AD7840 LC2MOS Complete 14-Bit

Total Page:16

File Type:pdf, Size:1020Kb

AD7840 LC2MOS Complete 14-Bit LC2MOS a Complete 14-Bit DAC AD7840 FEATURES FUNCTIONAL BLOCK DIAGRAM Complete 14-Bit Voltage Output DAC Parallel and Serial Interface Capability 80 dB Signal-to-Noise Ratio Interfaces to High Speed DSP Processors e.g., ADSP-2100, TMS32010, TMS32020 45 ns min WR Pulse Width Low Power – 70 mW typ. Operates from 65 V Supplies GENERAL DESCRIPTION PRODUCT HIGHLIGHTS The AD7840 is a fast, complete 14-bit voltage output D/A con- 1. Complete 14-Bit D/A Function verter. It consists of a 14-bit DAC, 3 V buried Zener reference, The AD7840 provides the complete function for creating ac DAC output amplifier and high speed control logic. signals and dc voltages to 14-bit accuracy. The part features The part features double-buffered interface logic with a 14-bit an on-chip reference, an output buffer amplifier and 14-bit input latch and 14-bit DAC latch. Data is loaded to the input D/A converter. latch in either of two modes, parallel or serial. This data is then 2. Dynamic Specifications for DSP Users transferred to the DAC latch under control of an asynchronous In addition to traditional dc specifications, the AD7840 is LDAC signal. A fast data setup time of 21 ns allows direct specified for ac parameters including signal-to-noise ratio and parallel interfacing to digital signal processors and high speed harmonic distortion. These parameters along with important 16-bit microprocessors. In the serial mode, the maximum serial timing parameters are tested on every device. data clock rate can be as high as 6 MHz. 3. Fast, Versatile Microprocessor Interface The analog output from the AD7840 provides a bipolar output The AD7840 is capable of 14-bit parallel and serial interfac- range of ±3 V. The AD7840 is fully specified for dynamic per- ing. In the parallel mode, data setup times of 21 ns and write formance parameters such as signal-to-noise ratio and harmonic pulse widths of 45 ns make the AD7840 compatible with distortion as well as for traditional dc specifications. Full power modern 16-bit microprocessors and digital signal processors. output signals up to 20 kHz can be created. In the serial mode, the part features a high data transfer rate The AD7840 is fabricated in linear compatible CMOS of 6 MHz. (LC2MOS), an advanced, mixed technology process that com- bines precision bipolar circuits with low power CMOS logic. The part is available in a 24-pin plastic and hermetic dual-in-line package (DIP) and is also packaged in a 28-termi- nal plastic leaded chip carrier (PLCC). REV. B Information furnished by Analog Devices is believed to be accurate and reliable. However, no responsibility is assumed by Analog Devices for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or One Technology Way, P.O. Box 9106, Norwood, MA 02062-9106, U.S.A. otherwise under any patent or patent rights of Analog Devices. Tel: 617/329-4700 Fax: 617/326-8703 (VDD = +5 V 6 5%, VSS = –5 V 6 5%, AGND = DGND = O V, REF IN = +3 V, RL = 2 kV, AD7840–SPECIFICATIONS CL = 100 pF. All specifications TMIN to TMAX unless othewise noted.) Parameter J, A1 K, B1 S1 Units Test Conditions/Comments DYNAMIC PERFORMANCE2 3 Signal to Noise Ratio (SNR) 76 78 76 dB min VOUT = 1 kHz Sine Wave, fSAMPLE = 100 kHz 4 Typically 82 dB at +25°C for 0 < VOUT < 20 kHz Total Harmonic Distortion (THD) –78 –80 –78 dB max VOUT = 1 kHz Sine Wave, fSAMPLE = 100 kHz 4 Typically –84 dB at +25°C for 0 < VOUT < 20 kHz Peak Harmonic or Spurious Noise –78 –80 –78 dB max VOUT = 1 kHz Sine Wave, fSAMPLE = 100 kHz 4 Typically –84 dB at +25°C for 0 < VOUT < 20 kHz DC ACCURACY Resolution 14 14 14 Bits Integral Nonlinearity ±2 ±1 ±2 LSB max Differential Nonlinearity ±0.9 ±0.9 ±0.9 LSB max Guaranteed Monotonic Bipolar Zero Error ±10 ±10 ±10 LSB max Positive Full Scale Error5 ±10 ±10 ±10 LSB max Negative Full Scale Error5 ±10 ±10 ±10 LSB max REFERENCE OUTPUT6 REF OUT @ +25°C 2.99 2.99 2.99 V min 3.01 3.01 3.01 V max REF OUT TC ±60 ±60 ±60 ppm/°C max Reference Load Change (∆REF OUT vs. ∆I) –1 –1 –1 mV max Reference