|Click here for digital edition.|
“Tracing requirements through to object code verification”
By Mark Pitchford, LDRA
Verifying object code can mean the difference between success and failure, quality and crap. But skipping the step because a standard doesn’t require it or because it theoretically eats into profits is a surprisingly common practice. The author postulates that this practice is not only shortsighted but no longer valid.
“Troubleshooting real-time software issues using a logic analyzer”
By David B. Stewart, PhD, InHand Electronics, Inc.
This logic analyzer technique is a power-tool for the embedded software engineer's toolbox.
“Manage multiple processes and processors in a deterministic multicore design”
By Chris Main, TenAsys Corporation
How should processes running on different RTOSes communicate in systems with more than one operating system? The author suggests you can manage inter-process communications with global-object networking.
By Colin Holland
“Safety threats: from satellites to pods in you pocket”
DARPA's High-Assurance Cyber Military Systems program is looking for a synthesizer capable of producing a machine-checkable proof that the generated code satisfies functional specifications as well as security and safety policies.
This month's content is provided courtesy of Embedded.com and Embedded Systems Design magazine.
See more content from Embedded Systems Design and Embedded Systems Programming magazines in the magazine archive.
This material was first printed in Embedded Systems Design magazine.
Sign up for subscriptions and newsletters.
Copyright © 2012
UBM–All rights reserved.