<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Documents</title><link>https://community.element14.com/technologies/security/w/documents</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Password Strength, get familiar with it.</title><link>https://community.element14.com/technologies/security/w/documents/10421/password-strength-get-familiar-with-it</link><pubDate>Fri, 08 Oct 2021 05:12:30 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:efc3f68b-93fe-46e3-9287-ed80937bebed</guid><dc:creator>DebuggerGuys</dc:creator><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 5:12:30 AM&lt;br /&gt;
&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Sometimes it becomes a real pain and massive headache when you must remember 20 different passwords for important things every single day, and having the very same one password for more than one account is a dangerous thing to do and a not-so recommendable practice. As well, if you have the idea that it&amp;#39;s very unsafe to write them down somewhere, whether digitally or non-digitally, you and I think pretty much alike. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Nevertheless, it is something we must get used to somehow, and the methods we use to keep those passwords safe are not handy most of the times, right?&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Anyway! This post attempts to compile and remind you the best practices in keeping out passwords secure, and dealing in between the vast number of services we daily log into and log out of.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Firstable, let&amp;#39;s define what are the elements that make our password secure enough. &lt;a href="http://data.whicdn.com/images/33132948/login(1)_large.jpg"&gt;&lt;img alt="Login(1)_large" class="jiveImage" src="http://data.whicdn.com/images/33132948/login(1)_large.jpg" style="float:right;padding:15px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;length&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of dictionary words&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of relevant user information (first name, last name, birth date)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;avoidance of common patterns&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;the combination of lower and uppercase letters, numbers and special characters.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;The mixture of different character types makes up what’s called the “keyspace”. The keyspace can be computed through the formula C&lt;sup&gt;N&lt;/sup&gt;, C being the number of possible characters and N being the length of the password. To determine the keyspace of the “oh, so common” example, ‘password’, we would use the above formula C&lt;sup&gt;N&lt;/sup&gt;. This example uses only lowercase letters which would bring the C in the formula to 26, i.e. the number of all possible lowercase letters [a-z]. The exponent N is simply the length of the password ‘password’ which in this case equals 8. For our example, the formula turns out to be &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=26%5E8" rel="nofollow ugc noopener" target="_blank"&gt;26&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt; or roughly 208 billion.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;So this means that for an attacker to perform a brute force attack, like trying every single possibility in the keyspace, they would need to try roughly 208 billion possibilities. At first glance you may be thinking, “Oh, that sounds like a pretty secure number to me.” But in reality, it really isn’t.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;There are many advanced programs and techniques that are used to speed up the password cracking process including: GPU based cracking, rainbow table assisted cracking, cloud based cracking, and statistical pattern assisted cracking. Using GPU base cracking, a single &lt;a class="jive-link-external-small" href="http://www.amd.com/us/products/desktop/graphics/7000/7970/Pages/radeon-7970.aspx" rel="nofollow ugc noopener" target="_blank"&gt;AMD Radeon HD 7970&lt;/a&gt; can reach speeds of up to 8.2 billion passwords per second. [1] If an attacker were to use the brute force method he or she would crack our example “password” in just less than 26 seconds.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Following the above guideline for password strength is paramount to keeping your passwords secure against the multitude of password cracking attacks. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;There is a seemingly age old argument of &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2005/07/passwords-vs-pass-phrases.html" rel="nofollow ugc noopener" target="_blank"&gt;passwords vs. passphrases&lt;/a&gt;. That is, use a long, easier to remember passphrase compared to a more compact, but difficult to remember password. An example of a passphrase can be the name of your favorite book, “So Long, and Thanks for All the Fish” which would have a keyspace of &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=85%5E36" rel="nofollow ugc noopener" target="_blank"&gt;85&lt;sup&gt;36&lt;/sup&gt;&lt;/a&gt; or roughly around 2 duovigintillion (I swear it’s a real thing). Whereas, an example of a password could be ‘xYaQxrz8!’, which would have a keyspace of &lt;a class="jive-link-external-small" href="http://www.wolframalpha.com/input/?i=95%5E9" rel="nofollow ugc noopener" target="_blank"&gt;95&lt;sup&gt;9&lt;/sup&gt;&lt;/a&gt; or roughly 630 quadrillion. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Seems strong enough right? Hopefully you will still get those headaches once in a while but you&amp;#39;re online services will be secured up. The technique I use to avoid headaches is writting keywords similar to my passwords or linking them with a personal experience...(I guess my memory isn&amp;#39;t that bad after all). It can also help writing a big note with a random story that includes them...the matter here is to find a way to maintain them and keep thieves away. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: security, password, account, strength, online&lt;/div&gt;