Load Current Change (0–500 µA) REFERENCE INPUT Reference Input Range 2.85 2.85 2.85 V min 3 V ± 5% 3.15 3.15 3.15 V max Input Current 50 50 50 µA max LOGIC INPUTS Input High Voltage, VINH 2.4 2.4 2.4 V min VDD = 5 V ± 5% Input Low Voltage, VINL 0.8 0.8 0.8 V max VDD = 5 V ± 5% Input Current, IIN ±10 ±10 ±10 µA max VIN = 0 V to VDD Input Current (CS Input Only) ±10 ±10 ±10 µA max VIN =VSS to VDD 7 Input Capacitance, CIN 10 10 10 pF max ANALOG OUTPUT Output Voltage Range ±3 ±3 ±3 V nom DC Output Impedance 0.1 0.1 0.1 Ω typ Short-Circuit Current 20 20 20 mA typ AC CHARACTERISTICS7 Voltage Output Settling Time Settling Time to within ±1/2 LSB of Final Value Positive Full-Scale Change 4 4 4 µs max Typically 2 µs Negative Full-Scale Change 4 4 4 µs max Typically 2.5 µs Digital-to-Analog Glitch Impulse 10 10 10 nV secs typ Digital Feedthrough 2 2 2 nV secs typ POWER REQUIREMENTS VDD +5 +5 +5 V nom ±5% for Specified Performance VSS –5 –5 –5 V nom ±5% for Specified Performance IDD 14 14 15 mA max Output Unloaded, SCLK = +5 V. Typically 10 mA ISS 6 6 7 mA max Output Unloaded, SCLK = +5 V. Typically 4 mA Power Dissipation 100 100 110 mW max Typically 70 mW NOTES 1Temperature ranges are as follows: J, K Versions, 0°C to +70°C; A, B Versions, –25°C to +85°C; S Version, –55°C to +125°C. 2 VOUT (pk-pk) = ±3 V 3SNR calculation includes distortion and noise components. 4Using external sample-and-hold (see Testing the AD7840). 5Measured with respect to REF IN and includes bipolar offset error. 6For capacitive loads greater than 50 pF, a series resistor is required (see Internal Reference section). 7Sample tested @ +25°C to ensure compliance. Specifications subject to change without notice. –2– REV. B AD7840 1, 2 TIMING CHARACTERISTICS (VDD = +5 V 6 5%, VSS = –5 V 6 5%, AGND = DGND = 0 V.) Limit at TMIN, TMAX Limit at TMIN, TMAX Parameter (J, K, A, B Versions) (S Version) Units Conditions/Comments t1 0 0 ns min CS to WR Setup Time t2 0 0 ns min CS to WR Hold Time t3 45 50 ns min WR Pulse Width t4 21 28 ns min Data Valid to WR Setup Time t5 10 15 ns min Data Valid to WR Hold Time t6 40 40 ns min LDAC Pulse Width t7 50 50 ns min SYNC to SCLK Falling Edge 3 t8 150 200 ns min SCLK Cycle Time t9 30 40 ns min Data Valid to SCLK Setup Time t10 75 100 ns min Data Valid to SCLK Hold Time t11 75 100 ns min SYNC to SCLK Hold Time NOTES 1Timing specifications in bold print are 100% production tested. All other times are sample tested at +25°C to ensure compliance. All input signals are specified with tr = tf = 5 ns (10% to 90% of 5 V) and timed from a voltage level of 1.6 V. 2See Figures 6 and 8. 3SCLK mark/space ratio is 40/60 to 60/40. Specifications subject to change without notice. ABSOLUTE MAXIMUM RATINGS* ORDERING GUIDE V to AGND . –0.3 V to +7 V DD Integral VSS to AGND . +0.3 V to –7 V Temperature SNR Nonlinearity Package AGND to DGND . –0.3 V to VDD + 0.3 V Model1 Range (dB) (LSB) Option2 VOUT to AGND . VSS to VDD ° ° ± REF OUT to AGND . 0 V to VDD AD7840JN 0 C to +70 C 78 min 2 max N-24 ° ° ± REF IN to AGND . –0.3 V to VDD + 0.3 V AD7840KN 0 C to +70 C 80 min 1 max N-24 ° ° ± Digital Inputs to DGND . –0.3 V to VDD + 0.3 V AD7840JP 0 C to +70 C 78 min 2 max P-28A Operating Temperature Range AD7840KP 0°C to +70°C 80 min ±1 max P-28A Commercial (J, K Versions) . 0°C to +70°C AD7840AQ –25°C to +85°C 78 min ±2 max Q-24 Industrial (A, B Versions) . –25°C to +85°C AD7840ARS –25°C to +85°C 78 min ±2 max RS-24 ° ° ± Extended (S Version) . –55°C to +125°C AD7840BQ –25 C to +85 C 80 min 1 max Q-24 3 ° ° ± Storage Temperature Range . –65°C to +150°C AD7840SQ –55 C to +125 C 78 min 2 max Q-24 Lead Temperature (Soldering, 10 sec) . +300°C NOTES Power Dissipation (Any Package) to +75°C . 450 mW 1To order MIL-STD-883, Class B processed parts, add /883B to part number. Derates above +75°C by . 10 mW/°C Contact your local sales office for military data sheet and availability. 2N = Plastic DIP; P = Plastic Leaded Chip Carrier; Q = Cerdip. *Stresses above those listed under “Absolute Maximum Ratings” may cause 3This grade will be available to /883B processing only.
