• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Jeff Shepard

How does a zero trust security architecture work?

December 18, 2024 By Jeff Shepard Leave a Comment

Zero trust architectures (ZTAs) are a reaction to the emergence of cloud computing, remote work, and bringing your own device (BYOD) into enterprise networks. Those trends result in networks not completely contained within an enterprise-owned boundary, significantly complicating network security needs. This article briefly reviews the purpose and structure of ZTAs, looks at some relevant […]

Filed Under: Applications, Embedded, FAQ, Featured, Security Tagged With: FAQ

What can be done to prepare for post quantum cryptography?

December 11, 2024 By Jeff Shepard Leave a Comment

Post-quantum cryptography (PQC), also called quantum-safe cryptography, uses mathematical algorithms to create security environments resistant to quantum computer attacks. PQC is a rapidly evolving technology, and preparing for its adoption requires keeping up with developments in several areas. As part of the formalization of PQC algorithms, NIST has finalized the algorithms and changed their names […]

Filed Under: FAQ, Featured Tagged With: FAQ

What’s new in the NIST CSF 2.0 framework?

December 4, 2024 By Jeff Shepard Leave a Comment

The NIST Cybersecurity Framework (CSF) 2.0 is the first major update since its creation in 2014. It was finalized in early 2024. This article reviews some of the important changes in CSF 2.0 compared with v1.1, briefly examines how v2.0 improves alignment with other cybersecurity standards and frameworks and compares CSF 2.0 with the ISO […]

Filed Under: Applications, FAQ, Featured, Security Tagged With: cybersecurity, FAQ

What are the elements of secure boot processes?

November 27, 2024 By Jeff Shepard Leave a Comment

The secure boot protects devices from unauthorized modification by verifying the authenticity of the boot code. Its importance is growing as society digitalizes and the number of devices on the Internet of Things (IoT) soars. A secure boot prevents an adversary from compromising device operation. This article reviews the basic elements of secure boot processes, […]

Filed Under: FAQ, Featured Tagged With: FAQ

How are AI and ML used for advanced threat detection?

November 20, 2024 By Jeff Shepard Leave a Comment

The increasing number of threat vectors and the growing size of the attack surface in today’s communication and computer networks demand more powerful and faster threat detection. Legacy tools are no longer adequate. To ensure cybersecurity, high-speed threat detection based on artificial intelligence (AI) and machine learning (ML) is increasingly being deployed. This article reviews […]

Filed Under: Artificial intelligence, FAQ, Featured, Machine learning Tagged With: FAQ

How is Zephyr used for edge AI and sensors?

May 29, 2024 By Jeff Shepard Leave a Comment

Zephyr is a scalable open-source real-time operating system (RTOS) hosted by the Internet of Things (IoT) and embedded technology section of the Linux Foundation. Its modular architecture makes it highly flexible and suitable for resource-constrained edge devices and sensors. This article reviews Zephyr’s structure and features, examines how Zephyr supports neural networks, and discusses how […]

Filed Under: Artificial intelligence, FAQ, Featured, Sensor modules Tagged With: FAQ

How do AI and ML enhance SASE security?

May 22, 2024 By Jeff Shepard Leave a Comment

Secure Access Service Edge (SASE) has emerged as a leading architecture for cloud deployments. Its primary function is to provide comprehensive cloud-based secure access while maintaining seamless access to data and applications for users of cloud computing services. This article compares SASE with a traditional network architecture and then looks at how artificial intelligence (AI) […]

Filed Under: Artificial intelligence, FAQ, Featured Tagged With: FAQ

How is HIL testing used for onboard EV chargers?

May 15, 2024 By Jeff Shepard Leave a Comment

Hardware-in-the-loop (HIL) testing is a real-time simulation that enables designers to test embedded code for EV chargers without needing the actual system hardware. It speeds development efforts and reduces development costs. This article begins with an overview of HIL testing and onboard chargers (OBCs), looks at specific types of HIL testing applied to OBCs, and […]

Filed Under: Automotive, EV Engineering, FAQ, Featured Tagged With: FAQ

How does a recurrent neural network (RNN) remember?

May 8, 2024 By Jeff Shepard 1 Comment

There are several types of neural networks (NNs). Recurrent NNs (RNNs) can “remember” data and use past information for inferences. This article compares recurrent NNs with feed-forward NNs (FFNNs) that can’t remember, then digs into the concept of backpropagation through time (BPTT) and closes by looking at long short-term memory (LSTM) RNNs. RNNs and FFNNs […]

Filed Under: FAQ, Featured Tagged With: FAQ

What’s the difference between GPUs and TPUs for AI processing?

May 1, 2024 By Jeff Shepard Leave a Comment

Graphic processing units (GPUs) and tensor processing units (TPUs) are specialized ICs that support different types of artificial intelligence (AI) and machine learning (ML) algorithms. This article begins with a brief overview of tensors and where they fit into the mathematics of AI and ML; it then looks at the different structures of GPUs and […]

Filed Under: Artificial intelligence, FAQ, Featured Tagged With: FAQ

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Featured Contributions

How software segregation minimizes the impact of AI/ML on safety-critical software

Future connected car

10Base-T1S/L connects sensors in cars and buildings

Matter 1.2 is here — what does that mean for the smart home? 

IoT standards

IoT standards: The End Game

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy