Processors

Benefits of Self-Encrypting Drives (SEDs)
SSDs require different methods of sanitization compared to traditional hard disk drives (HDDs) due to...

2:1 MIPI CSI-2 Bridge Soft IP
In some cases, mobile Application Processors (AP) may not have enough interfaces to support the number...

Computer-on-Module: selecting the right form factor and processor
When it comes to Computer-on-Module (COM) solutions for embedded computing applications, selecting the...

Factorized Power Architecture and VI Chips
As electronic systems continue to trend toward lower voltages with higher currents and as the speed of...

Ball vs. Sleeve: A Comparison In Bearing Performance
As consumers demand smaller, faster computer systems, OEM design engineers race to create systems with...

The PI33XX: Zero-Voltage Switching Applied to Buck Regulation
The Picor PI33XX Cool-Power® ZVS Buck Regulator Series delivers maximum power density and high effi...

Implementing Video Display Interfaces Using MachXO2 PLDs
Lattice Semiconductor has developed a display interface in the MachXO2 PLD family. Because this interface...

Flash Corruption: Software Bug or Supply Voltage Fault?
Flash memory is commonly used to store firmware in embedded systems. Occasionally, the firmware stored...

Enabling Multi-Host System Designs with PCI Express Technology
Although not part of the PCI Express spec, nontransparent bridging is completely consistent with it and...

Save plant maintenance costs through reduced sensor power consumption
This paper describes a method for reducing the power consumption of sensor systems by utilizing the standby...
Sign up for Electronic Pro Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.