-
Jun- 2018 -25 JuneArticles
All About ESP32 – Part 2
All About ESP32 Parts Part 1: Overview, Tools and blinking LED Part 2: Logging and WiFi Basics Part 3: TCP…
Read More » -
25 JuneArticles
All About ESP32 – Part 1
All About ESP32 Parts Part 1: Overview, Tools and blinking LED Part 2: Logging and WiFi Basics Part 3: TCP…
Read More » -
Apr- 2018 -30 AprilArticles
Embedded C: Struct and Union (Part 2)
The first part of this article has introduced the concepts behind Structs and Unions, and how to define and use…
Read More » -
10 AprilArticles
WiFi-UART Serial Bridge Using ESP8266 or ESP32
Hardware debugging and programming via UART/Serial connection has always been something so vital to hardware developers and even other team…
Read More » -
Mar- 2018 -3 MarchMicros
How to Save Your Circuit from A Capacitor Failure
Multilayer ceramic capacitors are widely used in electronics design. SMD MLCCs are used for example as filter and bypass capacitors.…
Read More » -
Jan- 2018 -19 JanuaryArticles
A Tour Inside Arduino Core: Source Files, How to Make A New Core and Arduino Building Steps
Arduino core is the place where all built-in functions like: pinMode(), digitalWrite(), analogRead(), Serial.begin() ...etc are defined. This article is…
Read More » -
13 JanuaryMicrocontroller
Yield Function, Printable Class and Mapping Arrays : Useful But Unknown Features from Arduino Core
Arduino core, the source code of Arduino API functions and classes, has three useful features that can be used effectively.…
Read More » -
6 JanuaryMicrocontroller
Arduino Trick: How To Share Interrupt Service Routines(ISR) between Libraries and Application
Solving the problem of collision that could occur when a library uses an interrupt service routine (ISR) inside its source…
Read More » -
Dec- 2017 -29 DecemberArticles
Bit-banding Explained: A Key Feature of ARM Cortex-M3/M4
If you have ever taken a part of developing a firmware for a device, then you should have used bit-field…
Read More » -
23 DecemberArticles
An Introduction to Counterfeit ICs: Counterfeiting, Detection and Avoidance Methods
A detailed introduction about technologies used in detection and avoidance of counterfeit ICs with references from more than 8 research…
Read More »