Recommended publications
  • An Overview of the 50 Most Common Web Scraping Tools
    AN OVERVIEW OF THE 50 MOST COMMON WEB SCRAPING TOOLS WEB SCRAPING IS THE PROCESS OF USING BOTS TO EXTRACT CONTENT AND DATA FROM A WEBSITE. UNLIKE SCREEN SCRAPING, WHICH ONLY COPIES PIXELS DISPLAYED ON SCREEN, WEB SCRAPING EXTRACTS UNDERLYING CODE — AND WITH IT, STORED DATA — AND OUTPUTS THAT INFORMATION INTO A DESIGNATED FILE FORMAT. While legitimate uses cases exist for data harvesting, illegal purposes exist as well, including undercutting prices and theft of copyrighted content. Understanding web scraping bots starts with understanding the diverse and assorted array of web scraping tools and existing platforms. Following is a high-level overview of the 50 most common web scraping tools and platforms currently available. PAGE 1 50 OF THE MOST COMMON WEB SCRAPING TOOLS NAME DESCRIPTION 1 Apache Nutch Apache Nutch is an extensible and scalable open-source web crawler software project. A-Parser is a multithreaded parser of search engines, site assessment services, keywords 2 A-Parser and content. 3 Apify Apify is a Node.js library similar to Scrapy and can be used for scraping libraries in JavaScript. Artoo.js provides script that can be run from your browser’s bookmark bar to scrape a website 4 Artoo.js and return the data in JSON format. Blockspring lets users build visualizations from the most innovative blocks developed 5 Blockspring by engineers within your organization. BotScraper is a tool for advanced web scraping and data extraction services that helps 6 BotScraper organizations from small and medium-sized businesses. Cheerio is a library that parses HTML and XML documents and allows use of jQuery syntax while 7 Cheerio working with the downloaded data.
    [Show full text]
  • Data and Computer Communications (Eighth Edition)
    DATA AND COMPUTER COMMUNICATIONS Eighth Edition William Stallings Upper Saddle River, New Jersey 07458 Library of Congress Cataloging-in-Publication Data on File Vice President and Editorial Director, ECS: Art Editor: Gregory Dulles Marcia J. Horton Director, Image Resource Center: Melinda Reo Executive Editor: Tracy Dunkelberger Manager, Rights and Permissions: Zina Arabia Assistant Editor: Carole Snyder Manager,Visual Research: Beth Brenzel Editorial Assistant: Christianna Lee Manager, Cover Visual Research and Permissions: Executive Managing Editor: Vince O’Brien Karen Sanatar Managing Editor: Camille Trentacoste Manufacturing Manager, ESM: Alexis Heydt-Long Production Editor: Rose Kernan Manufacturing Buyer: Lisa McDowell Director of Creative Services: Paul Belfanti Executive Marketing Manager: Robin O’Brien Creative Director: Juan Lopez Marketing Assistant: Mack Patterson Cover Designer: Bruce Kenselaar Managing Editor,AV Management and Production: Patricia Burns ©2007 Pearson Education, Inc. Pearson Prentice Hall Pearson Education, Inc. Upper Saddle River, NJ 07458 All rights reserved. No part of this book may be reproduced in any form or by any means, without permission in writing from the publisher. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. All other tradmarks or product names are the property of their respective owners. The author and publisher of this book have used their best efforts in preparing this book.These efforts include the development, research, and testing of the theories and programs to determine their effectiveness.The author and publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation contained in this book.The author and publisher shall not be liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or use of these programs.
