Blog Posts

Blog Posts

AI Security Camera with IP67 Rating Featuring Rockchip RV1126B or RK3576/J/M SoC for Commercial, Industrial, and Automotive Use – CNX Software

Firefly CQ38W 1126B and CQ38W 3576 AI smart security cameras

Back in January 2024, Firefly released the CT36L AI smart security cameras, built around the Rockchip RV1106G2 SoC with a 0.5 TOPS NPU and Power over Ethernet (PoE) support. Now, Firefly has introduced two new AI cameras, the CQ38W-1126B and CQ38W-3576, which use a similar IP67-rated enclosure but come with much more powerful processors. Both new models no longer support PoE and instead use a 12V DC input, and they also add an RS485 interface. In terms of performance, the CQ38W-1126B is built around the Rockchip RV1126B with a 3 TOPS NPU and can run small multimodal AI models. The higher-end CQ38W-3576 features an octa-core Rockchip RK3576 with a 6 TOPS NPU, making it suitable for more demanding AI workloads, including YOLO and large language models. Both cameras are available with 3MP or 5MP sensors and come in Commercial or Industrial (J-suffix) variants. The 3576 series also adds an Automotive-grade […]

The post IP67-rated AI security camera feature Rockchip RV1126B or RK3576/J/M SoC for commercial, industrial, and automotive applications appeared first on CNX Software – Embedded Systems News.

Five Creative 3D Printing Projects to Improve Your Raspberry Pi Creations

considerably simpler projects available for beginners, yet if you aim to elevate your experimentation, you may want to explore their designs on your own.

Snap-Fit Raspberry Pi Enclosure

Quantum Computing Advancement Ensures Major Decrease in Costs

Caltech and ETH Zurich. Quantum computers are generating significant excitement in the scientific and technological realms primarily due to their prospective capability to surpass conventional computers across various fields. 

Quantum computing has the potential to unveil new pharmaceuticals and therapies (via enhanced protein folding and reaction pathway analysis), financial forecasting models that could transform Wall Street, or energy grid enhancements that might assist in mitigating the worldwide energy dilemma. Alarmingly, they might also enable the decryption of many widely used encryption techniques, which could create vulnerabilities in sectors such as banking and data protection.

The achievement at Caltech indicates that a functional quantum computer constructed with merely 10,000 to 20,000 qubits could be feasible, rather than the millions previously believed necessary. This implies that quantum systems could be simpler to create and less costly to produce. Concurrently, advancements by ETH Zurich researchers illustrate how neutral-atom platforms (the type utilized in the Caltech study) can be extraordinarily resilient to errors, addressing one of the significant challenges that hinder the practical advancement of quantum computers.

Why fewer qubits matter

Qubits serve as the quantum counterpart to bits in traditional computing. However, unlike classical bits that can only exist in one of two states (0 or 1), qubits can be in both states simultaneously. They possess additional properties that may seem magical, including what Albert Einstein described as “spooky action at a distance”: the capability to entangle with another qubit, whereby altering the state of one instantaneously alters the state of the other, even if they may

Frequently Violated Email Etiquette Guidelines

Gmail provides functionalities that simplify the organization of your extensive list of unread messages. However, beyond maintaining a neat inbox, it’s crucial to understand how to compose a well-crafted, professional email – a significant aspect of this is grasping email etiquette.

Similar to the unwritten rules of phone etiquette that people frequently overlook, there are certain expectations when sending an email that can facilitate achieving your goals if adhered to. Most likely, you’ll be reaching out to potential employers or clients via emails that must convey politeness, particularly if you’re making an unsolicited introduction.

Messages intended for friends and family naturally allow for more leniency, yet regardless of your audience, there are optimal practices to effectively convey your message. These practices include tailoring your writing for the recipient, steering clear of any content that might make your email appear suspicious, and recognizing the right moments to delay and follow up.

Crafting Emails for Your Audience