-
Recently, the first Digital China Summit was held in Fuzhou, attracting many domestic ICT industry giants to participate in the exhibition. The long queues outside the venue, the noisy and exciting...[Details]
-
Photovoltaic inverters are the core equipment of photovoltaic systems. Their main function is to convert the direct current generated by photovoltaic modules into alternating current that meets the...[Details]
-
1. Principle 1. Infrared emission protocol The infrared transmission protocol has been written in the previous article , so I will not repeat it here. 2. Timer counting and input capture A timer...[Details]
-
The status of interrupts in developing embedded systems is absolutely unquestionable. In the era of C51 microcontrollers, there were only 5 interrupts, including 2 external interrupts, 2 timer/counte...[Details]
-
1. Purpose In actual product release, if the program stored in the MCU Flash is not protected, some illegal companies may read the program in the Flash through an emulator (J-Link, ST-Link, e...[Details]
-
Recently, the " ZTE
incident"
caused by the Sino-US trade war
has caused heated discussions in the electronics industry. It not only reflects that Chinese companies are lagging behind in the...[Details]
-
In Windows environment, the source code is encoded in UTF-8. If the source file created by STM32CubeMX contains Chinese comments, then using STM32CubeMX to regenerate the source code will cause the C...[Details]
-
Artificial intelligence
There is no inherent bias in AI. It does not "think" something is true or false for reasons that cannot be explained by logic. Unfortunately, human bias exists in mach...[Details]
-
Nowadays, everyone is saying that "technology is people-oriented". The essence of the development of technology is to serve the improvement of the quality of life of human beings. Automated driving...[Details]
-
In the project, CPLD is needed to complete part of the algorithm design. The parameters are given by AVR, so the communication between AVR and CPLD needs to be completed. Therefore, a test program is...[Details]
-
As cryptocurrency continues to gain popularity, a technology hidden behind it has attracted more attention from the world, that is the now hotly debated
blockchain
. Let's follow the embedd...[Details]
-
WPG Holdings announced that its subsidiary Youshang has launched a wireless smoke alarm solution based on STM and Semtech . With the development of the national economy and the enhancement of...[Details]
-
Mobile communication resale business means that enterprises can contract part of the communication network usage rights from basic telecommunications operators, repackage them into their own brands...[Details]
-
Site conditions: 1. AD acquisition, DMA transmission; AD is set to single-channel continuous mode, DMA is set to single-shot mode. The upper threshold of the AD analog watchdog setting is less than t...[Details]
-
According to the description provided in the official manual of ST, it is not difficult to see that the ADC analog watchdog is actually that the user can set an upper and lower limit of the AD value...[Details]