Embedded Systems Programming, April 2003 - Embedded.com

Embedded Systems Programming, April 2003

April ESP

VOL. 16 NO. 4
April 2003

Table of Contents

spacer

Cover Story

Diagnostics for design validation
by Steve Babin
Whether you are testing a new microcontroller or an ASIC, post-silicon design validation is a must. HereĆ­s a look at diagnostic tests and techniques.

Conference Preview

Ultrawideband and WiMedia
by John Canosa
Short-range wireless communications via emerging ultrawideband techniques are hot. Here's a look at the latest developments, as they'll be presented at the Embedded Systems Conference later this month.

Special Report

Special Report: Micro Minis
by Jack G. Ganssle
With chip companies packing more peripherals and functionality into 8- and 16-bit processors, it's almost impossible to keep track of what's out there. But don't worry; we got someone to do the work for you. Here's Jack Ganssle on the current state of the art.

Columns

#include
Designer's bookshelf

by Michael Barr
For too long, hardware design has been a black art. Here's a new book that may change that.

Programmer's Toolbox
Get more yet

by Jack Crenshaw
Jack's Rosetta Stone equation leads to some useful predictive techniques. Here's one based on difference tables.

Beginner's Corner
Introduction to preemptive multitasking

by Jean Labrosse and Michael Barr
Most real-time operating systems employ preemptive schedulers. This primer on preemption also looks at the kind of multitasking it enables.

Programming Pointers
Well-behaved enumerations

by Dan Saks
Whether you use enumerations to count up or down, be careful at the boundaries. Values just beyond the ends must have valid representation

Break Points
Beyond functional firmware

by Jack G. Ganssle
Because even bad code can work, you've got to evaluate your firmware vigorously. Jack lists the best criteria and how to meet them.

New Products

Internet Appliance Design Tools

Software Tools

Hardware Tools

Chips

Boards

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.