| BEYOND normal
Volker de Haas started electronics and computing with a KIM1 and machine language in the 70s. Then FORTRAN, PASCAL, BASIC, C, MUMPS. Developed complex digital circuits and analogue electronics for neuroscience labs (and his MD grade). Later: database engineering, C++, C#, industrial hard- and software developer (transport, automotive, automation). Designed and constructed the open-source PLC / IPC "Revolution Pi". Now offering advanced development and exceptional exhibits.
Are you curious about what happened to the Useless Machine 2? We have built an upgrade, the UM3, and installed it in the RE Titan II truck. See which details we have improved.
Today we are starting a new series of articles which we like to call "digital heroes". We talk to people who have contributed and shared for the benefit of all of us, who took a personal risk by investing in visions and new technology. Be inspired!
2 months ago
δon’t panic! Hackers have not attackeδ your Browser’s coδepage.
In part five of this series, I explained the abilities of the DS28E38 chip from Maxim. In part seven, I will demonstrate the evaluation kit. But let's try to get a more general understanding of embedded authentication in today's article.
Are you locked up in Quarantaine with your kids? Want to entertain and at the same time teach them? Here is help for you: My weekly column “SFK” (Science and Fun for Kids) at DesignSpark. I will give you instructions for little tinker projects
Are you struggle to find fun things for your kids, want to entertain and at the same time teach them? Yes, well my weekly column “SFK” (Science and Fun for Kids) at DesignSpark will help to explore science.
Are you at home with your kids? Do you want to entertain and teach them? Here is help for you: My weekly column “SFK” (Science and Fun for Kids) at DesignSpark. I will give you instructions for little tinker projects.
4 months ago
When Pete Wood published his "do-Not-Disturb_Light" last week, he thought it would be a little over-engineered. Well, Pete, I thought I should give you a demonstration of real "over-engineering". So here is my 4.0 version with a 30 $ BOM.
4 months ago
Are you locked up in Quarantine with your kids? Want to entertain and at the same time teach them? Here is help for you: My weekly column “SFK” (Science and Fun for Kids) at DesignSpark. I will give you instructions for little tinker projects.
We are now ready to have a look at embedded solutions for industrial security. Embedded authentication and brand protection can be done with 3mm x 3mm chips, connecting only 3 pins and costing less than 1.50 €. This part explains the Maxim DS28E38.
It’s time to find applications for the concepts we’ve learned in part 1 to 3. Digital signatures and certificates are such applications which are elementary for secure internet connections.
4 months ago
Have you heard security nerds talking about the best hash and thought: Well, they better should stop smoking drugs? Then you should go on reading and learn that hash algorithms are not produced by plants but by sophisticated mathematics.