Case Study: Analysis of Typical Cases of False and Fraudulent Inspection Reports

False Inspection Reports The National Market Supervision Administration clearly stipulates in Order No. 39, Article 13 of the “Regulations on the Supervision and Administration of Inspection and Testing Institutions” that inspection and testing institutions must not issue false inspection reports. A report is considered false if it contains any of the following situations, and the … Read more

A C/C++ Embedded Communication Protocol for Multi-Device Communication

A C/C++ Embedded Communication Protocol for Multi-Device Communication

SACP (Snapmaker Advanced Communication Protocol) is the data communication protocol for Snapmaker devices, used for data transmission between the controller, PC (Host), and HMI (Human-Machine Interface). From the design philosophy of this protocol, it can meet the following basic goals: Reliability: Packet header CRC8 check + Checksum data integrity verification Flexibility: Supports request/response mechanism (SACP_ATTR_REQ … Read more

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library Keccak-tiny is a C++ library based on the Keccak algorithm, known for its simplicity and efficiency. The Keccak algorithm is a powerful hashing algorithm widely used in the field of cryptography. Keccak-tiny provides an easy-to-use interface, allowing developers to easily implement secure data hashing in their projects. Next, let’s delve … Read more

Summary of Practical Backup Strategies for Linux System Operations

Summary of Practical Backup Strategies for Linux System Operations

Establishing Summer The following is a practical summary of backups for virtual machines, physical machines, operating systems, applications, files, and databases. It summarizes various dimensions including backup types, technical methods, tool selection, precautions, and recovery strategies, suitable for enterprise-level system maintenance and disaster recovery. 1 Multidimensional Summary of Backup-Related Content 1. Overview of Backups 2. … Read more

Addressing Asynchronous File Writing Issues in SoC Firmware Upgrades

Addressing Asynchronous File Writing Issues in SoC Firmware Upgrades

In industrial production, firmware flashing is a critical step to ensure the normal operation of products. However, in practical applications, due to the asynchronous nature of file writing in the Linux system, it may lead to incomplete firmware flashing, thereby affecting the normal startup and operation of the device. This article will reveal the firmware … Read more

Addressing Asynchronous File Writing Issues in SoC Firmware Upgrades

Addressing Asynchronous File Writing Issues in SoC Firmware Upgrades

Click on the aboveblue text to follow us In industrial production, firmware flashing is a critical step to ensure the normal operation of products. However, in practical applications, due to the asynchronous nature of file writing in the Linux system, it may lead to incomplete firmware flashing, thereby affecting the normal startup and operation of … Read more

Baiwei Showcases Truly Domestic Self-Developed Power eMMC, Accelerating the Implementation of New Power Systems

Baiwei Showcases Truly Domestic Self-Developed Power eMMC, Accelerating the Implementation of New Power Systems

From April 14 to April 16, 2025, the 50th China Electric Instrument and Meter Industry Development Conference and Exhibition opened in Chongqing, where Baiwei Storage showcased its highly reliable and stable power storage solutions for all scenarios, assisting customers in the production implementation of new power system products. Truly Domestic, Fully Self-Developed Power-Specific eMMC Customized … Read more

Security Design Solutions for IoT Applications Driven by PLC Function Block Diagrams

Security Design Solutions for IoT Applications Driven by PLC Function Block Diagrams

Security Design Solutions for IoT Applications Driven by PLC Function Block Diagrams A few days ago, a friend involved in factory automation rushed to me, saying that their temperature control system inexplicably activated in the middle of the night, nearly causing a safety incident. After investigation, it was found that their newly launched remote monitoring … Read more

The Integration of Remote Monitoring and Interconnectivity in Factory Information Systems

The Integration of Remote Monitoring and Interconnectivity in Factory Information Systems

Click the blue text for more exciting information Remote Monitoring Projects That Were Ruined by Industry 4.0 Honestly, I have been in this industry for almost 20 years and have seen too many so-called “factory informationization” projects end up as a pile of scrap metal. Last summer, a paper mill in Zhejiang spent a lot … Read more

The Light of Integrity Illuminates the Path of Growth – A Thematic Class Meeting of Class 2417

The Light of Integrity Illuminates the Path of Growth - A Thematic Class Meeting of Class 2417

On the long journey of growth, what is the most indispensable guidance? The answer is integrity. It is like a bright light that penetrates the fog and illuminates our path forward.In the hall of knowledge, a splendid thematic class meeting competition is in full swing. The students of Class 2417 actively responded and carefully prepared … Read more