Analog to digital converter is one of the most important feature of micro controller. here i am explaining about basic of ADC, working and how exactly controller do it. Here i also explaining registers of ADC and attached a sample code.
Analog to digital converter is one of the most important feature of micro controller. here i am explaining about basic of ADC, working and how exactly controller do it. Here i also explaining registers of ADC and attached a sample code.
Before you submitting your application on TIZEN STORE and distribute it to users, you need to confirm if your application is secure and reliable to users.
This slide summarizes some of the tasks you'll need to complete before publishing your application on TIZEN STORE, such as understanding the functional or
legal requirements of the application, and TIZEN STORE policies on content.
Supporting Debian machines for friends and familyFrancois Marier
Many Debian developers find themselves providing some form of technical support to friends and family. Achieving the mystical five nines is well beyond the means of an amateur sysadmin like myself, but giving my dad reliable boxes to use can be achieved without eating all of my free time.
This talk will draw on my experience supporting and maintaining my dad's Debian-based computers. I will briefly describe the hardware setup, introduce some useful packages and share some configuration hints. Areas of focus will include system updates, reliability, monitoring and security.
http://nz2015.mini.debconf.org/Programme/Francois/
Before you submitting your application on TIZEN STORE and distribute it to users, you need to confirm if your application is secure and reliable to users.
This slide summarizes some of the tasks you'll need to complete before publishing your application on TIZEN STORE, such as understanding the functional or
legal requirements of the application, and TIZEN STORE policies on content.
Supporting Debian machines for friends and familyFrancois Marier
Many Debian developers find themselves providing some form of technical support to friends and family. Achieving the mystical five nines is well beyond the means of an amateur sysadmin like myself, but giving my dad reliable boxes to use can be achieved without eating all of my free time.
This talk will draw on my experience supporting and maintaining my dad's Debian-based computers. I will briefly describe the hardware setup, introduce some useful packages and share some configuration hints. Areas of focus will include system updates, reliability, monitoring and security.
http://nz2015.mini.debconf.org/Programme/Francois/
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...Leon Anavi
Presentation from Embedded Linux Conference 2017 in Portland, Oregon (21-23 February) about contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform (GDP).
Industry Insights Common Pitfalls and Key Considerations in Using Software Bi...SZ Lin
Modern regulations and cybersecurity standards globally now require a Software Bill of Materials (SBOM) with specific details. As a result, many companies are adopting SBOMs. Yet, compliance isn't merely technical. It involves process, inter-departmental, and supply chain communication challenges. This session explores these SBOM challenges and provides insights for effective use. Many perceive the SBOM simply as an inventory, neglecting its significance in software management, component tracking, vulnerability assessments, and compliance assurance. While automation streamlines processes, an over-reliance can miss software intricacies; thus, manual reviews remain indispensable. Assuming an SBOM alone ensures a secure software supply chain is a misconception. Though pivotal in risk identification, SBOMs form just a facet of an overarching security strategy, demanding consistent updates to counteract emerging threats. By sidestepping common missteps and adopting best practices, SBOMs can evolve from simple documentation to indispensable tools for software governance and safeguarding.
Manage kernel vulnerabilities in the software development lifecycleSZ Lin
This slide deck aims to introduce the methodology in managing the Linux kernel vulnerabilities in the software development lifecycle (SLDC) to reduce the maintenance effort.
OpenChain, the ISO standard, defines effective open source compliance. This slide deck aims to let people get familiar with OpenChain specification from scratch.
OpenChain - The Industry Standard for Open Source ComplianceSZ Lin
OpenChain is a legal compliance process and standard for the implementation of open source software in the enterprise supply chain. It enables the upstream and downstream of the software supply to follow and share the open source compliance obligations accordingly; moreover, it can also help the enterprises to collaborate with the open source communities positively.
Design, Build,and Maintain the Embedded Linux PlatformSZ Lin
Using open source software to build an embedded Linux platform from scratch.
Building an embedded Linux platform is like a puzzle; placing the suitable software components in the right positions will constitute an optimal platform. However, selecting suitable components is difficult since it depends on different application scenarios. The essential components of an embedded Linux platform include the bootloader, Linux kernel, toolchain, root filesystem; it also needs the tools for image generation, upgrades, and testing. There are abundant resources in the Linux ecosystem with these components and tools; however, selecting the suitable modules and tools is still a key challenge for system designers.
Using open source software to build an industrial grade embedded linux platfo...SZ Lin
Building an embedded Linux platform is like a puzzle; placing the suitable software components in the right positions will constitute an optimal platform. However, selecting suitable components is difficult since it depends on different application scenarios. The essential components of an embedded Linux platform include the bootloader, Linux kernel, toolchain, root filesystem; it also needs the tools for image generation, upgrades, and testing. There are abundant resources in the Linux ecosystem with these components and tools; however, selecting the suitable modules and tools is still a key challenge for system designers.
