Embedded - Home

Highlights

5 Steps To Designing An Embedded Software Architecture, Step 2

In this continuation of the article series, we explore the second step to designing an embedded software architecture: identifying and tracing data assets. Designing an…

Programming embedded systems: Functions and the Stack

Have you seen your stack lately? I mean, have you really looked at the stack memory and observed what exactly happens when a function is…

How to quickly evaluate data converters

This article explains how to record a macro and how to use it within Python and MATLAB environments to automate certain evaluation tasks without having…

Struggles and suggestions with master/slave terminology

Removing the use of Master/Slave terminology across the industry is doable, but I suspect it will take a long time and generate a lot of…

Implementing functionally safe RTD systems: RTD design

This first article in a two-part series on implementing functionally safe RTD systems discusses resistance temperature detector (RTD) circuit design and safety certification considerations. In…

Design

Nvidia DPU brings hardware-based zero trust security

Securing V2X automotive communications

Advanced vehicle-to-everything (V2X) communication systems introduce more surface area for cyberattacks and damage the existing ecosystem, which can lead to serious repercussions. Cybersecurity is becoming…

TinyML-based endpoint devices face unique security threats

As TinyML adoption continues to grow, it’s important to be aware of various attacks that can negatively impact your TinyML development. With endpoint AI (or…

Why the ‘product security executive’ now needs to be recognized

It’s time to establish the product security executive, or PSE, as its own category of security officer and give these professionals the recognition they deserve.

Development

How to quickly evaluate data converters

Implementing functionally safe RTD systems: RTD design

This first article in a two-part series on implementing functionally safe RTD systems discusses resistance temperature detector (RTD) circuit design and safety certification considerations. In…

Designing a power-saving solenoid driver: Design concepts

The most common approach to drive a solenoid is to apply the required voltage in the solenoid coil but using a current regulated driver to…

A few rules for better measurements with your oscilloscope or digitizer

With all these advanced analysis capabilities available with modern oscilloscopes and digitizers, it is sometimes hard to remember some very old and simple rules that…

Advertisement

Industry

Edge, zonal or central: getting the balance right for ADAS architectures

Radar detection software improves accuracy using less compute power

Teraki’s ML-detection software on Infineon Technologies’ microcontrollers delivers more points per object, leading to less false positives and increased safety compared to other radar processing techniques, such as CFAR.

Solar’s role in EV charging

Solar power may provide the means to offload stress from existing power grid infrastructure as EV adoption steadily grows. The world is experiencing an enormous…

Power supply design for primary cell powered patient monitors

Remote patient monitoring patches help doctors provide better care, but they pose challenges for power supply designers who must balance system performance and battery life…

Trends

Struggles and suggestions with master/slave terminology

Technical challenges curb expectations for 5G

When reading about 5G, it can appear to be the cure to all of our problems. But the technology may not live up to the…

7 ways to make the most of remote working

The pearls and pitfalls of working from home as an engineer. One of the many side products of the COVID-19 pandemic has been the emergence…

AI applications build on key memory and interconnect technologies

These technologies promise to enable new advancements and use cases for AI by significantly improving computing performance and efficiency. Steven Woo In our tech-dominated world,…