Future Electronics Promotes PCT2075 Thermal Sensors from NXP

Pointe Claire, Quebec (realtimepressrelease) September 16, 2015 – Future Electronics, a global leading distributor of electronic components, promotes the PCT2075 family of thermal sensors from NXP.

The PCT2075 family of thermal sensors serves a wide range of applications, from precision laboratory grade instruments to safety and maintenance monitoring in many industrial systems, as well as wearables. The heart in each case is the sensor IC, which converts local temperatures to digital data sent over the popular I2C bus. Reliable and repeatable temperature measurement is easy to add to any system using a small footprint mixed-signal IC, called a thermal sensor. The I2C bus (which probably already exists in the design), and a little firmware overhead complete the design. Measurements are made automatically using the well-known Band Gap analog circuit and a high resolution analog to digital converter, all integrated on a single die.

With a temperature measurement range of -25°C to +100°C, a resolution of 0.125°C (11-bits), initial accuracy of ±1°C, very low power consumption of 200μA at 5V, and very small package footprint, thermal sensors excel in even the most demanding applications running on battery power. An added bonus is the shutdown mode, which reduces power consumption to just one micro-amp.

At the other end of the spectrum, for large installations such as cloud storage, servers, and telecom equipment, a thermal sensor IC monitors ambient temperatures. Energy conscious systems can measure temperature rises inside cabinets and plenums, anticipate required air flow, and control variable speed fans that provide cooling while conserving energy. Demand for multi-point temperature measurements, requiring more than one thermal sensor IC, are easily accommodated thanks to expanded addressing for the individual thermal sensors. This is important for applications such as LED backlighting in large LCD panels, blade PCBs with multiple high density and hot ICs, and high speed memory arrays found in emerging solid state drives (SSDs).

The latest thermal sensors offer up to 27 unique addresses using just three address pins on these popular 8-pin devices. When size is a premium the tiny TSOP6 package is only 2.9 x 1.5 x 1.0mm, yet offers three unique addresses, allowing interconnection of multiple devices on the same I2C bus. Mixed-signal IC temp sensors have programmable registers for an over-temperature alarm, with a dedicated hardware output. This feature provides a failsafe system shutdown, even if the communication bus or processor monitoring the thermal sensor is disabled as a consequence of the rising temperature fault condition. A programmable ‘queue’ (number of violations before triggering an alarm) stops nuisance tripping of the alarm when temperatures fluctuate around the set trip point.

For more information about NXP, the PCT2075, thermal sensors, sensor ICs, or digital data, visit www.FutureElectronics.com

About Future Electronics

Future Electronics is a global leader in electronics distribution, ranking 3rd in component sales worldwide, with an impressive reputation for developing efficient, comprehensive global supply chain solutions. Founded in 1968, the company has established itself as one of the most innovative organizations in the industry today, with 5,000 employees in 169 offices in 44 countries around the world. Future Electronics is globally integrated, with one worldwide IT infrastructure providing real-time inventory availability and access, while enabling full integration of its operations, sales and marketing worldwide. Offering the highest level of service, the most advanced engineering capabilities and technical solutions through all stages of the design-production cycle, and the largest available-to-sell inventory in the world, Future’s mission is always to Delight the Customer®. For more information, visit www.FutureElectronics.com.

Media Contact

Martin H. Gordon
Director, Corporate Communications
FUTURE ELECTRONICS
www.FutureElectronics.com
514-694-7710 (ext. 2236)
Fax: 514-630-2671
martin.gordon@FutureElectronics.com

###

Edgar Perez, Cybersecurity Boardroom Workshop 2015, on China, Russia, U.S. and North Korea’s Hacking

Edgar Perez, author of Knightmare on Wall Street and The Speed Traders, brings Cybersecurity Boardroom Workshop 2015, seminars in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo that are targeted at board members and senior executives looking for new ways to gain and maintain competitive business advantage in one of the most critical subjects for corporations and governments worldwide.

New York City, NY, USA (September 16, 2015) — Amid the massive Sony Pictures hacking crisis by the end of 2014, Russia offered support to North Korea in a sign that proved relations between the two nations were growing tighter. According to the Russians, the United States failed to offer any form of proof to back its claims against North Korea in the Sony Pictures hacking scandal.

What was China’s take on the situation? “Any civilized world will oppose hacker attacks or terror threats,” said China in a Global Times editorial. “But a movie like The Interview, which makes fun of the leader of an enemy of the U.S., is nothing to be proud of for Hollywood and U.S. society. Americans always believe they can jab at other countries’ leaders just because they are free to criticize or make fun of their own state leaders. Actually, the countries targeted in Hollywood movies are very selective, such as the Cold War era’s Soviet Union, North Korea and Iran.”

