CATEGORIES
Categorías
The Elite College Students Who Can't Read Books - To read a book in college, it helps to have read a book in high school.
Nicholas Dames has taught Literature Humanities, Columbia University's required greatbooks course, since 1988. He loves the job, but it has changed. Over the past decade, students have become overwhelmed by the reading, College kids have never read everything they're assigned, of course, but this feels different. Dames's students now seem bewildered by the thought of finishing multiple books a semester. His colleagues have noticed the same problem.
LoRaWAN Goes the Distance at Low Power
IoT’s Versatile Protocol for Long-Range, Wide-Area Connectivity
No Blues with Bluetooth!
Part 6: Bluetooth Cybersecurity Basics
Industrial Computers Boost Machine Vision Systems
GPU and CPU Performance Drive Rugged Industrial Platforms
Datasheet: Power Up With DC-DC Converters
Application Types Drive Parameters Beyond Efficiency and Density
As a 'Matter of Fact
Inside atest Home Control Consolidation Attempt via Google Home and Matter-over-Thread
Entertainment On Wheels
In-Dash Panels Control Head Units, Multiple Displays, Cameras and Sensors
Catching Lightning in an IMU
Simulating Diffusion-Limited Aggregation with a Raspberry PI RP2040 MCU
D&D Die Roller with Raspberry PI RP2040
Fantastical Project Built with MCU TFT Display and LVGL Graphics
Microchip Makes it Easier to Build Sophisticated GUIs for MPLAB Harmony v3 and Linux Environments
Designers are incorporating Graphical User Interfaces, or GUIs, into more electronic devices to enhance the user experience by providing intuitive and visually appealing interactions with today's modern applications.
Infineon Introduces Industry's First 20 Gbps Universal USB Peripheral Controller
Infineon Technologies announced the addition of the EZUSBTM FX20 programmable USB peripheral controller to its EZ-USB product family.
Using Amazon Alexa to Control Custom IoT Gadgets
Integrating Voice Recognition for Smart Home Projects
Drowning in Slop - A thriving underground economy is clogging the internet with AI garbage-and it's only going to get worse.
SLOP started seeping into Neil Clarke's life in late 2022. Something strange was happening at Clarkesworld, the magazine. Clarke had founded in 2006 and built into a pillar of the world of speculative fiction. Submissions were increasing rapidly, but “there was something off about them,” he told me recently. He summarized a typical example: “Usually, it begins with the phrase ‘In the year 2250-something’ and then it goes on to say the Earth’s environment is in collapse and there are only three scientists who can save us. Then it describes them in great detail, each one with its own paragraph. And then—they’ve solved it! You know, it skips a major plot element, and the final scene is a celebration out of the ending of Star Wars.” Clarke said he had received “dozens of this story in various incarnations.”
Understanding Mesh Circuits How to Use and Calculate Them
Microcontrollers and other digital systems concern mostly ones and zeros but when connections to the real word are needed it can get messy. Stuart writes about mesh analysis and how mesh circuits can be calculated and applied in practical scenarios.
Intelligent Automotive Battery Sensor
Shunt Resistors and Evaluation Electronics Offer Two Key Components
Datasheet: Very Cool Micro Machines
Smartphone Cooling Rounds Out Parade of Advanced MEMS
Learn to Program MCUs with uLISP
Part 1: Crash Course Offers Insight Into Pioneering Language
Improving Patient Outcomes
Device Technology Advances Medical Practices
Build an Interactive Kinetic Wall
Using a Raspberry Pi 4 and Kinect V1 Camera
Not-so-Great Expectations: Students Are Reading Fewer Books in English Class - Chris Stanislawski didn't read much in his middle school English classes, but it never felt necessary.
Chris Stanislawski didn't read much in his middle school English classes, but it never felt necessary. Students were given detailed chapter summaries for every novel they discussed, and teachers played audio of the books during class.