</description></item><item><title>websites tracking you online...how?</title><link>https://community.element14.com/technologies/security/w/documents/9900/websites-tracking-you-online-how</link><pubDate>Fri, 08 Oct 2021 04:53:15 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:c14bf258-c91e-422e-b6ea-911cd46cadfd</guid><dc:creator>DebuggerGuys</dc:creator><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 4:53:15 AM&lt;br /&gt;
&lt;p style="margin:0;"&gt;&lt;span style="font-size:14px;font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Some forms of tracking are obvious – for example, websites know who you are if you’re logged in. But how do tracking networks build up profiles of your browsing activity across multiple websites over time?&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Tracking is generally used by advertising networks to build up detailed profiles for pinpoint ad-targeting. If you’ve ever visited a business’ website and seen ads for that business on other websites later, you’ve seen it in action.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;IP Addresses&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;The most basic way of identifying you is by your IP address. Your IP address identifies you on the Internet. These days, it’s likely that your computer shares an IP address with the other networked devices in your house or office. From your IP address, a website can determine your rough geographical location – not down to street level, but generally your city or area. If you’ve ever seen a spammy ad that tries to look legitimate by mentioning your location, this is how the ad does it.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;IP addresses can change and are often used by multiple users, so they aren’t a good way of tracking a single user over time. Still, an IP address can be combined with other techniques here to track your geographical location.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;HTTP Referrer&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;When you click a link, your browser loads the web page you clicked and tells the website where you came from. For example, if you clicked a link to an outside website on How-To Geek, the outside website would see the address of the How-To Geek article you came from. This information is contained in the HTTP referrer header.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;The HTTP referrer is also sent when loading content on a web page. For example, if a web page includes an ad or tracking script, your browsers tells the advertiser or tracking network what page you’re viewing.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;“Web bugs,” which are tiny, one-by-one pixel, invisible images, take advantage of the HTTP referrer to track you without appearing on a web page. They’re also used to track emails you open, assuming your email client loads images.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Cookies &amp;amp; Tracking Scripts&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Cookies are small pieces of information websites can store in your browser. They have plenty of legitimate uses – for example, when you sign into your online-banking website, a cookie remembers your login information. When you change a setting on a website, a cookie stores that setting so it can persist across page loads and sessions.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Cookies can also identify you and track your browsing activity across a website. This isn’t necessarily a big problem – a website might want to know what pages users visit so it can tweak the user experience. What’s really pernicious are third-party cookies.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;While third-party cookies also have legitimate uses, they’re often used by advertising networks to track you across multiple websites. Many websites – if not most websites – include third-party advertising or tracking scripts. If two different websites use the same advertising or tracking network, your browsing history across both sites could be tracked and linked.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Scripts from social networks can also function as tracking scripts. For example, if you’re signed into Facebook and you visit a website that contains a Facebook “Like” button, Facebook knows you visited that website. Facebook stores a cookie to save your login state, so the Like button (which is actually part of a script) knows who you are.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Super Cookies&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;You can clear your browser’s cookies — in fact, we’ve got a &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/111925/delete-cookies-in-the-five-most-popular-web-browsers-in-windows/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;guide to clearing your browser’s cookies&lt;/a&gt;. However, clearing your cookies isn’t necessarily a solution – “super cookies” are increasingly common. One such super cookie is &lt;a class="jive-link-external-small" href="http://samy.pl/evercookie/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;evercookie&lt;/a&gt;. Super cookie solutions like evercookie store cookie data in multiple places – for example, in Flash cookies, Silverlight storage, your browsing history, and HTML5 local storage. One particularly clever tracking method is assigning a unique color value to a few pixels every time a new user visits a website. The different colors are stored in each user’s browser cache and can be loaded back – the color value of the pixels is a unique identifier that identifies the user.