Embedded Systems Programming, September 2002 - Embedded.com

Embedded Systems Programming, September 2002

September ESP

VOL. 15 NO. 9
September 2002

Table of Contents

spacer

Cover Story

Securing connected devices
by Steve Kapp
The connected world so many envision won't happen without the secure transfer of information over networks. Here's a breakdown of the existing techniques for making sure our connected devices are safe from Internet outlaws.

The Goertzel algorithm
by Kevin Banks
The Goertzel algorithm can perform tone detection using much less CPU horsepower than the Fast Fourier Transform, but many engineers have never heard of it. This article attempts to change that.

Columns

#include
Bad code

by Michael Barr
Bad programmers seem to exist in every organization. The decisions they make and the code they write create more problems, hassles, and bugs than any interviewer can imagine.

Programmer's Toolbox
My inbox runneth over

by Jack Crenshaw
Jack's last two columns provoked a flood of responses. This month he takes stock and makes plans to add to the toolbox.

Beginner's Corner
Introduction to counter/timers

by Stuart Ball and Michael Barr
Counter/timer hardware is a crucial component of most embedded systems. In some cases a timer is needed to measure elapsed time; in others we want to count or time some external events. Here's a primer on the hardware.

Break Points
Breaking into embedded

by Jack G. Ganssle
A degree doesn't make you an embedded systems engineer. Here are some tips to get you started; if you're already there, they'll help you improve.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.