Contributing Authors

Contributing Authors

Power Supplies

Want to Design Smaller, Cooler Power Supplies?

Are your power supplies keeping pace as your function-rich electronic designs continue to get smaller? For tips and techniques on creating smaller, simpler, and cooler...

Why Recloser Controllers Are a Utility Company’s Best Friend

As electricity flows along power lines, a number of unforeseen occurrences—from fallen tree branches to lightning strikes—can interrupt the delivery. To protect overhead power...
Testing for Embedded Systems

New Approach for Testing for Embedded Systems

Testing of one embedded system widely differ from another and while testing is the most common process used to determine the quality and provide...
Design Security | Cyber Security

Design Security Doesn’t Have to Be Expensive

Earlier this year, the news came out that hackers stole email addresses, passwords, and IP addresses from 2.5 million PlayStation and Xbox gamers via...

Multi-access Edge Computing: The wait is over

Last year during reputed events like the NFV World Congress and the Open Stack Summit, a powerful insight that was gathered is that Multi-access...

Cost-Effective WAN Optimization; Challenges and Solutions

Businesses over the past years have come to rely significantly on information technology and networked applications for day-to-day operations as well as for creating...
Cyber attacks, Ransomware, ransomware WanaCrypt0r, ransomware WanaCrypt0r

75,000 computers, 99 countries, 28 languages, 1 massive attack

It’s been a hectic day in the world. 99 countries were hammered with a ransomware attack against industries of all kinds. Over 75,000 machines...
AutomatedFactory, MAxim

It’s a Wireless World, but Wired Interfaces Are Still Important

By David Andeen, ApplicationsDirector, Core Products Group, Maxim Integrated In the modern world, we communicate every day using broadband cellular and Wi-Fi. We live in...
MAXREFDES155-system-board-Design Securityt,, Design Security

Why You Shouldn’t Skimp on Design Security

Tesla is wise to regularly push security and other software updates out to its vehicles. But, unfortunately, not every smart, connected device has its...
Encryption

Bolstering Native Encryption With Centralised Key Management

With native encryption being factory installed on nearly all endpoints – like desktops, laptops and tablets – it has quickly become the default encryption...

Latest Stories

Indian Telecom Market expected to Cross Rs 6.6 trillion by 2020

The Minister of Communications Manoj Sinha said that the Indian telecom industry has seen a paradigm shift from a voice centric market to a...
cyber security mainstream

Cyber Security is now a Mainstream Business

Past three months have been crucial for cyber security. Wanna cry and then Petya attacks affected the business significantly. The important question is were...
edimax

Edimax Appoints Link Telecom As a Distributor in India

Edimax Technology, a leading provider of premier networking solutions, announces its strategic distribution partnership with Link Telecom Pvt Ltd.  Link Telecom has been appointed...
Nikhil addressing the event in Delhi

Digital Transformation paramount, requires Security Rethink, say industry experts

Radware, the Nasdaq listed global leader of application delivery and application security solutions for virtual, cloud and software defined data center held a multicity...
ATOS worldline

ATOS: Worldline to acquire Digital River World Payments

A key milestone in the execution of Worldline Merchant Services Strategy Major enhancement of Worldline's value proposition in online payments for Tier 1...
Order with Confidence