As you may know, you can record what happens on a serial line with the Yocto-RS232. It's very useful when you want to perform reverse engineering on an unknown communication protocol. Until now, the method that allowed us to do this was a bit rough. This week, we present a new, more user-friendly, API function as well as a small application that uses it.
A large majority of Yoctopuce modules are sensors, or are used to interface external sensors. Therefore the programming interface to access the sensors and retrieve their measures is among the most developed and continues to be enriched following the requests that we receive. To help you find the method that suits you best, today we offer a synthesis of everything at your disposal.
A few weeks ago, a customer contacted us to know how to upload data from Yoctopuce sensors on a sensetecnic FRED cloud service. We have published a new firmware to make the YoctoHubs compatible with this service. So this week, we will take this opportunity to explain how to use a Yoctopuce sensor in FRED.
This mishap may have happened to you: comfortably lounging at home, you surf on your smart phone. Suddenly, nothing anymore: you have reached the limit of your data subscription. After a short investigation, you notice that your DSL router crashed a few days before and that, meanwhile, you used your phone GSM connection while you thought you were on the Wifi. If only you could have noticed earlier... You are lucky, this week we just happen to discuss a very easy DIY project to signal network failures as soon as possible.
1 ... 10 ... 20 ... 30 ... 40 ... 50 ... 58 59 60 61 62 63 64 65 66 67 68 ... 70 ... 80 ... 90 ... 100 ... 110 ... 120 ... 127