How-to articles about designing safe, reliable, and secure embedded systems.
Posted: Thu, 2001-02-01 00:00 - Niall Murphy
Printable PDF
When it comes to safety-critical applications, sometimes you have to protect users from the software. And sometimes you have to protect users from themselves.
Posted: Thu, 2001-02-01 00:00 - Nigel Jones
Printable PDF
Products destined for use in multiple countries often require user interfaces that support several human languages. Sloppy string management in your programs could result in unintelligible babble.
Posted: Wed, 2000-11-01 00:00 - Mark Kohler
Network processors are programmable chips like general purpose microprocessors, but are optimized for the packet processing required in network devices. But what are they good for and how do they work?
Posted: Wed, 2000-11-01 00:00 - Niall Murphy
To keep a watchdog timer from resetting your system, you've got to kick it regularly. But that's not all there is to watchdog science. We will examine the use and testing of a watchdog, as well as the integration of a watchdog into a multitasking environment.
Posted: Fri, 2000-09-01 00:00 - Michael Barr
The Internet Protocol (IP) is the glue that holds an internet together. Here's a compact implementation of the IP layer for embedded C programmers.
Posted: Fri, 2000-09-01 00:00 - Michael Barr
Printable PDF
If you are considering using software developed by others, such as Linux, within your embedded system, you'll likely need an intellectual property lawyer to read the license agreements such as GPL. Here's a brief glossary of the licensing terminology that's enough to get you started.
Posted: Sat, 2000-07-01 00:00 - Michael Barr
The address resolution protocol provides a necessary bridge between physical and logical addresses on a TCP/IP network.
Every system on a TCP/IP network has two addresses, one physical and one logical. The address resolution protocol (ARP) provides a necessary bridge between these two addresses.
Posted: Sat, 2000-07-01 00:00 - Michael Barr
If ever there was a piece of embedded software ripe for reuse it's the memory test. This article shows how to test for the most common memory problems with a set of three efficient, portable, public-domain memory test functions.
Posted: Thu, 2000-06-01 00:00 - Michael Barr
Printable PDF
Merely adding a protocol stack and networking API to your software doesn't make you TCP/IP ready. You'll also need to assign your product a MAC address.
Posted: Mon, 2000-05-01 00:00 - Michael Barr
Printable PDF
Embedded software developers operate in a perfect digital environment but must interact with the imperfect analog real world. To do this it's essential to know how to perform calibration of inputs and sensors.
Pages