/james/notes

Building Embedded Debian for the DE10 Nano

Building Embedded Debian for the DE10 Nano

Instructions for building an a Debian Linux based operating system for the Intel DE10 nano FPGA SoC development board. A mainline version of both u-boot and the Linux kernel are used.

Docker Cheatsheet

Docker Cheatsheet

A short summary of the most common docker commands.

Git Cheatsheet

Git Cheatsheet

Dear future self, if you are reading this it looks like you have forgotten how to do something in Git again... Don't worry, it happens; this page has been created just for you!

Cascaded integrator–comb (CIC) filters

Cascaded integrator–comb (CIC) filters

CIC filters are computationally efficient implementations of narrowband lowpass filters. They are particularly suited for use as an anti-aliasing filter when decimating or an anti-image filter when interpolating. CIC filters are well suited for implementation in FPGAs and ASICs as they only require addition and subtraction operations and not multiplication.

Using Git offline

Using Git offline

Some companies use an isolated network or even the complete lack of a network as a security measure to protect from unauthorized access. Working on these systems can be a struggle but it is still possible, and perhaps even more important, to use a proper version control tool like Git.

Cheap LED Torch Repair

Cheap LED Torch Repair

Attempting to fix a broken torch... Yes really!

Bluetooth controlled LED flashing Frisbee

Bluetooth controlled LED flashing Frisbee

A few friends and I decided it would be a good idea to make a light-up Frisbee so we could continue playing with it after it became dark. I decided to take it a step further and add control of the lights by via Bluetooth!

Using an HD44780 alphanumeric LCD screen

Using an HD44780 alphanumeric LCD screen

The Hitachi HD44780 is an LCD screen controller used to control small alphanumeric LCD displays. This post details how to control these displays.

Website password security

Website password security

There has been a lot in the news recently about websites being ‘hacked’ and login details being stolen. Once a site is breached the method in which the login data was stored becomes very important, and determines how easy it is for the hackers to gain access to people’s passwords.