-
Question from the Customer:
We’re starting to work with a new chip that is based on Intel’s Enhanced SPI (eSPI) specification. We have the Beagle I2C/SPI Analyzer – it looks like we can use that tool for working with this eSPI device. Is that right? Our system’s signal voltage level is 1.8V so...
-
Question from the Customer:
I have a snippet of transaction log from an EEPROM I2C read on the bus. There are some symbols that I do not understand – can you explain them to me?
For example, (2015-12-14 15:46:04) [S] <54:w>* [P]
I guess this means [S] Start condition, write to 0x5...
-
Question from the Customer:
I just started using the Data Center Software with my new Beagle USB 480 Power Protocol Analyzer to analyze the communication from my PC to an MCU using CDC. It works great and it’s easy to use – but I have one question.
I want to analyze timings and delays betwe...
-
Question from the Customer:
I plan to use the Cheetah SPI Host Adapter to generate traffic on a 4-wire Mode 0 SPI bus at 8 MHz. The communication pattern is specialized. The protocol being used is not a full duplex. The master sends 3 bytes on the MOSI and then reads 3 returned bytes on the MI...
-
Question from the Customer:
Our project is to monitor UART data for several hours. We want to integrate that feature in a software product. For that we need an API (C/C++). We have the Beagle USB 480 Protocol Analyzer – and would like to use it to monitor the RS232 bus and capture the UART data....
-
Embedded systems. Often the hardware is designed by one group and then handed to the software team to design the other half of the project. This can lead to assumptions about hardware functionality that may result in a difficult debugging process.
In the article Minimizing risk: embedded soft...
-
Question from the Customer:
I’m using the Beagle USB 480 Protocol Analyzer to troubleshoot an embedded device. What’s the best way to capture the signals? The device is embedded in a system with a complicated cable setup. To avoid signal degradation, my thought is tapping off the D+/D- lines:...
-
-->
The term packet sniffer might sound a little fishy and suspicious, but it isn’t anything like that. In network management, packet sniffing plays a very crucial role. Network managers and technicians use packet sniffers, also called packet analyzers, to diagnose underlying problems in their...
-
-->
[caption id="attachment_16888" align="aligncenter" width="550"] Image by Republica from Pixabay[/caption]
Before we delve into the technicalities of serial communication protocols, let’s talk about communication in general. We already know that communication involves the exchange of i...
-
-->
When thinking about Artificial Intelligence (AI) , most of us probably think of walking robots and talking computers. Thanks to a few science fiction movies, some of us might even relate AI to robots bent on destroying the world.
However, that’s not really the case. Artificial Intellig...