Contributing Authors

    Protecting crucial Data & Assets by APAC organisation

    COVID-19 pandemic has significantly impacted the security of businesses and individuals worldwide. While some industries have been severely hit, others are experiencing sudden and...

    Improving dynamic loop response

    A dc-to-dc converter regulates a varying input voltage to a (usually) fixed output voltage via a feedback control system. The feedback control system should...

    Mantra to choose the appropriate DDoS Mitigation Strategy- Keep it Simple

    The cyber industry offers a plenitude of DDoS Mitigation solutions. Competition may be misleading as providers highlight terms such as mitigation capacity, layered protections or...

    How to adapt an existing design for use in the Internet of Things

    Since the time the Internet revolution started gaining momentum in the 1990’s, much has evolved. From a point of doubting its success and longevity,...

    An Opportunity Thriving in Crisis

    A finest blend of fortune and creative sublimation all through 2020 enjoys a mix bag of opportunity and despair. Despair – that Covid-19 struck...

    Case Study: Amazon Web Services assets protection

    As organizations migrate computing workloads to publicly hosted clouds, IT and security administrators face new security challenges. Cloud environments make it easy to deploy...

    Design Challenges and the Impact on Coating Success

    As assemblies become ever more densely populated, and housing /casing designs become more permeable to save weight, the use of conformal coatings is becoming...

    Ethernet-APL: Optimization of Process Automation with Actionable Insights

    Ethernet-APL (advanced physical layer) specifies the details of the application of Ethernet communication to sensors and actuators for the process industry and will be...

    Watch out for these Seven L7 DDoS attacks

    The nature of DDoS attacks is changing. Not too long ago, large-scale network-layer floods were attackers’ tools of choice, using malformed TCP and UDP...

    Multiply the Power of a boost converters with a Versatile Phase Expander

    Introduction There’s a general understanding in the engineering community that multiphase functionality required when boost converters must supply high output voltages, work from low input...

    The Immense Potential and Daunting Challenges of 5G

    Even if you are not consumed by wireless technology, it is hard to miss 5G. Naturally, it was the biggest topic at Mobile World Congress...

    Hybrid Warfare: Cancel Culture can fuel a war

    The term “Hybrid Warfare” is difficult to define. How you define it may depend on how a government views hybrid threat. Hybrid warfare is...

    Work from home is the new normal; now how to tackle security concerns

    The enterprise IT world took to a drastic change in the last few months and this scenario and pace is unlikely to slow or...

    Self-Driving Cars – the 21st Century Gold Rush

    The earliest of automobiles when used to run down the streets were referred to as “horseless carriages”. By the time the term ‘car’ was...

    Connectivity Chipset or Module for IoT System: Solving the Dilemma

    Introduction According to Stastita (1), by 2025 IoT devices are expected to number more than 75 billion, far outnumbering the UN’s forecast of 8.1 billion...

    Related News