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;When a website notices that you’ve deleted part of the super cookie, the information is repopulated from the other location. For example, you might clear your browser cookies and not your Flash cookies, so the website will copy the value of the Flash cookie to your browser cookies. Super cookies are very resilient.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;User Agent&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Your browser also sends a user agent every time you connect to a website. This tells websites your browser and operating system, providing another piece of data that can be stored and used to target ads. For more information about user agents, check out our explanation of &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/114937/htg-explains-whats-a-browser-user-agent/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;what a browser user agent is&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;h3 style="font-size:18px;color:#172232;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Browser Fingerprinting&lt;/span&gt;&lt;/h3&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;Browsers are actually pretty unique. Websites can determine your operating system, browser version, installed plug-ins and their versions, your operating system’s screen resolution, your installed fonts, your time zone, and other information. If you’ve disabled cookies entirely, that’s another piece of data that makes your browser unique.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;The Electronic Frontier Foundation’s &lt;a class="jive-link-external-small" href="https://panopticlick.eff.org/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Panopticlick&lt;/a&gt; website is an example of how this information can be used. Only one in 1.1 million people have the same browser configuration I do.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;There are surely other ways that websites can track you. There’s big money in it, and people are brainstorming new ways to track every day – just see evercookie above for evidence of that.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;&lt;a href="http://data.whicdn.com/images/13544/20080416005407_large.jpg"&gt;&lt;img alt="20080416005407_large" class="jiveImage" src="http://data.whicdn.com/images/13544/20080416005407_large.jpg" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;To surf as anonymously as possible, &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/114004/how-to-browse-anonymously-with-tor/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;use the Tor Browser Bundle&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;For information on tweaking your browser’s privacy settings and determining what exactly each setting does, see our guides to optimizing &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/100361/how-to-optimize-google-chrome-for-maximum-privacy/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Google Chrome&lt;/a&gt;, &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/102032/how-to-optimize-mozilla-firefox-for-maximum-privacy/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Mozilla Firefox&lt;/a&gt;, &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/102502/how-to-optimize-internet-explorer-9-for-maximum-privacy/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Internet Explorer&lt;/a&gt;, &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/103622/how-to-optimize-safari-for-maximum-privacy/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Safari&lt;/a&gt;, or &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/104263/how-to-optimize-opera-for-maximum-privacy/" rel="nofollow ugc noopener" style="color:#114491;" target="_blank"&gt;Opera&lt;/a&gt; for maximum privacy. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:20px 0;color:#333333;font-size:14px;font-family:Verdana;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;"&gt;via &lt;a class="jive-link-external-small" href="http://www.howtogeek.com/115483/htg-explains-learn-how-websites-are-tracking-you-online/" rel="nofollow ugc noopener" target="_blank"&gt;How To Geek&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;v&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: internet, cookies, web, explorer, user, google, network, safari, tracking, mozilla, ip, opera, http, firefox, browser, chrome&lt;/div&gt;
</description></item><item><title>a hole in Windows 8 security...is it a big deal?</title><link>https://community.element14.com/technologies/security/w/documents/9830/a-hole-in-windows-8-security-is-it-a-big-deal</link><pubDate>Fri, 08 Oct 2021 04:52:22 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:6e359f57-db92-49f8-8d37-7ddd1d7f9380</guid><dc:creator>DebuggerGuys</dc:creator><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 4:52:22 AM&lt;br /&gt;
&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;a href="http://data.whicdn.com/images/25641501/549930_large.jpg"&gt;&lt;img alt="549930_large" class="jiveImage" src="http://data.whicdn.com/images/25641501/549930_large.jpg" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;A security researcher has found a potentially massive security hole in Windows 8 that would expose someone&amp;#39;s contacts and other information from social networking services and email including Gmail, Facebook, Hotmail, LinkedIn, and Twitter, among others. It sounds serious, but there may be less to the security hole than meets the eye.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Woody Leonhard, an old friend of mine, &lt;a class="jive-link-external-small" href="http://www.infoworld.com/t/microsoft-windows/windows-8-contacts-cache-exposes-personal-data-192542" rel="nofollow ugc noopener" style="color:#206ba4;" target="_blank"&gt;first reported on the hole in Infoworld&lt;/a&gt;. The hole comes about because Windows 8 can grab contact and other data from multiple external sites so that you can see them all in one place. That&amp;#39;s one of the benefits of Windows 8 -- Metro is designed to be a central hub for information across the Internet, and then bring that information to you rather than you going out and seeking it.