnerable, can compromise the security of the system.