The Books List Top Picks for Book Club & Beyond - National Book Award finalist Rumaan Alam captivated readers with 2020's startling Leave the World Behind.
The Books List Top Picks for Book Club & Beyond. Thrilling Lit Fiction National Book Award finalist Rumaan Alam captivated readers with 2020's startling Leave the World Behind. In his new novel, Brooke is a young woman living in New York City, working at an aging billionaire's family foundation, yearning to find her purpose.After her employer enlists her help in deciding how to give away his fortune, she becomes entranced by the power of wealth. Suspenseful and deliciously unsettling, Entitlement examines the seductive pull of money and its ability to warp our perspectives.
Retro-style Miniature Sports Scoreboard - RGB LED Matrix and Raspberry Pi Provide In-Game Updates
This Cornell University graduate describes how he built a miniature, retrostyle scoreboard that pulls and displays live college and professional sports scores from the ESPN API-bringing the excitement of being at a sporting event to your living room. Pre-game information, in-game scores, and post-game results are displayed on a built-in PiTFT touchscreen.
No Blues with Bluetooth! GATT Explained - Part 5 - Understanding Higher Protocol Layers Provides Interoperability Help
After exploring low-level layers of Bluetooth Low Energy in previous editions, and establishing connections in Part 4, Robert examines Attribute Protocol and Generic Attribute Profile or GATT in Part 5. These higher layer protocols provide developers with greater opportunity for interoperability with third-party applications or products.
Power Analysis Over JTAG Ports: Hidden Debug Dangers - Block Side-Channel Analysis Attacks
Small changes in the phase of clock signals can encode power leakages. An attacker can use standard interfaces such as the JTAG port to drive clocks across targets, using them as measurement techniques for sidechannel analysis attacks despite limited physical access. This article demonstrates how you can test devices for vulnerability and how to modify devices to prevent attacks.
Mobile APP Development with React Native
This month, Bob continues his series on mobile app development from an embedded designer's perspective. He programs a React Native app and he offers guidelines for picking a tutorial for React Native. He further explores how it handles concurrency and asynchronous programming. Bob expected a few nuances during the process but to say there were more than a few would be an understatement.
The Blues Wireless Notecard-LoRa
After having built a number of Wi-Fi IoT gadgets for the home, Brian became curious to see how LoRaWAN-based IoT devices would work. He decided to investigate the Notecard LoRa IoT modules made by Blues Wireless.
Bringing Cost-Effective, On-Device AI to Home Appliances - Sparse Weights and Interactions Negate GPUs and Cloud Computing
GPU silicon and cloud computing infrastructure are too costly for mass markets devices like refrigerators and washers. By deploying compute resources only to the necessary parts of AI inference, Sparse AI allows product designers to practically incorporate new AI features like natural voice interfaces into their consumer offerings without breaking the bank or electric bill surprises.
Thin Film Transistor LED Displays - Visual I/O
To add a resistive touchscreen on top of a TFT display, Jeff explores the technology offerings and libraries needed to accomplish his task. Calibrating the touchscreen's computed coordinates with the actual pixel coordinates of the display proved difficult with a modular framework but separating functions allows easy expansion.
Exploring Infrasound - Tornado Early Warning Detection Project Using Raspberry Pi Pico and a Python Supervisory Program
Inspired by the possibility of building an early warning system for tornadoes, Dev developed an infrasound detector. Tornadoes are rare in his area, but his detector found other infrasound activity using sensor circuitry based on a Raspberry Pi Pico, combined with a Python supervisory program that stores data on a computer for analysis.
IoT Protection with MCU Security - Ward Off Attacks with Trust Zones, Encryption, Secure Keys and Tamper Detection
Security breaches jumped 107 percent as malevolent forces increasingly focused on IoT devices for side attacks, IP and data theft. Semiconductor vendors supplying on-chip cryptography, memory protection, unclonable technology, random number generation and other measures hope to shut the door on attackers.