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Leonhard notes, though, that in the current Consumer Preview of Windows 8, all that information is kept on a machine even after the PC is turned off, and that someone may be able to get access to all of it. He writes:&lt;/span&gt;&lt;/p&gt;&lt;blockquote class="jive-quote" style="margin-top:15px;margin-bottom:15px;margin-left:15px;padding-left:15px;border-left-width:4px;font-size:15px;border-left-color:#dddddd;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&amp;quot;Windows 8 doesn&amp;#39;t build its Contacts list dynamically. Instead, it keeps a cache of contacts from all of those sources stored on the machine. The cache persists even when the user logs off or the machine is turned off. That means anyone who can sign on to your PC with an administrator account can see all of your contacts and all of their data -- names, email addresses, pictures, telephone numbers, addresses -- whatever you have on file or whatever&amp;#39;s been sucked in from Hotmail, Gmail, Facebook, Twitter, and LinkedIn.&amp;quot;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Leonhard found out about the hole from a white paper written by Amanda C.F. Thomson, a graduate student at George Washington University. (You can get the white paper and more information from her blog, &lt;a class="jive-link-external-small" href="http://propellerheadforensics.com/" rel="nofollow ugc noopener" style="color:#206ba4;" target="_blank"&gt;PropellerHeadForensics&lt;/a&gt;.)&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;It&amp;#39;s certainly frightening stuff. But keep in mind that for anyone to get access to that cache, they&amp;#39;ll need to log in to the Windows 8 machine with administrator access. And in that case, they&amp;#39;ll be able to get access to a lot of this information without having to dig into the cache -- Metro will be grabbing information from multiple services, and that information will be displayed in plain sight. However, it is true that the cache will make it easier for someone to grab all the contact information in one fell swoop, so it is an added security threat.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;The real problem isn&amp;#39;t as much Windows 8 as it is the overuse of an administrator account. People should use such an account only rarely, and not for normal operations of their PC, because of the access it gives to all parts of the operating system. And they should never share that account with others. Mark Baldwin, principal researcher and consultant at InfosecStuff, &lt;a class="jive-link-external-small" href="http://www.csoonline.com/article/705894/windows-8-privacy-worry-overblown-says-microsoft-analyst?page=2" rel="nofollow ugc noopener" style="color:#206ba4;" target="_blank"&gt;told Taylor Armerding of CSO&lt;/a&gt; that&lt;/span&gt;&lt;/p&gt;&lt;blockquote class="jive-quote" style="margin-top:15px;margin-bottom:15px;margin-left:15px;padding-left:15px;border-left-width:4px;font-size:15px;border-left-color:#dddddd;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&amp;quot;If an unauthorized person has admin rights on your machine, then you have more problems to worry about than your Facebook and email contact information.&amp;quot;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;I think it&amp;#39;s likely that Microsoft will protect the cache in some way, so that even administrator accounts won&amp;#39;t be able to directly view it. The cache is only there to improve performance, so that it doesn&amp;#39;t have to be rebuilt every time someone logs on. So don&amp;#39;t be surprised if it&amp;#39;s eventually encrypted.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Woody is certainly right -- the cache is a potentially security danger. But it&amp;#39;s not as bad as it seems at first glance, and Microsoft may fix it before the operating system&amp;#39;s final release.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin-top:8px;margin-bottom:8px;font-size:15px;font-family:&amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;strong&gt;via &lt;a class="jive-link-external-small" href="http://blogs.computerworld.com/20135/is_the_windows_8_security_hole_really_a_big_deal" rel="nofollow ugc noopener" target="_blank"&gt;COMPUTER WORLD&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: information, microsoft, hole, security, 8, network, info, windows, social&lt;/div&gt;
</description></item><item><title>Keep an eye on your e-mail account. Harrowing tale...</title><link>https://community.element14.com/technologies/security/w/documents/9734/keep-an-eye-on-your-e-mail-account-harrowing-tale</link><pubDate>Fri, 08 Oct 2021 04:50:49 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:4108c34a-bb71-47e7-875d-f196d9387c55</guid><dc:creator>DebuggerGuys</dc:creator><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 4:50:49 AM&lt;br /&gt;
&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;...&amp;quot;When [my wife] came back to her desk, half an hour later, she couldn’t log into Gmail at all. By that time, I was up and looking at e‑mail, and we both quickly saw what the real problem was. &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;In my inbox I found a message purporting to be from her, followed by a quickly proliferating stream of concerned responses from friends and acquaintances, all about the fact that she had been “mugged in Madrid.” &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;The account had seemed sluggish earlier that morning because my wife had tried to use it at just the moment a hacker was taking it over and changing its settings—including the password, so that she couldn’t log in again&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;The greatest practical fear for my wife and me was that, even if she eventually managed to retrieve her records, so much of our personal and financial data would be in someone else’s presumably hostile hands that we would spend our remaining years looking over our shoulders, wondering how and when something would be put to damaging use. At some point over the past six years, &lt;strong&gt;our [email] correspondence would certainly have included every number or code that was important to us – credit card numbers, bank-account information, medical info, and any other sensitive data you can imagine.