
Applications

Microcontroller Basics – Applications, Working, Types, FAQs
– Advertisement – A microcontroller is a small, low-cost computer-on-a-chip that is designed to perform a specific set of tasks. It is used in a variety of applications, including controlling machines, sensing and monitoring devices, and automated systems. A microcontroller typically consists of a central processing unit (CPU), memory, input/output (I/O) ports, and support for…

EMI fundamentals for spacecraft avionics & satellite applications
OEMs must ensure their avionics are electromagnetically clean and do not pollute other sub-systems with unwelcome radiative, conducted, or coupled emissions. Similarly, integrators must ensure their space electronics are not susceptible to RFI from external sources, as this could impact performance or even damage hardware. As a product provider, how do you ensure that your…

Power Tips #144: Designing an efficient, cost-effective micro DC/DC converter with high output accuracy for automotive applications
The ongoing electrification of cars brings new trends and requirements with every new design cycle. One trend for battery electric vehicles is reducing the size of the low-voltage batteries, which power either 12-V or 48-V systems. Some auto manufacturers are even investigating whether it’s possible to eliminate low-voltage batteries completely. Regardless, you’ll need isolated high-…

What is a Database? Modern Database Types, Examples, and Applications (2025)
In today’s data-driven world, databases form the backbone of modern applications—from mobile apps to enterprise systems. Understanding the different types of databases and their applications is crucial for selecting the right system for specific needs, whether you’re building a personal project or architecting enterprise-level solutions. What is a Database? A database is a structured collection of…

Power Tips #143: Tips for keeping the power converter cool in automotive USB PD applications
Today’s car buyers, whether purchasing premium or economy models, expect to charge multiple devices simultaneously through in-vehicle USB ports. To meet this demand, automakers are replacing legacy USB Type-A ports with multiple USB Type-C ports that support the latest USB power delivery (PD) standards. These standards enable significantly higher power levels—up to 48 V and…

Building AI-Powered Applications Using the Plan → Files → Code Workflow in TinyDev
In this tutorial, we introduce TinyDev class implementation, a minimal yet powerful AI code generation tool that utilizes the Gemini API to transform simple app ideas into comprehensive, structured applications. Designed to run effortlessly in Notebook, TinyDev follows a clean three-phase workflow—Plan → Files → Code—to ensure consistency, functionality, and modular design. Whether building a…

Time-to-digital conversion for space applications
What is a TDC? A time-to-digital converter (TDC) is like a stopwatch measuring the elapsed interval between two events with picosecond precision, converting this into a digital value for post-processing. Many space applications require time-of-flight measurements to calculate distance, delay, or velocity. For example, an in-space servicing, assembly, and manufacturing (ISAM) spacecraft needs to determine…

SaaS Security Essentials: Reducing Risks in Cloud Applications
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection, sensitive data, user access, and cloud infrastructure are left vulnerable to breaches. SaaS security is not a single-layer fix; it demands multiple approaches to address cybersecurity threats across identity, data, and applications. Key Components of…

RRAM: Non-volatile memory for high-performance embedded applications
Non-volatile memory is an important component in a wide range of high-performance embedded applications. Especially, many consumer, industrial, and medical applications need increased re-writability to support both more frequent code updates as well as increased data logging. These applications require greater memory density to store either a substantially larger code footprint and/or more extensive data…

How OWASP Helps You Secure Your Full-Stack Web Applications — Smashing Magazine
The OWASP vulnerabilities list is the perfect starting point for web developers looking to strengthen their security expertise. Let’s discover how these vulnerabilities materialize in full-stack web applications and how to prevent them. Security can be an intimidating topic for web developers. The vocabulary is rich and full of acronyms. Trends evolve quickly as hackers…
- 1
- 2