    [Show full text]
  • Research Data Management Best Practices
    Research Data Management Best Practices Introduction ............................................................................................................................................................................ 2 Planning & Data Management Plans ...................................................................................................................................... 3 Naming and Organizing Your Files .......................................................................................................................................... 6 Choosing File Formats ............................................................................................................................................................. 9 Working with Tabular Data ................................................................................................................................................... 10 Describing Your Data: Data Dictionaries ............................................................................................................................... 12 Describing Your Project: Citation Metadata ......................................................................................................................... 15 Preparing for Storage and Preservation ............................................................................................................................... 17 Choosing a Repository .........................................................................................................................................................
    [Show full text]
  • Data Management, Analysis Tools, and Analysis Mechanics
    Chapter 2 Data Management, Analysis Tools, and Analysis Mechanics This chapter explores different tools and techniques for handling data for research purposes. This chapter assumes that a research problem statement has been formulated, research hypotheses have been stated, data collection planning has been conducted, and data have been collected from various sources (see Volume I for information and details on these phases of research). This chapter discusses how to combine and manage data streams, and how to use data management tools to produce analytical results that are error free and reproducible, once useful data have been obtained to accomplish the overall research goals and objectives. Purpose of Data Management Proper data handling and management is crucial to the success and reproducibility of a statistical analysis. Selection of the appropriate tools and efficient use of these tools can save the researcher numerous hours, and allow other researchers to leverage the products of their work. In addition, as the size of databases in transportation continue to grow, it is becoming increasingly important to invest resources into the management of these data. There are a number of ancillary steps that need to be performed both before and after statistical analysis of data. For example, a database composed of different data streams needs to be matched and integrated into a single database for analysis. In addition, in some cases data must be transformed into the preferred electronic format for a variety of statistical packages. Sometimes, data obtained from “the field” must be cleaned and debugged for input and measurement errors, and reformatted. The following sections discuss considerations for developing an overall data collection, handling, and management plan, and tools necessary for successful implementation of that plan.
    [Show full text]
  • Computer Files & Data Storage
    STORAGE & FILE CONCEPTS, UTILITIES (Pages 6, 150-158 - Discovering Computers & Microsoft Office 2010) I. Computer files – data, information or instructions residing on secondary storage are stored in the form of a file. A. Software files are also called program files. Program files (instructions) are created by a computer programmer and generally cannot be modified by a user. It’s important that we not move or delete program files because your computer requires them to perform operations. Program files are also referred to as “executables”. 1. You can identify a program file by its extension:“.EXE”, “.COM”, “.BAT”, “.DLL”, “.SYS”, or “.INI” (there are others) or a distinct program icon. B. Data files - when you select a “save” option while using an application program, you are in essence creating a data file. Users create data files. 1. File naming conventions refer to the guidelines followed while assigning file names and will vary with the operating system and application in use (see figure 4-1). File names in Windows 7 may be up to 255 characters, you're not allowed to use reserved characters or certain reserved words. File extensions are used to identify the application that was used to create the file and format data in a manner recognized by the source application used to create it. FALL 2012 1 II. Selecting secondary storage media A. There are three type of technologies for storage devices: magnetic, optical, & solid state, there are advantages & disadvantages between them. When selecting a secondary storage device, certain factors should be considered: 1. Capacity - the capacity of computer storage is expressed in bytes.
