Cross-Empowerment: Embedded Meets Cloud-Native

Cross-Empowerment: Embedded Meets Cloud-Native

CNCC2023 will be held in Shenyang from October 26 to 28, featuring over 120 technical forums covering more than 30 topics including artificial intelligence, security, computing+, software engineering, education, networking, chips, and cloud computing. This article particularly introduces the【Smart IoT Security】technical forum. The 20th China National Computer Conference (CNCC2023) will be held at the Shenyang … Read more

Understanding The Concept Of Software Defined

Understanding The Concept Of Software Defined

Software is a carrier of knowledge and intelligence, and software restructuring, distribution, dissemination, amplification, and ubiquity of knowledge form the logical basis for the emergence of the “software defined” concept. Essentially, if software can define everything, it is because knowledge is ubiquitous, and software is also ubiquitous, that is, “software ubiquity”. The development process of … Read more

Technical Sharing | ARM Series – Virtualization (Part 2)

Technical Sharing | ARM Series - Virtualization (Part 2)

The previous article introduced the basic concepts of virtualization and hypervisors. To facilitate virtualization, ARM has done a lot of work, primarily defining four Exception Levels (EL). As mentioned in earlier articles about exceptions and privileges, I will elaborate a bit more here. Each exception level is numbered, ranging from EL0 to EL3, with higher … Read more

Step-by-Step Guide: Simulating ARM Systems on x86 with Qemu

Step-by-Step Guide: Simulating ARM Systems on x86 with Qemu

Welcome FPGA engineers to join the official WeChat technical group Clickthe blue textto follow us at FPGA Home – the largest and best FPGA-only engineering community in China Introduction Why simulate an ARM system? What is Qemu? The two modes of Qemu What can Qemu do? Or what is it suitable for? Setting up an … Read more

Galaxy Kirin Embedded Multi-Domain Security Control Technology Enables Feiteng E2000 Heterogeneous Embedded SoC

Galaxy Kirin Embedded Multi-Domain Security Control Technology Enables Feiteng E2000 Heterogeneous Embedded SoC

As a model of domestic operating systems, Kirin Software aligns with the development trend of intelligent manufacturing, focusing on the product development positioning of “secure and trustworthy”, “multi-system integration”, and “new human-computer interaction”. It has built a “strong real-time, rich ecological integration” Galaxy Kirin embedded operating system, recently completing the adaptation for the Feiteng embedded … Read more

Explaining Embedded Security in Simple Terms (2)

Explaining Embedded Security in Simple Terms (2)

(Image from Wikipedia entry Caerlaverock Castle: https://en.wikipedia.org/wiki/Caerlaverock_Castle ) In the previous article, we introduced the difference between the two concepts of “security” in Chinese, namely Security and Safety, in embedded systems—Safety is generally understood as “functional safety,” while Security refers to “information security”—to distinguish it from the more familiar “cyber information security.” In the following … Read more

Linux BSP Practical Course: Virtual Network Device Bridge

Linux BSP Practical Course: Virtual Network Device Bridge

What is a bridge? Creating a bridge Connecting the bridge and veth devices Assigning an IP to the bridge Adding a physical network card to the bridge Does the bridge need to be configured with an IP? Common scenarios for bridges Virtual Machines Docker What is a bridge? First, a bridge is a virtual network … Read more

Exploring ARM Without a Development Board

Exploring ARM Without a Development Board

Yesterday: Daily Update 8/30: Daily Update for 7 Days Will Recently, I have been reviewing knowledge about the ARM architecture and testing with qemu. Today, I will share some thoughts on how to explore ARM without a development board. For specific methods, please refer to links 1-4. In the absence of a development board, you … Read more