It’s long been common wisdom that one of the safest places to keep your cryptocurrency holdings is in a hardware wallet. These are small, portable devices that encrypt your keys and offer a bit ...
Want to hack on brand new 8-bit 1980s hardware? Until recently you needed a time machine, or deep pockets to do this. All that has recently changed with the NABU PC. A retro machine that can be ...
Often, when we think of long-endurance flights, our first thoughts jump to military operations. Big planes with highly-trained crew will fly for long periods, using air-to-air refuelling to stay ...
[Kevin O’Connor] writes to us about his project, can2040 – adding CAN support to the RP2040. The RP2040 doesn’t have a CAN peripheral, but [Kevin] wrote code for the RP2040’s PIO engine ...
This code was created in 2001-2004 when I taught Borland Delphi 3 to myself. It contains many, many global variables, unstructured and undocumented procedural code and bad variable names.
While some of us are still clinging onto our favorite 8-bit microprocessors, ARM announced they will be killing off the 32-bit architecture in 2022 and/or 2023. Over on the GaryExplains YouTube ...
When we think of brain-computer interfaces (BCIs) that use electrodes, we usually think of Utah arrays that are placed directly on the brain during open brain surgery, or with thin electrodes ...
In the six months that have passed after the last USB-C article has been released, I have thought up a bunch of ways that these articles could have been improved. It’s, of course, normal to have ...
In the first M.2 article, I’ve described real-world types and usecases of M.2 devices, so that you don’t get confused when dealing with various cards and ports available out there. I’ve also ...
Robotic mowers are becoming a common sight in some places, enabled by the cost of motors and the needed control electronics being much lower, thanks to the pace of modern engineering. But, in many ...
We just got our hands on some engineering pre-samples of the ESP32-C3 chip and modules, and there’s a lot to like about this chip. The question is what should you compare this to; is it more an ...
Sure it’s common threat assessment. The most common risk associated with a laptop (etc.) being stolen, lost, of inappropriately discarded is covered by bitlocked. For the last usecase bitlocker ...