    [Show full text]
  • File Format Guidelines for Management and Long-Term Retention of Electronic Records
    FILE FORMAT GUIDELINES FOR MANAGEMENT AND LONG-TERM RETENTION OF ELECTRONIC RECORDS 9/10/2012 State Archives of North Carolina File Format Guidelines for Management and Long-Term Retention of Electronic records Table of Contents 1. GUIDELINES AND RECOMMENDATIONS .................................................................................. 3 2. DESCRIPTION OF FORMATS RECOMMENDED FOR LONG-TERM RETENTION ......................... 7 2.1 Word Processing Documents ...................................................................................................................... 7 2.1.1 PDF/A-1a (.pdf) (ISO 19005-1 compliant PDF/A) ........................................................................ 7 2.1.2 OpenDocument Text (.odt) ................................................................................................................... 3 2.1.3 Special Note on Google Docs™ .......................................................................................................... 4 2.2 Plain Text Documents ................................................................................................................................... 5 2.2.1 Plain Text (.txt) US-ASCII or UTF-8 encoding ................................................................................... 6 2.2.2 Comma-separated file (.csv) US-ASCII or UTF-8 encoding ........................................................... 7 2.2.3 Tab-delimited file (.txt) US-ASCII or UTF-8 encoding .................................................................... 8 2.3
    [Show full text]
  • Overview of Data Format, Data Model and Procedural Metadata to Support Iot
    Overview of data format, data model and procedural metadata to support IoT Nakyoung Kim Scattered IoT ecosystem • Service and application–dedicated data formats & models • Data formats and models have been developed to suit the specific requirements of each industry, service, and application. • The current scattered-data ecosystem has been established, and it requires high costs to process and manage data for service and application convergence. • Needs of data integration and aggregation • The boundaries between industries are gradually crumbling down due to domain convergence. • For the future convergence markets of IoT and smart city, data integration and aggregation are important. Application-dedicated data management 2 Interoperability through the Web • Bridging the data • Data formats and models have been settled in the current forms over a period to resolve issues at each moment and fit case-by-case requirements. • Therefore, it is hardly possible to reformulate or replace the existing data formats and models. • Bridging the data formats and models is feasible. • Connecting via Web • A semantic information space for heterogeneous data, platforms, and application domains, Web can provide technologies that support the interoperability of IoT. • Enhanced interoperability in IoT ecosystems can be fulfilled with the concepts of Web of Things. Web Data-driven data management 3 Annotation and Microdata format • Structured data for annotation • To exploit what the Web offers, IoT data first needs to be structured and annotated just like how the other data is handled on the Web. • Microdata format • Microdata formats refer structured data markups describing and embedding the meanings of resources on the Web along with their properties and relationships.
    [Show full text]
  • Modular Data Storage with Anvil
    Modular Data Storage with Anvil Mike Mammarella Shant Hovsepian Eddie Kohler UCLA UCLA UCLA/Meraki [email protected] [email protected] [email protected] http://www.read.cs.ucla.edu/anvil/ ABSTRACT age strategies and behaviors. We intend Anvil configura- Databases have achieved orders-of-magnitude performance tions to serve as single-machine back-end storage layers for improvements by changing the layout of stored data – for databases and other structured data management systems. instance, by arranging data in columns or compressing it be- The basic Anvil abstraction is the dTable, an abstract key- fore storage. These improvements have been implemented value store. Some dTables communicate directly with sta- in monolithic new engines, however, making it difficult to ble storage, while others layer above storage dTables, trans- experiment with feature combinations or extensions. We forming their contents. dTables can represent row stores present Anvil, a modular and extensible toolkit for build- and column stores, but their fine-grained modularity of- ing database back ends. Anvil’s storage modules, called dTa- fers database designers more possibilities. For example, a bles, have much finer granularity than prior work. For ex- typical Anvil configuration splits a single “table” into sev- ample, some dTables specialize in writing data, while oth- eral distinct dTables, including a log to absorb writes and ers provide optimized read-only formats. This specialization read-optimized structures to satisfy uncached queries. This makes both kinds of dTable simple to write and understand. split introduces opportunities for clean extensibility – for Unifying dTables implement more comprehensive function- example, we present a Bloom filter dTable that can slot ality by layering over other dTables – for instance, building a above read-optimized stores and improve the performance read/write store from read-only tables and a writable journal, of nonexistent key lookup.
    [Show full text]
  • Mapping Approaches to Data and Data Flows
    www.oecd.org/innovation www.oecd.org/trade MAPPING APPROACHES @OECDinnovation @OECDtrade TO DATA AND [email protected] DATA FLOWS [email protected] Report for the G20 Digital Economy Task Force SAUDI ARABIA, 2020 This document was prepared by the Organisation for Economic Co-operation and Development (OECD) Directorate for Science, Technology and Innovation (STI) and Trade and Agriculture Directorate (TAD), as an input for the discussions in the G20 Digital Economy Task Force in 2020, under the auspices of the G20 Saudi Arabia Presidency in 2020. The opinions expressed and arguments employed herein do not necessarily represent the official views of the member countries of the OECD or the G20. This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Cover image: Jason Leung on Unsplash. © OECD 2020 The use of this work, whether digital or print, is governed by the Terms and Conditions to be found at http://www.oecd.org/termsandconditions. 2 © OECD 2020 Contents Executive Summary 4 1. Motivation and aim of the work 6 2. Context and scene setting 7 2.1. Data is an increasingly critical resource, generating benefits across society 7 2.2. The effective use of data boosts productivity and enables economic activity across all sectors8 2.3. The data ecosystem value chain is global 9 2.4. Data sharing enables increasing returns to scale and scope 10 2.5. Measures that affect data sharing and cross-border data flows can restrict the functioning of markets 11 2.6.
