Embedded Systems – Getting Started Part 1 – Technical Terms
Here’s the English translation: “When I think of embedded systems, my mind immediately goes back to the 51-pin single-chip microcomputers and Texas Instruments we used in university labs. LPA3399Pro is a visual host developed on the HiSilicon RK3399Pro platform, designed for portable computing hosts that require extensive visual computation. It features an integrated NPU compute unit with 3.0 TOPS of processing power and supports various algorithm models. RV1109 is HiSilicon’s SoC for machine vision within its AI branch, featuring a dedicated NPU.
AI-assisted programming, the evolution of productivity
“GitHub Copilot” was released less than two years ago, and “ChatGPT” has appeared. I don’t fully understand the underlying principles; I’ve been using them for a while. The two tools’ levels of assistance are completely different, but they have both
A Collection of Less Commonly Used Git Commands
Less commonly used, but very useful git commands Reinstalling the system caused changes to folder ownership on Windows. The new version of git has added security checks, prompting an unsafe state and preventing further operation. git config --global --add safe.directory git config --global --add safe.directory "*" New Computer Saving Account Password Information git config --global credential.helper store If the saved information needs to be updated, first clear out the old credentials
Bonded Customs Clearance with Hong Kong Dollar and Renminbi
The Hong Kong Exchange and Clearing (HKEX) announced on December 13th that it will soon launch the “Hong Kong-Renminbi Dual Counter Model” (hereinafter referred to as “Dual Counter Model”) and dual counter broker mechanisms for its securities markets, further supporting RMB-designated listings, trading, and settlement in Hong Kong. Dual-Listing Model and Dual-Listing Broker Mechanism Hong Kong Exchanges and Clearing (HKEX) stated that the registration procedures for these new measures are expected to begin implementation in the first half of 2023, pending regulatory approval and market readiness.
- Compiler - Callback Function - Performance Testing
Last year, an SDK was designed to handle encapsulating certain events and provide a class interface externally. During service initialization, the caller implements the corresponding classes and passes the object pointer to the module. Familiarity with C11 piqued my curiosity, leading me to explore what would happen if these interfaces were implemented using lambda function objects instead of pure virtual function definitions. Compared to the traditional interface definition method, it seemed more flexible.
Host byte, network byte, observe directly through debugger
Throughout the history of computer development, there has been no unified standard for data storage. There are two commonly used rules for byte arrangement. For example, if the low-order bits of a multi-digit number are placed at smaller addresses and the high-order bits are placed at larger addresses, it is referred to as little-endian; conversely, it is called big-endian. In network applications, byte order is a factor that must be considered because different types of machines may adopt different standards, so they are all converted according to the network standard.
Back then, as a young boy, he might have had talent, but it wasn’t common.
It’s my seventh year in the job, and I’m not getting as much positive feedback on the code I write. Let me reflect on how I ended up on this coding
path. People’s choices, especially when they’re younger, tend to follow positive reinforcement more closely – actively avoiding harm and seeking benefit.