Using OpenStreetMap Offline
Setting up OpenStreetMap for use as part of an offline application can be a bit confusing. This article covers the full process.
A short summary of the most common docker commands.
Dear future self, if you are reading this it looks like you have forgotten how to do something in Git again... Don't worry, it happens; this page has been created just for you!
Download a local copy of the CentOS 7 repositories
Instructions for downloading a local copy of the CentOS 7 repositories. This is useful when you have an isolated development network or many local clients requiring updates.
Cascaded integrator–comb (CIC) filters
CIC filters are computationally efficient implementations of narrowband lowpass filters. They are particularly suited for use as an anti-aliasing filter when decimating or an anti-image filter when interpolating. CIC filters are well suited for implementation in FPGAs and ASICs as they only require addition and subtraction operations and not multiplication.
Using Git offline
Some companies use an isolated network or even the complete lack of a network as a security measure to protect from unauthorized access. Working on these systems can be a struggle but it is still possible, and perhaps even more important, to use a proper version control tool like Git.
Cheap LED Torch Repair
Attempting to fix a broken torch... Yes really!
Bluetooth controlled LED flashing Frisbee
A few friends and I decided it would be a good idea to make a light-up Frisbee so we could continue playing with it after it became dark. I decided to take it a step further and add control of the lights by via Bluetooth!
Using an HD44780 alphanumeric LCD screen
The Hitachi HD44780 is an LCD screen controller used to control small alphanumeric LCD displays. This post details how to control these displays.
Website password security
There has been a lot in the news recently about websites being ‘hacked’ and login details being stolen. Once a site is breached the method in which the login data was stored becomes very important, and determines how easy it is for the hackers to gain access to people’s passwords.