    [Show full text]
  • Understanding the I2C Bus
    Application Report SLVA704–June 2015 Understanding the I2C Bus Jonathan Valdez, Jared Becker ABSTRACT The I2C bus is a very popular and powerful bus used for communication between a master (or multiple masters) and a single or multiple slave devices. Figure 1 illustrates how many different peripherals may share a bus which is connected to a processor through only 2 wires, which is one of the largest benefits that the I2C bus can give when compared to other interfaces. This application note is aimed at helping users understand how the I2C bus works. Figure 1 shows a typical I2C bus for an embedded system, where multiple slave devices are used. The microcontroller represents the I2C master, and controls the IO expanders, various sensors, EEPROM, ADCs/DACs, and much more. All of which are controlled with only 2 pins from the master. VCC VCC VCC I/O LED I/O Expanders Blinkers Expanders RP SCL0 Hub Repeater SDA0 Buffer SCL VCC Microcontroller Multiplexer / or Processor SDA Switch SCL1 SDA1 Data Temperature EEPROM LCD Driver Converter Sensor Figure 1. Example I2C Bus Trademarks SLVA704–June 2015 Understanding the I2C Bus 1 Submit Documentation Feedback Copyright © 2015, Texas Instruments Incorporated Electrical Characteristics www.ti.com 1 Electrical Characteristics I2C uses an open-drain/open-collector with an input buffer on the same line, which allows a single data line to be used for bidirectional data flow. 1.1 Open-Drain for Bidirectional Communication Open-drain refers to a type of output which can either pull the bus down to a voltage (ground, in most cases), or "release" the bus and let it be pulled up by a pull-up resistor.
    [Show full text]
  • Data Protection Lifecycle
    Data Protection LifeCycle JHSPH is committed to protecting all data that has been created by its faculty, staff, students, collaborators; and all data that has been entrusted to us. Data owners are accountable for the protection of data. Responsibility can be delegated to custodians, but accountability remains with data owners. Protection strategies should address the Integrity, Availability, and Confidentiality of data. Data protection must extend to every stage of the data lifecycle. Risks associated with data cannot be eliminated. The goal of data protection is to mitigate risk using appropriate controls until the risk has been reduced to a level acceptable to the data owner. While developing a data security plans, please reference the “Data LifeCycle Key Considerations” to ensure that all aspects of data protection have been addressed. Several of the Data Lifecycle Key Considerations reference a common set of reasonable controls. To avoid duplication, these recommended minimum controls are listed here… Reasonable Controls • Data is encrypted in transit (Here is a great explanation of how encryption works… https://www.youtube.com/watch?v=ZghMPWGXexs) • Data is encrypted while “at rest” (on a storage device) • Security patches and updates are routinely applied to computing and storage devices. • Devices have access controls so that… o Each person accessing the device is uniquely identified (username) o Passwords are sufficiently strong to prevent compromise o All access is logged and recorded o Unauthorized access is prevented o Approved access list is reviewed periodically for correctness Data Lifecycle Key Considerations Collection • Ensure that there are reasonable controls on the device(s) that are being used for collection or data origination.
    [Show full text]
  • Data Mining for the Masses
    Data Mining for the Masses Dr. Matthew North A Global Text Project Book This book is available on Amazon.com. © 2012 Dr. Matthew A. North This book is licensed under a Creative Commons Attribution 3.0 License All rights reserved. ISBN: 0615684378 ISBN-13: 978-0615684376 ii DEDICATION This book is gratefully dedicated to Dr. Charles Hannon, who gave me the chance to become a college professor and then challenged me to learn how to teach data mining to the masses. iii iv Data Mining for the Masses Table of Contents Dedication ....................................................................................................................................................... iii Table of Contents ............................................................................................................................................ v Acknowledgements ........................................................................................................................................ xi SECTION ONE: Data Mining Basics ......................................................................................................... 1 Chapter One: Introduction to Data Mining and CRISP-DM .................................................................. 3 Introduction ................................................................................................................................................. 3 A Note About Tools .................................................................................................................................
    [Show full text]