Browse Definitions :
Definition

power-on reset (PoR)

A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power. The PoR system ensures that the microprocessor or microcontroller will start in the same condition every time that it is powered up.

A PoR system can be a peripheral, but in sophisticated processors or controllers the PoR is integrated on the main chip. The most basic PoR system can comprise a resistor and capacitor connected together with values tailored so that, when power is first applied, the capacitor takes a predictable and constant time to charge up. For computer use, however, additional components are often required, including a circuit called a Schmitt trigger. When the PoR circuit is designed, the charge-up time should be adjusted by trial and error so that all of the processor or controller circuits can set themselves to the correct initial values before the computer begins to function.

A well-designed PoR circuit can ensure that when power is applied to a computer, it will start up properly every time (or almost every time), and will never (or rarely) freeze up right away. This feature not only saves the user a great deal of frustration, but it offers a last resort in case of a stubborn system crash: the so-called cold boot, where the computer is completely powered-down for a minute or two, and then powered-up all over again.

 

Continue reading about power-on reset:

Maxim Integrated Products discusses PoR and related functions for processors.

Dr. Howard Johnson outlines common problems that can occur with poorly designed PoR circuits.

HyperPhysics describes how a Schmitt trigger works.

This was last updated in April 2012
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close