First of all, my apologies to our international readers for the local nature of this post. That said, you may still be interested in reading about how, in a nation associated with parties, holidays and the siesta, there are companies offering highly-skilled technical work to young people upon completion of their studies. And more importantly, to know what they think.
Once again Christmas comes to an end and the New Year of 2018 starts to set in. And for those of us within the telecommunications sector it is important to know that this new year 2018 is forecasted to bring us more change, development and larger growth.
The application of power electronics to communications devices has to do with the processing of the electrical input power using semiconductor devices and reactive elements.
Thus, the raw input power is processed according to a control input that conditions the output power. This conditioning can be carried out by DC/DC converters – that convert the DC input voltage into another DC voltage with different magnitude and possibly isolated or even inverted polarity or through AC/DC converters that produce DC voltage from an AC input voltage.
In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that I will try to explain to you but first let’s put ourselves in context.