&amp;quot;...&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:right;"&gt;&lt;span style="font-family:verdana, geneva;font-size:8pt;"&gt;&lt;em&gt;&lt;strong&gt;Jeff Atwood&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&amp;nbsp;&lt;/p&gt;&lt;table border="1" cellpadding="3" cellspacing="0" class="jiveBorder" style="width:100%;border:1px solid #000000;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th align="center" rowspan="2" style="border:1px solid black;border:1px solid #000000;background-color:#6690bc;" valign="middle"&gt;&lt;br /&gt;&lt;a href="http://data.whicdn.com/images/12811085/securitykey_large.jpg"&gt;&lt;img alt="Securitykey_large" class="jiveImage" src="http://data.whicdn.com/images/12811085/securitykey_large.jpg" /&gt;&lt;/a&gt;&lt;/th&gt;&lt;th align="center" style="border:1px solid black;border:1px solid #000000;background-color:#6690bc;" valign="middle"&gt;&lt;span style="color:#ffffff;"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="border:1px solid black;border:1px solid #000000;"&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Your email is &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2008/06/please-give-us-your-email-password.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;the skeleton key to your online identity&lt;/a&gt;. When you lose control of your email to a hacker – not if, but &lt;em&gt;when&lt;/em&gt; you lose control of your email to a hacker – the situation is dire. Email is a one stop shop for online identity theft. You should start thinking of security for your email as roughly equivalent to the sort of security you&amp;#39;d want on your bank account. It&amp;#39;s exceedingly close to that in practice.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;span style="font-size:18pt;"&gt;The good news&lt;/span&gt;, at least if you use GMail, is that &lt;strong&gt;you can make your email virtually hacker-proof today, provided you own a cell phone&lt;/strong&gt;. The fancy geek technical term for this is &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2007/02/what-you-have-what-you-know-what-you-are.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;two factor authentication&lt;/a&gt;, but that doesn&amp;#39;t matter right now. What matters is that until you turn this on, your email is vulnerable. So let&amp;#39;s get started. Not tomorrow. Not next week. &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2007/07/yes-but-what-have-you-done.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;&lt;em&gt;Right. Freaking. Now.&lt;/em&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;font-size:12pt;"&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style="margin:0;"&gt;SOURCE: &lt;span style="font-size:12pt;"&gt;&lt;strong&gt;&lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/" rel="nofollow ugc noopener" target="_blank"&gt;Coding Horror.&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: account, hacker-proof, hackers, online, identity, e-mail&lt;/div&gt;
</description></item><item><title>Gennum supports HDcctv Equipment</title><link>https://community.element14.com/technologies/security/w/documents/7148/gennum-supports-hdcctv-equipment</link><pubDate>Thu, 07 Oct 2021 05:43:14 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:0aa2c380-9d37-47b1-8a47-11bd851d3d9e</guid><dc:creator>Former Member</dc:creator><description>Current Revision posted to Documents by Former Member on 10/7/2021 5:43:14 AM&lt;br /&gt;
&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;The HDcctv Alliance estimates that 26 million CCTV cameras shipped in 2008. As camera sales continue to grow at about 8% per year, it is estimated that around 41 million units will ship in 2014. The Alliance projects that the HDcctv product category will initially take a small share of the video surveillance market, growing to around 15% by 2014. With the future growth of the security and surveillance end equipment market set to soar in the next few years, Gennum already provides a flexible interface chipset solution (known as the GV7600 and GV7601) for HDcctv equipment where long distance transmission is required; supporting uncompressed, full-bandwidth high definition video up to 1080p HD format. Despite the growth of IP-based HDcctv networks, in the analog/HDcctv world, edge-based hacking attacks on the network are impossible since the hacker needs to gain direct access to the DVR. IP networked cameras, on the other hand, are highly vulnerable to edge based hacking since WiFi systems can be overcome using jammers and are also liable to denial of service (DoS) attacks by UDP packet flooding. Does this then merit the proven viability of using HD cameras over co-axial cables for security and surveillance applications?&amp;nbsp; Let’s consider a few more aspects and key selling points for HDcctv over co-ax cables. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;1) The vast majority of CCTV cameras used today are positioned well above ground level which means cables such as CAT-5/5e plus RJ-45 ethernet sockets and AC power outlets need to be provided in rather awkward and difficult to reach places. These sockets must also be well hidden in order to prevent tampering which is a labour intensive procedure that requires the services of professional IT engineers and electricians. Today, existing analog CCTV installations already have co-ax cables and AC power outlets at the ready so infrastructure upgrade efforts to HDcctv solutions are seamless.