Embedded Systems – Getting Started Part 1 – Technical Terms
Here’s the English translation:
“When I think of embedded systems, my mind immediately goes back to the 51-pin single-chip microcomputers and Texas Instruments we used in university labs.
LPA3399Pro is a visual host developed on the HiSilicon RK3399Pro platform, designed for portable computing hosts that require extensive visual computation. It features an integrated NPU compute unit with 3.0 TOPS of processing power and supports various algorithm models.
RV1109 is HiSilicon’s SoC for machine vision within its AI branch, featuring a dedicated NPU.
AI-assisted programming, the evolution of productivity
“GitHub Copilot” was released less than two years ago, and “ChatGPT” has appeared. I don’t fully understand the underlying principles; I’ve been using them for a while. The two tools’ levels of assistance are completely different, but they have both
A Collection of Less Commonly Used Git Commands
Less commonly used, but very useful git commands
Reinstalling the system caused changes to folder ownership on Windows. The new version of git has added security checks, prompting an unsafe state and preventing further operation.
git config --global --add safe.directory git config --global --add safe.directory "*" New Computer Saving Account Password Information git config --global credential.helper store If the saved information needs to be updated, first clear out the old credentials
- Compiler
- Callback Function
- Performance Testing
Last year, an SDK was designed to handle encapsulating certain events and provide a class interface externally. During service initialization, the caller implements the corresponding classes and passes the object pointer to the module. Familiarity with C11 piqued my curiosity, leading me to explore what would happen if these interfaces were implemented using lambda function objects instead of pure virtual function definitions. Compared to the traditional interface definition method, it seemed more flexible.
Host byte, network byte, observe directly through debugger
Throughout the history of computer development, there has been no unified standard for data storage. There are two commonly used rules for byte arrangement. For example, if the low-order bits of a multi-digit number are placed at smaller addresses and the high-order bits are placed at larger addresses, it is referred to as little-endian; conversely, it is called big-endian. In network applications, byte order is a factor that must be considered because different types of machines may adopt different standards, so they are all converted according to the network standard.
C11: sleep for vs yield
While reviewing the code, std::this_thread::yield() suddenly popped into my view, a syntax sugar from C11 that I’d used quite a bit, but hadn’t noticed before.
Linux Server, Reset MySQL Password
I had an idle Tencent Cloud server that was expiring at the end of the year and I hadn’t planned to renew it. So, I decided to deploy a MySQL database for development purposes. When reinstalling the system, I wanted to save time and chose a third-party image provided by Tencent Cloud, which already had MySQL installed. I thought the system should include a Readme file or similar documentation explaining the password and deployment path.
A Brief Overview of Automated Testing
The investment in testing for financial trading systems far exceeded that of other systems, with tedious test steps repeatedly executed and a low ROI. As projects and personnel changed, uncontrollable factors inevitably introduced, a common situation being the modification of a field output from Interface A impacting the results of Interface B. With each version release, risk also accumulated.
Theoretical Knowledge How to Measure the Value of Automation? An automation testing ROI = (Manual Execution Time) * (Number of Runs) / (Development Cost + Maintenance Cost) Which Features Should Be Automated?