Search

PIC - search results

Filter by Categories

How Cloud Based Radio Access Networks Can Solve Operators’ Problems

The exploding growth of handsets, tablets and the new set of connected devices such as smartwatches, eye-glasses combined with massive, high-bandwidth video usage results...

Dramatically Boost Efficiency with Bi-Directional Energy Flow

Watch: Enabling Bi-Directional Energy Flow Using DC Power Transformers Webinar Harry Vig, Vicor Principal Systems Application Engineer talks about: • How to design for bi-directional DC-DC...

How Electronic Nose Is Better Than Ours

An electronic nose, or e-nose, is a device that identifies specific components of an odour and analyses its chemical makeup to identify it. It...

Industrial IoT (IIoT) will Require Embedded Hardware Security

The Industrial IoT (IIoT), a subset of the IoT evolution, is quite the rage within automation companies as they seek to add a high-margin...

A Guide To Smoke Detectors And Fire Alarms

Residential fires have become a significant problem throughout the country. Fire officials estimate that at least fifty per cent of lives that are lost...

Third DVCon India Bigger and Better than Ever

Two years ago, the long-running Design and Verification Conference and Exhibition (DVCon) expanded from Silicon Valley to Bangalore. The first two events were very...

Dog-E-Tronics For Dog Lovers To Simplify Life And Provide Security

Dogs have been an important part of families since a long time. From being watch-dogs to family companions, dogs have been a support to...

How do Transistor work?

The video covers the following topics - structure of Silicon atom, doping, N type doping, P type doping, working of Diode, working of NPN...

Tech Update (May 2016)

DNA storage could make data centres obsolete Imagine being able to store a data centre’s worth of information on something the size of a single...

Network Troubleshoot Using Packet Sniffer Wireshark

In industries, many systems are based on networks comprising different devices and controllers that work on some protocols. Often the need arises to monitor...