Explore new breakthroughs in hardware-based counterfeit and IP authentication, courtesy of Maxim’s proprietary platform. Includes a deep dive into both traditional authentication methods and DeepCover’s much more comprehensive SHA-256-based approach.
Thong and Vienxay demonstrate how easy it is to solder a Himalaya uSLIC™ power module, designed for high efficiency in space-constrained applications. Vienxay shows step-by-step how to solder the MAXM17532 onto its evaluation board.
Almost every piece of technology we use today has some kind of embedded firmware. Rogue firmware, however, can leak data and cause device malfunctions. Watch this video to see how you can use the MAXAUTHDEMO1 kit.