How-to articles about designing safe, reliable, and secure embedded systems.
Posted: Thu, 2017-10-12 09:37 - Dan Smith
Random numbers -- really, truly random numbers -- play a very important role in security. Unfortunately, they are also common sources of non-random behavior, as in the Arizona Lottery drawing.
Posted: Thu, 2017-06-15 09:33 - Nathan Tennies
Several major carmakers are using Android to power their In-Vehicle Infotainment (IVI) and telematics systems. Another option is Automotive-Grade Linux.
Posted: Tue, 2016-11-08 14:21 - Michael Barr
If you've got a lot of real-time tasks and tight deadlines, what's the best way to prioritize them? Rate Monotonic Algorithm provides the optimal technique.
Posted: Tue, 2016-10-25 11:05 - webmaster
In a recent DDoS attack, devices such as webcams and DVRs were used to launch an attack on domain service provider, Dyn. The enormity of this event brings to light the importance of securing all devices capable of connecting to the Internet.
Posted: Thu, 2016-05-05 17:49 - Michael Barr
Too often engineers give up trying to discover the cause of infrequent anomalies--because they can't be easily reproduced in the lab--dismissing them as "user errors" or "glitches." Yet these ghosts in the machine live on. So here's a guide to the most frequent root causes of difficult-to-reproduce firmware bugs.
Posted: Thu, 2016-05-05 17:40 - Michael Barr
Too often engineers give up trying to discover the cause of infrequent anomalies--because they can't be easily reproduced in the lab--dismissing them as "user errors" or "glitches." Yet these ghosts in the machine live on. So here's a guide to the most frequent root causes of difficult-to-reproduce firmware bugs.
Posted: Wed, 2016-05-04 15:48 - Niall Murphy
Whether you're using only static memory, a simple stack, or dynamic allocation on a heap, you have to proceed cautiously. Embedded programmers can't afford to ignore the risks inherent in memory utilization.
Posted: Wed, 2016-05-04 14:27 - Niall Murphy
Unexpected power loss and software bugs can undermine the reliability of non-volatile data. Fortunately, there are various ways to make non-volatile data resilient to such corruption.
Posted: Wed, 2016-05-04 14:24 - Niall Murphy
Product usability problems require the engineer to take off his engineering hat and think more like a user.
Posted: Wed, 2016-05-04 14:21 - Niall Murphy
Proper timing in user interfaces often has more to do with the user's perception than with the actual passage of time.
Pages