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;2) New high performance dome cameras with PTZ, integrated IR and even 3D imaging features all require more power than the standard PoE can offer which means PoE+ must be adopted which becomes more costly and will only feature on the newer and more expensive Ethernet port hubs. PoE also suffers from voltage drops especially when going over long distances with CAT-6 cable (50-100m) so its is likely that a DC/DC converter will be required at the camera end. This not only adds to system cost but also generates heat which is not good for the thermal management aspects of the camera system design. HDcctv Power over Co-ax (PoC) plans to support up tp 30W.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;3) Data, Voice and Video applications all have QoS requirements with Video having the greatest requirement for maintaining a quality of service. Careful attention needs to be paid to how “aggressive” the compression is, otherwise key features and details coming from the camera will be missed. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-size:12pt;"&gt;4) Security of video transport is absolutely paramount. IP camera based networks are vulnerable to edge-based hacking attacks using DoS flooding techniques and WiFi can be defeated using jammers. With HDcctv architectures it is simply not possible to mount an attack using cable from the edge devices. You need to be connected directly to the DVR. In the event that the DVR is attacked, the recording engine will still function. &lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Glass Break Detector</title><link>https://community.element14.com/technologies/security/w/documents/6107/block-diagrams--texas-instruments--glass-break-detector</link><pubDate>Thu, 07 Oct 2021 01:15:33 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:da37f2ba-31ee-4fd1-b31e-ed2e98422f16</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:15:33 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Glass Break Detector&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/489.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x599/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_17146.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_17146.gif-620x599.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=j%2Bgc43Dy3y5qlJ5K13Jh%2FLOX6FSrdfvML1g1jkoF7qo%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=CVsANG/1nW/jaSYRU5wAOA==" style="max-height: 599px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, ap:glass_break, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Maxim- Network Access Control Overview</title><link>https://community.element14.com/technologies/security/w/documents/6102/block-diagrams--maxim--network-access-control-overview</link><pubDate>Thu, 07 Oct 2021 01:15:30 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:3d42122b-89d0-4e0e-a00b-3080b4f969ec</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:15:30 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Maxim&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Network Access Control&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Network Access Control Overview&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://www.maxim-ic.com/solutions/network_access_control/index.mvp" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/483x214/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_17147.jpg"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_17147.jpg-483x214.jpg?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=4dAYi4HK6uoFTc1JwH5eadC%2F%2FuayVOVOOavYYGSpCkE%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=x2eswQt2ojkSqvFQ3RyM4g==" style="max-height: 214px;max-width: 483px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:maxim, at:blockdiagram, in:security, ap:network_access_control&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- DVR and DVS</title><link>https://community.element14.com/technologies/security/w/documents/6101/block-diagrams--texas-instruments--dvr-and-dvs</link><pubDate>Thu, 07 Oct 2021 01:15:29 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:470ff9e8-29e1-4a3f-aaef-df2bdbd1d84b</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:15:29 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;DVR and DVS&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/485.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x485/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_17145.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_17145.gif-620x485.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=FUJH9f9xLWE6ZVhUumHze%2BG80hxrHUBSSXJ7wnWCm%2Fg%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=jTVMVAHnuLRBwG/I7E9Qng==" style="max-height: 485px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Camera: Surveillance IP Network</title><link>https://community.element14.com/technologies/security/w/documents/6100/block-diagrams--texas-instruments--camera-surveillance-ip-network</link><pubDate>Thu, 07 Oct 2021 01:15:29 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:f28d58a5-65cb-436a-87e7-50857678e638</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:15:29 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Camera: Surveillance IP Network&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/583.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x397/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_17144.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_17144.gif-620x397.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=tyqHWchqzU3cggWfUrBDTquacQmyZ4FPc4Xi9nxPXF0%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=uUloXt0PxQq32r0wMqWBYA==" style="max-height: 397px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Maxim- Video Matrix Switch</title><link>https://community.element14.com/technologies/security/w/documents/6062/block-diagrams--maxim--video-matrix-switch</link><pubDate>Thu, 07 Oct 2021 01:01:49 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:527297d2-cf03-4736-96e7-765ca9f729f0</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:49 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Maxim&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Video Matrix Switch&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://www.maxim-ic.com/solutions/video-matrix-switch/index.mvp" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/527x301/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2060.jpg"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2060.jpg-527x301.jpg?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=YESvXjGWvcVtDtsA6o2rDZR%2FWYino72qKDm%2FXAK7UHc%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=bIN7ohMNfLnS5LBtv3JO0w==" style="max-height: 301px;max-width: 527px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:maxim, ap:surveillance, at:blockdiagram, ap:video_switch, in:security, ap:video_matrix&lt;/div&gt;