Take a step forward from user to maintainer or developer in open source secur...SZ Lin
There are a variety of high-quality open source security-related tools available in penetration testing tools, forensics tools, hardening tools, fuzz tools, and network monitoring tools. These tools could be used freely; however, we might face some issues while using it. Therefore, it is essential to have the ability to maintain or develop these tools. In this slide, SZ Lin introduces Security Tools Packaging Team in Debian; this team aims to maintain collaboratively many security tools and merge back tools packaged by security-oriented Debian derivatives (e.g., Kali). Also, SZ shares the experience in discussing and collaborating with open source maintainers and developers in open source security-related tools.
It's a pivotal challenge to update the software in embedded systems due to many restrictions such as unreliable network and power supply, limited bandwidth, harsh environment, etc. This slide aims to provide the background knowledge and the open source tool to achieve the software update in embedded systems.
Introduction to Civil Infrastructure PlatformSZ Lin
CIP is target to establish an open source base layer of industrial grade software to enable the use and implementation of software. This slide will introduce the current status and road map in CIP
Long-term Maintenance Model of Embedded Industrial Linux DistributionSZ Lin
To introduce a robust, secure and reliable platform for the industrial environments is a key challenge; moreover, the platform needs to survive for a long time (more than 10+ years). There are many good solutions aiming to meet these requirements, such as LTSI (Long Term Support Initiative) and CIP (Civil Infrastructure Platform). However, it still needs a high amount of maintenance and development costs in handling SoC/ hardware board in-house patch, non-upstream driver and keep source code consistent with different SoC and platform afterwards.
In this presentation, SZ Lin will introduce how to operate long-term maintenance model of embedded industrial Linux distribution. In addition, he will also address the building, deploying and testing architecture and workflow for producing a robust, secure and reliable platform.
Building, deploying and testing an industrial linux platform @ Open source su...SZ Lin
To introduce a robust, secure and reliable platform for the industrial environments is a key challenge. Therefore, running with the industrial-grade Linux distribution to fulfill the requirements mentioned above is imperative. The Linux distribution includes the Linux kernel and user space. Based on this testing design, the distribution will be built, deployed and tested in the device under automatic test by using continuous integration development practice to withstand the harsh industrial environments. In this presentation, SZ Lin will introduce how the industrial-grade Linux distribution is built, deployed and tested without human intervention, and review the test scope in both Linux kernel and user space. In addition, he will also address the design architecture of 24/7 long-term automated testing in all device under test with each release of new update.
33. debian/copyright
原始碼以及打包的著作權和授權條款資訊
一般都是以 text 檔案格式編寫
新的機器可讀格式
https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Format: https :// www.debian.org/doc/packaging -manuals/copyright -format /1.0/
Upstream -Name: X Solitaire
Source: ftp :// ftp.example.com/pub/games
Files: *
Copyright: Copyright 1998 John Doe <jdoe@example .com >
License: GPL -2+
This program is free software; you can redistribute it
[...]
.
On Debian systems , the full text of the GNU General Public
License version 2 can be found in the file
‘/usr/share/common -licenses/GPL -2’.
Files: debian /*
Copyright: Copyright 1998 Jane Smith <jsmith@example .net >
License:
[LICENSE TEXT]
Debian 套件打包教學指南 33 / 86
44. 認領套件: 範例
From: You <you@yourdomain >
To: 640454 @bugs.debian.org , control@bugs .debian.org
Cc: Francois Marier <francois@debian .org >
Subject: ITA: verbiste -- French conjugator
retitle 640454 ITA: verbiste -- French conjugator
owner 640454 !
thanks
Hi ,
I am using verbiste and I am willing to take care of the package.
Cheers ,
You
有禮貌的連絡上一任維護者 (尤其套件狀態為 RFA 而不是 orphaned)
適時的和上游專案有所連繫
Debian 套件打包教學指南 44 / 86
55. 法律相關
Copyright c 2011–2016 Lucas Nussbaum – lucas@debian.org
This document is free software: you can redistribute it and/or modify it under either
(at your option):
The terms of the GNU General Public License as published by the Free Software
Foundation, either version 3 of the License, or (at your option) any later version.
http://www.gnu.org/licenses/gpl.html
The terms of the Creative Commons Attribution-ShareAlike 3.0 Unported License.
http://creativecommons.org/licenses/by-sa/3.0/
Debian 套件打包教學指南 55 / 86