Design Con 2015

Programming Languages & Tools

Programming embedded systems with C, C++, Java, and the tools that improve efficiency.

image

Lauren Ipsum: A Story About Computer Science and Other Improbable Things

In this excerpt from “Lauren Ipsum: A Story About Computer Science and Other Improbable Things”, author Carlos Bueno introduces us to Lauren’s Read More

image

Embedded software development tools - a third way

Colin Walls looks at why embedded software programming differs so much from programming for desktop computers and why there are so many options for Read More

image

Dealing with memory access ordering in complex embedded designs

A look at the various memory access ordering problems that embedded developers may face in their designs and some software coding techniques for more Read More

image

A guide to domain specific modeling - Part 3: Higher abstraction levels

In Part 3 in a series, the authors discuss the ways domain specific modeling raises the level of abstraction beyond programming using concepts and Read More

image

A guide to domain specific modeling - Part 2: Modeling examples

In Part 2 in a series, the authors use the example of mobile phone software design to illustrate the differences between domain specific modeling and Read More

image

A guide to domain specific modeling - Part 1: Code- vs. model-driven design

In Part 1 in a series on domain specific modeling, the authors look at at the differences between code-driven techniques such as DSM vs. more Read More

image

A multitasking kernel in one line of code - almost

If all you want to do is just some basic multithreading or multitasking, here is a guide to how to make judgments on system complexity and some Read More

image

Share and share alike

How shared code in an embedded software application is implemented, illustrated with examples where its use was the solution to intractable problems. Read More

image

A Programmable Interface for Extending Android Security

The design and implementation of a proposed Android Security Modules (ASM) framework, which provides a programmable interface for defining new Read More

image

Safe and secure object-oriented programming with Ada 2012's contracts

Ada 2012’s contract-based OOP approach combines the full expressiveness of the object-oriented methodology with the safety and security that have Read More

image

Do you really need source code?

Do you need the source code for your RTOS or for any other software IP? This article investigates whether source code access makes sense in all Read More

image

Device registers in C

Using C language’s low level capabilities to access registers in peripheral devices should be simple and straight forward, but because no standard Read More

image

Enhancing Security by Diversifying Instruction Sets

How to make network connected processors secure by implementing hardware support for instruction-set randomization (ISR), thus providing a unique Read More

image

Using ARM TrustZone to Build a Trusted Language Runtime for Mobile Apps

Design of the Trusted Language Runtime (TLR), a system that protects the confidentiality and integrity of .NET mobile applications from OS security Read More

image

Effective use of Pthreads in embedded Linux designs: Part 1 – The multitasking paradigm

The author explains how multitasking can be used to make application code more responsive in embedded Linux designs. Read More

image

Software visual analytics for program structure and metrics comprehension

A tool set for visual programming analysis that supports static analysis, quality metrics computation, and clone detection, using table lenses, Read More

prev

1 of 16

next
see all Programming Languages & Tools

Insights view all

  • Currently no items

Collections
Tech Papers
Webinars
Courses

High-Speed Switched Serial Fabrics Improve System Design, 6th Edition

Save & Follow 01 December 2013

This handbook reviews the development of... Read More

see all

Parts Search Datasheets.com

KNOWLEDGE CENTER