</description></item><item><title>Block Diagrams- Maxim- Surveillance DVR 16-Channel</title><link>https://community.element14.com/technologies/security/w/documents/6061/block-diagrams--maxim--surveillance-dvr-16-channel</link><pubDate>Thu, 07 Oct 2021 01:01:49 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:00bfe407-8d9a-4b6b-bb92-e7e4b43a6a70</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:49 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Maxim&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;DVR 16-Channel&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://www.maxim-ic.com/solutions/surveillance-dvr-16-channel/index.mvp" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/596x342/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2059.jpg"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2059.jpg-596x342.jpg?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=MfFbUsnx0UQer%2F9bKS2exsgAS2yOwsrPwDh3DBL3Ujo%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=KuWyHa3/I4CB/SCw9/vIeQ==" style="max-height: 342px;max-width: 596px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:maxim, ap:surveillance, at:blockdiagram, in:security&lt;/div&gt;
</description></item><item><title>Block Diagrams- Maxim- IP Camera</title><link>https://community.element14.com/technologies/security/w/documents/6060/block-diagrams--maxim--ip-camera</link><pubDate>Thu, 07 Oct 2021 01:01:48 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:5f05db46-b921-412a-a663-ef06ed17c319</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:48 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Maxim&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;IP Camera&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://www.maxim-ic.com/solutions/ip-camera/index.mvp" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/467x312/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2058.jpg"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2058.jpg-467x312.jpg?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=%2BVx%2Bt325eDIikNvOB1Jz%2BbGJ1wztaZFGRCHdK9CaKEg%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=S/alV2kzBTOSETOEFJ1Srw==" style="max-height: 312px;max-width: 467px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:maxim, ap:surveillance, at:blockdiagram, in:security&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- X-ray: Baggage Scanner</title><link>https://community.element14.com/technologies/security/w/documents/6059/block-diagrams--texas-instruments--x-ray-baggage-scanner</link><pubDate>Thu, 07 Oct 2021 01:01:48 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:e34fbf37-bd5d-468f-bca2-f682535d0f82</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:48 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;X-ray&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;X-ray: Baggage Scanner&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/467.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x354/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2056.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2056.gif-620x354.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=v6TxhAJ6e%2BFMLpim7J4OM9CQdGjiB7SGNnR30QJv0pw%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=B/fg06jDETzESB5tcYy71w==" style="max-height: 354px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, in:security, ap:x-ray_baggage_scanner, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Video Doorbell</title><link>https://community.element14.com/technologies/security/w/documents/6058/block-diagrams--texas-instruments--video-doorbell</link><pubDate>Thu, 07 Oct 2021 01:01:47 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:bd0ee3c0-9b55-47d5-8bc3-dd16d1103408</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:47 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Camera: Surveillance IP Network&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/453.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x417/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2055.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2055.gif-620x417.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=rjQS1N%2F4WlUHQ5EZIVOVFodVRW2n8z0UeZqHqGeY7XU%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=ySrG+s8Hpj6xjdoEFcwhAA==" style="max-height: 417px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, ap:video_doorbell, at:blockdiagram, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Video Analytics Server</title><link>https://community.element14.com/technologies/security/w/documents/6057/block-diagrams--texas-instruments--video-analytics-server</link><pubDate>Thu, 07 Oct 2021 01:01:46 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:f33fd61a-5cb9-4edc-98e0-7fb5deb44248</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:46 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Video Analytics Server&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/487.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x399/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2054.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2054.gif-620x399.