Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

2017 Barr Group Embedded Systems Safety & Security Survey

For the third year in a row, Barr Group conducted its annual Embedded Systems Safety & Security Survey of embedded systems designers in an effort to gain valuable insight on the current trends in design practices for both safety-critical and non-safety critical applications. With over 2,000 participants in this year's survey, we were able to gather important and telling data from members of the embedded systems industry in the US & Canada (52%), Europe (27%), Asia (12%), and other parts of the world (9%).

How to Prioritize RTOS Tasks (and Why It Matters)

Presented by Barr Group Principal Engineer Salomon Singer, this webinar examines best practices for assigning fixed priorities to a set of real-time operating systems (RTOS) tasks and interrupt service routines (ISRs). Viewers will learn how and why to use optimal methods to allow a critical set of tasks and interrupt service routines to meet all of their deadlines – even during transient overload periods. Lessons learned can be applied to the development of any priority-based preemptive RTOS, including real-time Linux.

Introduction to Rate Monotonic Scheduling

If you've got a lot of real-time tasks and tight deadlines, what's the best way to prioritize them? A technique called RMA guides the way.

The scheduling algorithm you choose depends on your goals. Different algorithms yield different results. Let's suppose you're given ten jobs and each will take a day to finish. In ten days, you will have all of them done. But what if one or more has a deadline? If the ninth task given to you has a deadline in three days, then doing the tasks in the order you receive them will cause you to miss that deadline.

Security and the IoT

by Andrew Girson

In the most recent DDoS attack, IoT devices such as webcams and DVRs were used to launch an attack on domain service provider, Dyn. The enormity of this event brings to light the importance of securing all devices capable of connecting to the internet. Developers cannot control what viruses or malware may try to attack their systems. However, developers do have a very profound impact on how resilient their products are in the event of an attack.

Pages

What’s happening and how it’s done. Get in the know.

Sign up for our newsletter today!

Receive free how-to articles, industry news, and the latest info on Barr Group webinars and training courses via email. 

To prevent automated spam submissions leave this field empty.