Mr. Edgar Perez, a published author, business consultant for private equity and hedge funds and Council Member at the Gerson Lehrman Group, is set to discuss at Cybersecurity Boardroom Workshop 2015 what these four super cyber powers, China, Russia, United States and North Korea, have in common. Mr. Perez is a subject matter expert in cybersecurity, investing, trading, financial regulation (Dodd-Frank Act) and market structure.

Mr. Perez has presented at a number of global conferences, including Cyber Security World Conference 2014 (New York), MIT Sloan Investment Management Conference (Cambridge), Inside Market Data 2013 (Chicago), Institutional Investor’s Global Growth Markets Forum (London), Technical Analysis Society (Singapore), TradeTech Asia (Singapore), Emerging Markets Investments Summit 2013 (Warsaw), CME Group’s Global Financial Leadership Conference 2012 (Naples Beach, FL), Harvard Business School’s Venture Capital & Private Equity Conference (Boston0 High-Frequency Trading Leaders Forum (New York, Chicago), FIXGlobal Face2Face (Seoul) and Private Equity Convention Russia, CIS & Eurasia (London).

Additionally, Mr. Perez has been engaged to present to the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), U.S. Securities and Exchange Commission (Washington DC), Quant Investment & HFT Summit APAC 2012 (Shanghai), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (Shanghai) and Pace University (New York), among other public and private institutions. Mr. Perez’s participation at these forums has been praised by both organizers and attendees:

“It was such a pleasure to have you participate in our conference. The feedback was great and the information you shared with the audience was invaluable. Once again, thank you for your contribution in making the event a success.”

“I would like to show my appreciation on your willingness to share your insights about cybersecurity. We would certainly have you in mind as we move forward to deal with this very important issue.”

ABOUT CYBERSECURITY BOARDROOM WORKSHOP 2015

As cyber attacks become more common, companies are increasingly investing in cyber security protections. But even with the best systems in place, hackers can still easily break into a company’s network if workers aren’t also being diligent about security. Cyber criminals have gotten much better at disguising malicious email to make it look more legitimate. So employees need to be vigilant and ask questions about all of the email they receive that raises even the slightest suspicion, which is most likely not what happened at some of the high-profile cyber security breaches that have been in the headlines recently: Adobe, ADP, E*Trade, Fidelity, Home Depot, JPMorgan Chase, Nasdaq, Neiman Marcus, Sony, Target and Wal-mart.

Cybersecurity Boardroom Workshop 2015 (http://www.cybersecurityboardroomworkshop.com), How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today’s Information Security Challenges, is a must-attend forum for board members, CEOs, CFOs, COOs and executive managers in New York City, London, Dubai, Bangkok, Jakarta, Sydney, Taipei, Seoul and Tokyo who need to become more educated about cyber security in order to ask questions that are strategic yet granular enough to address company specifics. Cybersecurity Boardroom Workshop 2015 is targeted at corporate decision-makers for whom cybersecurity readiness is a relatively new yet critically important area to be intelligently conversant about:

• Understand enterprise cybersecurity and the impact on shareholder value in the short and long term
• Learn how to identify current and future challenges to better enable management to focus on threat reduction and operational reliability
• Identify immediate security needs for the organization with actionable steps for senior management
• Get up to speed on international and domestic approaches and frameworks for effective cybersecurity practices corporate wide

DAY 1: UNDERSTANDING THE CYBER WORLD

Understanding Cybersecurity
• The trillion dollar global cyber risk environment
• The impact of cybersecurity attacks on shareholder value
• The enterprise-wide challenge of protecting the organization’s assets
• Identity theft and the legal implications of data breaches

Social Engineering: The “Weakest Human Link” in Cybersecurity
• The responsibility for cybersecurity in the organization
• Evaluating shortcomings in meeting cybersecurity workforce standards
• Assessing the quality of the cybersecurity workforce
• Assessing the effectiveness of current professionalization tools

Understanding the Cybersecurity Testing Method
• Reconnaissance: How to use tools to find vulnerable systems and devices
• Port scanning: How port information is exposed on computer systems
• Packet sniffing: How to gather information from computer systems
• Password policy and cracking: What to consider when developing password policy
• Vulnerability: How to reduce attacks by enforcing proactive compliance policies

Basics of Security Architecture for Board Members and CXOs
• How architecture defines the structure of a system and makes it explicit
• How the current computer network infrastructure was not designed originally to be secure
• The fundamentals of layered architecture: presentation, business, data, and service layers
• Embedding architecting security into systems from inception

DAY 2: RESPONDING TO THE CYBERSECURITY CHALLENGE

Introduction to NIST’s Cybersecurity Framework
• Identifying and prioritizing opportunities for improvement
• Assessing and accelerating progress toward the target state
• Describing the enterprise’s current and target cybersecurity posture
• Communicating with internal and external stakeholders about cybersecurity risk