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=XTIGp9hYUGwT2borr4XgCf%2F0g%2B5fKVEirU0tGVfy%2Bqo%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=WrU1w3xcUUssVGmLJOTbzw==" style="max-height: 399px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, in:security, sp:texas_instruments, ap:video_analytics&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Intelligent Occupancy Sensing</title><link>https://community.element14.com/technologies/security/w/documents/6056/block-diagrams--texas-instruments--intelligent-occupancy-sensing</link><pubDate>Thu, 07 Oct 2021 01:01:46 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:c74f87a9-5544-49d2-8819-2190ff79a03c</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:46 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Intelligent Occupancy Sensing&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/527.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x406/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2053.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2053.gif-620x406.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=RIHM%2FwjTk94kpG8Fqzo9z9Degs0semYcAyba876i7Ok%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=xvc2rpOsrdksvbX+z5GgFQ==" style="max-height: 406px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, ap:occupancy_sensing, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Fingerprint Biometrics</title><link>https://community.element14.com/technologies/security/w/documents/6055/block-diagrams--texas-instruments--fingerprint-biometrics</link><pubDate>Thu, 07 Oct 2021 01:01:45 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:9e206662-9de4-4f70-9052-538952d7a47d</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:45 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Identification&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Fingerprint Biometrics&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/248.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/620x352/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2052.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2052.gif-620x352.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=gFCmrxL1I8V%2FL3zDZIT7PgRn8GrPodD6MLWDGwtCXvk%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=DFmskKGVByCDFJhJEKNFpQ==" style="max-height: 352px;max-width: 620px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, ap:fingerprint, at:blockdiagram, ap:biometrics, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Block Diagrams- Texas Instruments- Camera: Surveillance Analog</title><link>https://community.element14.com/technologies/security/w/documents/6053/block-diagrams--texas-instruments--camera-surveillance-analog</link><pubDate>Thu, 07 Oct 2021 01:01:00 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:a204270c-e9d3-454b-a5e7-8eeb1786ed75</guid><dc:creator>tech6</dc:creator><description>Current Revision posted to Documents by tech6 on 10/7/2021 1:01:00 AM&lt;br /&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse:collapse;"&gt;&lt;colgroup span="1"&gt;&lt;col span="1" style="width:48pt;" width="64"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:89pt;" width="118"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="2" style="width:164pt;" width="218"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:445pt;" width="593"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;colgroup&gt;&lt;col span="1" style="width:62pt;" width="82"&gt;&lt;/col&gt;&lt;/colgroup&gt; &lt;tbody&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl24" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;width:48pt;" width="64"&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:89pt;border-left:medium none;" width="118"&gt;&lt;strong&gt;Manufacturer&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Application&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:164pt;border-left:medium none;" width="218"&gt;&lt;strong&gt;Block Diagram&amp;nbsp;&amp;nbsp; Title&lt;/strong&gt;&lt;/td&gt;&lt;td class="xl24" style="border:0px solid black;border-collapse:collapse;width:445pt;border-left:medium none;" width="593"&gt;&lt;strong&gt;URL&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height:12.75pt;"&gt;&lt;td class="xl25" height="17" style="border:0px solid black;border-collapse:collapse;height:12.75pt;border-top:medium none;"&gt;Security&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;TI&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Surveillance&lt;/td&gt;&lt;td class="xl25" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;Camera: Surveillance Analog&lt;/td&gt;&lt;td class="xl26" style="border:0px solid black;border-collapse:collapse;border-left:medium none;border-top:medium none;"&gt;&lt;a class="jive-link-external-small" href="http://focus.ti.com/docs/solution/folders/print/408.html" rel="nofollow ugc noopener" target="_blank"&gt;View&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;"&gt;&lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/532x448/__key/communityserver-wikis-components-files/00-00-00-01-34/contentimage_5F00_2050.gif"&gt;&lt;img alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/01/34/contentimage_2050.gif-532x448.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=4NVcX04xC9D9cI7MKk2OiRrDlov0iApDFs2UqpRdooU%3D&amp;amp;se=2026-04-21T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=F8v68ChiNur4GmvzDGk4bg==" style="max-height: 448px;max-width: 532px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: sp:ti, at:blockdiagram, in:security, sp:texas_instruments&lt;/div&gt;
</description></item><item><title>Documents</title><link>https://community.element14.com/technologies/security/w/documents</link><pubDate>Fri, 01 Oct 2021 17:59:46 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:11b5caad-2d9e-46b7-93c0-acea79124431</guid><dc:creator>migration.user</dc:creator><description>Current Revision posted to Documents by migration.user on 10/1/2021 5:59:46 PM&lt;br /&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>