Posts

Showing posts from November, 2018

LED Holder Provides Solderless LED Connection

Image
LED Holders With the ever-growing energy efficiency requirements, designers have been seeking ways to ease and hasten the implementation of LED technology. This pursuit for easy and fast ways of implementation has often been made difficult by Chip-On-Board LEDs. To circumvent this challenge, connector manufacturers came up with solderless  LED holder   designs and systems. These holders focus on easing assembly while ensuring that they are secure and less costly. TE Connectivity is leading the pack in this direction. It has developed Zhaga-compliant LED holder that has solderless and snap-in features which ease and hasten manufacturing and installations of LED-lighting applications. LUMAWISE Type Z50 This is TE Connectivity hallmark. It is the latest member of the LUMAWISE family. The LUMAWISE Z50 conforms to the Zhaga consortium specifications. These specifications have been developed by companies working together to ensure interchangeability of  LED-light sources  so as to s

Reasons Why You Should Use USB Type-C

Image
Reasons Why You Should Use USB Type-C Waterproof USB Type-C Connectors In Your Next Design USB TYPE-C Just when we thought we have finished exploiting the  USB type-C connector , a new grand feature crops up. It is safe to say that USB-C already reigns in the arena of high-end smartphones and laptops. The USB-C was first adopted by Google and Apple but has since gained a lot of popularity which has seen its adoption extend to other smartphone manufacturers and other industries as well. What exactly made the USB-C move from a finalized spec in 2014 to be the most preferred cable in 2018? What is this grand feature that makes it even more appealing? Read on to find out more as we shed more light on the USB-C. Technical features The USB-C deliver the power of up 100 watts. It’s rated at between 3A and 5A hence it can comfortably handle up to 30V. It has 24 pins and a twofold rotational symmetrical connector. It is for this reason that it is able to connect to the host and device

Proprietary RF vs. Bluetooth

Image
Wireless connectivity Engineers now have a wide pool of option to choose from when it comes to wireless connectivity. Among these options is WI-FI, Zigbee, Bluetooth, Proprietary RF among others. These wireless technologies can be used in applications such as human interface devices and remote sensors for IoT  among others. The availability of a variety of options makes it difficult to pick the wireless technology to use. There are many factors that come into play when picking the technology to use, they include cost, design time, interoperability, security, coexistence, latency, robustness, power consumption and certification requirements. Choosing one over the other means there are relative trade offs one will have to make. We will keenly study the advantages and disadvantages of both proprietary RF and Bluetooth. The advantages and disadvantages of proprietary RF Advantages Proprietary RF is ideal for applications that require security, small footprint, performance and lo

Secure IoT Device Communications with a Single Chip

Image
IoT Security The IoT landscape is increasingly becoming aware of the need for security, IoT developers are facing increased demands for tighter security. IoT security is more than just secure sessions underlying secret keys and secure messaging. However, an intact security chain is complex to design and implement more so factoring in the cost of production. To allow designers to deliver on this expectations and requirements,  IoT applications  need to be built on root-of-trust with secure boot and firmware updates at the device level. Luckily a single chip can be used to implement a wide range of security mechanisms required to ensure that the necessary security mechanisms required for IoT application security are met. A single chip for IoT security The CEC1702 is such a chip that can be used to implement IoT security. Its cryptographic embedded controller enables developers to address heightened security measures with minimal effort without affecting the performance of the sy