Software safety by the numbers by Jeff Payne When it comes to safety, it's not what you do, but how you do it. The IEC 61508 standard outlines how safety-critical projects should be managed and how to locate, and create, safety-critical code.
Home networking with Zigbee by Mikhail Galeev Will Bluetooth, ZigBee, and 802.11 all have a place in your home? Here's what ZigBee offers for home wireless networking.
Programmer's Toolbox A root-finding algorithm by Jack Crenshaw Crenshaw offers up “The New and Improved World's Best Root Finder” and he's got the code to prove it.
Break Points Solving switch bounce problems by Jack G. Ganssle No chaste unblemished logic signals these; a scope will show the contacts torturously bouncing before settling into a stable state.
Programming Pointers How to enforce write-only access by Dan Saks Classes in C++ can impose semantic constraints on data, turning potential run-time errors into compile-time errors.
#include Think inside the box by Jim Turley A few years ago people would have called it “the changing of the guard”; now we say “regime change.” Whatever you call it, Embedded Systems Programming is in the capable hands of new Editor in Chief Jim Turley.
You must verify your email address before signing in. Check your email for your verification email, or enter your email address in the form below to resend the email.
Please confirm the information below before signing in.
{* #socialRegistrationForm *}
{* firstName *}
{* lastName *}
{* displayName *}
{* emailAddress *}
By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.
{* /socialRegistrationForm *}
Almost Done
Please confirm the information below before signing in. Already have an account? Sign In.