Latest posts

The analog to digital converter in the IC-7300 is rumoured to be the LTC2208-14. This converter supports sample rates up to 130 MHz. This implies a max receive frequency in the first Nyquist zone of fs/2=65 MHz. So how can the IC-7300 receive on the 4m band then? Actually this was one of the first questions I had when reading about the IC-7300 and the ADC used. It looked like I was the only one wondering about it and so I moved on, until…. Until I hooked up the antenna on my new location and tuned across the bands, 29 Mhz, 30 , 31. Wow,Read More →

After many years messing around with digital audio, I’m confident to have found the perfect setup. But it’s not an easy setup. The thing is, digital audio is not easy. In the analog world, you connect some equipment and then turn up the volume and put your ear next to the speaker. Hum, noise? Too much? Left and right the same? Depending on volume setting? All easy measurements we have made for decades. Let’s “Fourier Transform” these measurements and start listening for … jitter? harsh sounding music? I bought this beautiful piece of mechanical engineering from Technics some time ago. It’s called a turntable. AddedRead More →

“Do I have to change any settings on my IC-7300 for use with RS-BA1 ?” is an interesting question. My first answer is: “Why would you..”. After reading the comments from others to this question, I decided to write this blog post. First of all, try to understand the Icom wording and terminology. Don’t draw your own conclusions. The most famous example is Icom’s usage of the word REMOTE… “Do I have to change any settings on my IC-7300 for use with RS-BA1 ?” can be answered with no. This implies that: USB is linked to REMOTE, resulting in 19200 maximum baud rate, resulting inRead More →

No, this post is not about schools or universities. This is about SSL/TLS security. In order to secure an internet connection, SSL/TLS can be used. There are many ways to secure a network connection with SSL/TLS. You have ciphers and algorithms for connection setup and key exchange, ciphers for data stream encryption, hashing algorithms and most of those come in variants with different key lengths. So we talk about a Cipher Suites. A single cipher suite for example looks like this: “TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256”. Then there is history and backwards compatibility. Computers gets faster, resulting in secure encryption becoming insecure over time. So some encryption becomes obsolete butRead More →