The Five Core Functions of NIST’s Cybersecurity Framework
• Identify: Organizational understanding to manage cybersecurity risk
• Detect: How to identify the occurrence of a cybersecurity event
• Protect: Safeguards to ensure delivery of critical infrastructure services
• Respond: Taking action regarding a detected cybersecurity event
• Recover: Maintaining plans for resilience and to restore any impaired capabilities

Introduction to Intelligence-driven Cyber Network Defenses
• How investigations are based upon the scientific method: observing, hypothesis, evaluation, prediction and validation
• How to continuously improve the enterprise process for defending IT assets
• How to leverage cutting edge technology, vigilant people and innovative processes
• How to empower people to resolve the problem with guidance and mentoring

Establishing or Improving a Cybersecurity Program
• Prioritize and scope: Identifying business/mission objectives and high-level priorities
• Create a current profile: Developing a profile by indicating current degree of preparedness
• Conduct a risk assessment: Analyzing the operational environment in order to discern the likelihood of an attack
• Orient: Identifying related systems and assets, regulatory requirements, and risk approach
• Create a target profile: Describing the organization’s desired cybersecurity outcomes
• Determine, analyze, and prioritize gaps: Determining gaps between current and target profiles
• Implement action plan: Deciding which actions to take in regards to identified gaps

Cybersecurity Boardroom Workshop 2015 is specifically designed for boards of directors and CEOs of public and private firms looking for new ways to gain and maintain their competitive advantages. Business executives with responsibility for IT, finance, compliance, risk management and procurement as well as entrepreneurs and innovators are welcome to add their points of view to the debate.

Media Contact:
Julia Petrova
Media Relations Coordinator
The Speed Traders
+1-414-FORUMS0
jpetrova@thespeedtraders.com
http://www.mredgarperez.com

ALIPAC Calls for Vote on License for Illegal Aliens Bill (HB 328)

Americans for Legal Immigration PAC calls for vote on License for Illegal Aliens Bill (HB 328).

Raleigh, NC, USA — Contact: William Gheen | (866) 703-0864 | WilliamG@alipac.us

In a surprising response to rumors that HB 328 sponsor Harry Warren is telling NC lawmakers that he has the votes in place to pass his “licenses for illegal aliens” bill and that a plan is in place to conduct a “low profile” vote before the 2015 legislative sessions ends, ALIPAC is changing position to now call for Speaker Tim Moore to allow a vote!

While remaining fervently opposed to HB 328 and any legislation that provides taxpayer benefits to illegals such as licenses, tuition breaks, and welfare, ALIPAC feels that now is the perfect time for the small group of GOP lawmakers to cast votes with the Democrat allies. This means that now both supporters and opponents are calling for a vote on the bill!

“Illegal immigration is the top issue in America right now and there is a negative coattail effect in place for Republicans like Jeb Bush and NC Rep. Harry Warren due to their support for legislation that illegal aliens and their employers like the NC Farm Bureau want,” said William Gheen, President of ALIPAC.

“We want Speaker Tim Moore to bring HB 328 to the floor immediately so we can get every Republican lawmaker who supports licenses for illegals on the record with an official vote. Since scientific polling data and the recent public referendum defeat for such licenses in Oregon show us public opposition ranges from 64-83%, we feel GOP lawmakers dumb enough to push the Yea button on HB 328 in the run up to the 2016 primaries will be committing political suicide. So our message to Rep. Harry Warren and his GOP lawmakers that plan to use Democrat votes to give licenses to illegals is ‘Make our day’!”

ALIPAC and other NC based organizations have been able to identify 11 GOP lawmakers supporting HB 328 by analyzing videos from committee votes on the bill. That list of names was used to file a NC Republican Party resolution to censure Republican Representatives Harry Warren, Brian Brown, Jeff Collins, Jonathan Jordan, Nelson Dollar, Larry Yarborough, Paul Stam, Charles Jeter, Bob Steinberg, Susan Martin, and Jay Adams for violating the NC GOP platform by voting for drivers licenses/permits for immigrants here unlawfully.

Also, NC GOP and ALIPAC activists are searching for Republican primary challengers for these lawmakers who are hoping to have a sneaky vote on HB 328 before they leave session in a few days or weeks.

While ALIPAC is changing our position to ask that Speaker Moore now bring the bill up for a vote, the organization’s full opposition to HB 328 and licenses for illegals will intensify in the hopes of either defeating the bill now and shutting it down for years, or by achieving the goal of providing NC voters with the full list of elected Republicans in the NC House that agree with Democrats on supporting the bill.

ALIPAC believes that conducting a vote on HB 328 at this time would maximize chances the bill is defeated and maximize public backlash while simultaneously providing GOP voters with a full list of which Republicans in the NC House are disloyal to the public and the GOP Party platform.

Chances are high such a vote could even make licenses for illegal immigrants a topic of debate in the Presidential Elections of 2015-2016!

For more information or to schedule interviews, visit http://www.alipac.us.