On April 17, the U.S. Department of Commerce suddenly announced that it would completely ban U.S. companies from
selling parts, goods, software and technology
to
ZTE
within 7 years. This als...[Details]
1. Purpose In actual product release, if the program stored in the MCU Flash is not protected, some illegal companies may read the program in the Flash through an emulator (J-Link, ST-Link, e...[Details]
When the domestic discussion about "ZTE being banned" was hot, Alibaba officially announced the acquisition of chip supplier
Zhongtianwei
, but the investment amount was not disclosed. At t...[Details]
Nowadays, everyone is saying that "technology is people-oriented". The essence of the development of technology is to serve the improvement of the quality of life of human beings. Automated driving...[Details]
This routine is also a classic routine on the development board. I modified the framework of the program to make it more suitable for future calls. The specific 4*4 keyboard scanning principle is rel...[Details]
At the beginning of the new year of 2018, after the release of the national photovoltaic policy, we found that the state’s support for village-level poverty alleviation power stations has not weake...[Details]
I believe that many netizens who have watched "Interstellar" will remember this classic line, "Do not go gentle into this good night, nor let passion be drowned by the gloom of twilight". Different...[Details]
*This article is based on the author's report at the "Embedded System Association Theme Discussion (Total 22nd) - Current Situation and Development Prospects of Internet of Things Operating Systems...[Details]
In recent years, in order to meet the needs of social development, more and more companies have entered the fields of smart phones, artificial intelligence,
VR
, AR, etc. After seeing the d...[Details]
In January, Android 7.0 Marshmallow surpassed Lollipop three years ago to become the second most used Android version in the world. According to
the latest data from
Google
, a snapshot of d...[Details]
STM32 has 2 watchdogs: independent watchdog and window watchdog. Independent watchdog IWDG: A system fault detector that is independent of the system and is not affected by the system because it has ...[Details]
The calculation formula of the watchdog feeding time (watchdog overflow time) is: Tout=((4*2^prer)*rlr)/40 Tout is the watchdog overflow time (in ms), prer is the watchdog clock prescaler value (...[Details]
Ouster LiDAR OS-1 (left) and OS-2 (center) Velodyne invented the modern 3D LiDAR scanner in the mid-2000s, but in recent years conventional wisdom has held that Velodyne’s design — 64 lasers mounted...[Details]
Here is the temperature added in the previous chapter The above figure is the temperature calculation formula: where Vsense is the ADC value collected from the temperature channel. The stm32f407 ...[Details]
Table of contents: 1 Overview 2: Common interrupt functions 3: PWM output 1 Overview In development, timers are widely used, which can be simply summarized into three aspects: 1.1: Application of ...[Details]