PinnedChapter 1. Introduction to Communication ProtocolsThis is the first of several chapters from my book Wired Protocols in Embedded Systems that I plan to publish for free. Like any first…Feb 6A response icon1Feb 6A response icon1
PinnedDiving into JTAG. Part 3 — Boundary ScanSo, let’s continue the “Diving into JTAG” series and in part three we will talk about JTAG Boundary-Scan.Oct 29, 2023Oct 29, 2023
PinnedDiving into JTAG protocol. Part 2 — Debugging.In this article, we delve into debugging microcontrollers using JTAG, with a special focus on the ARM Cortex-M architecture and the…Sep 4, 2023Sep 4, 2023
PinnedDiving into JTAG protocol. Part 1 — Overview.The article provides a detailed introduction to the JTAG protocol.Jul 27, 2023A response icon7Jul 27, 2023A response icon7
PinnedQuick look. How arguments are passed into functions.The question is on the knowledge of such a thing as Procedure Call Standard. It differs for different architectures I will consider this…Jul 12, 2023Jul 12, 2023
Basics of Wired Embedded ProtocolsThis chapter is a comprehensive look at the physical-level principles that enable Reliable Embedded System Communication.May 8May 8
🔥 Chapter 3: The 1-Wire Protocol is Now Published! 🔥In this chapter, we dive deep into the 1-Wire interface: ✅ Operating principles ✅ Physical layer and signaling ✅ Timing and data…Feb 19Feb 19
A Dive into JTAG as a Book!I plan to start publishing my book “Wired Protocols in Embedded Systems” this month. However, before doing so, I want to understand all the…Feb 4A response icon2Feb 4A response icon2
Diving into JTAG. Part 6 — SecurityThe JTAG interface is an important tool however, this powerful interface also presents significant security threats.Jul 26, 2024Jul 26, 2024
The GPIO Output Speed: What’s Behind This ParameterIn this article, I attempted to understand the essence of the rather enigmatic GPIO Speed parameter.Jun 10, 2024A response icon2Jun 10, 2024A response icon2