This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
The CEC will get you up to speed quickly on a host of technologies you've been meaning to study via a series of 45-minute online lessons taught by our faculty of expert tutors.
Ground loops, digital noise, EM radiation are all issues that we must face in mixed-signal design and test. In this class we will look at some of the design principles of keeping digital, near field, and RF noise out of our analog circuits.
In this class, we will look at the RLC resonant circuit, both designed and parasitic. Then we will use these circuits with op amps and other active circuits to build some simple filters. We will touch on the differences between these analog active...
We will start with a review of the ideal versus the real-world operational amplifier (opamp or op amp) and how to specify and basic usage of the op amp. With the new trend to include op amps in many new microcontroller chips, we will look at the...
Once your hardware is deployed it's a target, either directly by "invasive" probing of the actual board or via network based attacks. Protecting your hardware from these threats requires additional levels of protection and more complex algorithms...
This class will pull together information from all the previous classes and illustrate the described techniques using a detailed example design. Several techniques outlined in the previous classes will be used to protect the example design from...
This class will review several of the current devices that include security capabilities that can be used to protect your design from hacking and theft. Some MCUs, FPGAs and CPUs now include key security features that can be used to protect your...
This class will cover the key techniques used by modern devices to protect design IP from the most common threats. Starting with simple approaches to tamper protection, and then moving on to protection from copying and cloning, this class will...
This class will review key concepts from the December 2013 class and lay the groundwork for describing the implementation details you need to be able to select, program and design with devices you can use to protect your valuable IP. Protection...
Science fiction comes true more than any other type of fiction and science fiction has been warning us as to what we can become if we don't take precautionary steps to guard our humanity. In this last class day, we will discuss VR, implants...
If a picture is worth 1,000 words, then video is worth 1,000 pictures if the video is clear and usable. Handhelds as well as desktop use 2-D displays, but is that changing? Today, we will examine projection systems, virtual image technology, and...