While such warnings from the market analysts are not to be dismissed, a skeptical attitude in general is recommended by Jack Ganssle in “Hope and horror. ” His conclusion: “The standard deviations are so huge, over such short periods of time, that one is inexorably drawn to the conclusion that their reports are meaningless .”
Design article activity on the site this week has included smarter single battery designs, embedded software test automation, and hardware design project management. My Editor's Top Picks are:
To deal with a problem in software certification known as the “Big Freeze” (where all components and tools are frozen in place once a workable design has been achieved) the authors use the “Big Thaw”: continuous monitoring of all activities affected by a change, to keep all artifacts up to date and to preserve the complete system's certifiability.
Developers can overcome the issues of reliable bug reproduction and communication of the target state using virtual platform checkpoints. By such mechanisms, any bug can be captured, communicated, and reproduced any number of times, in any location.
As video architectures evolve, existing dedicated point-to-point architectures are likely to give way to packetized router technologies that resemble standardized, high-bandwidth Ethernet switches used in carrier and telecommunications applications.
Micrium's Matt Gordon provides an introduction to real-time kernels with a particular focus on what embedded developers of medical devices will need to know to begin writing multi-task applications.
Meeting the challenge is to find automated in-target software testing tools that can be easily integrated into developers' embedded development environments.
Erik Welsh, a security architect in TI's Application Specific Products Organization answers the question “I'm not sure I need to secure my embedded design? If I do, how do I begin and which type of security should I enable?”
Best practices in the development and maintenance of application programming interfaces (APIs) dictate that software interfaces do not change once they have been released, with the exception of adding new entry points. So, it's important to design concise, extensible interfaces that can be adapted to survive in an evolving hardware/software ecosystem.
Use of the Common Weakness and Enumeration (CWE) database allows security quality attributes to be specified for a project, allowing them to be measured and verified before an embedded design is put into service, significantly reducing in-the-field exploitation of latent security vulnerabilities
Virtual hardware platforms can be leveraged to obtain significant project and product planning improvements in terms of development time, time-to-market, and development process risk.
Call for Abstracts, ESC Silicon Valley
Click here for Call for Abstracts.
Calling all embedded systems engineers! Teach other engineers about embedded systems design techniques at the Embedded Systems Conference, Silicon Valley 2012. Click here to see the ESC SV 2012 tracks . September 30th is the submission deadline.
ESC Boston 2011 Tracks
System Integration & Test Integrating hardware with software, developing test strategies, managing and executing system test. Track Chair: Bruce Douglass, Chief Evangelist, IBM
Linux, Android, Open-Source Evaluating, understanding and using Embedded Linux, the Android platform and other open-source software. Track Chair: Bill Gatliff, Freelance Consultant
Real-Time Systems Fundamental real-time concepts, selecting and understanding an RTOS, developing and verifying real-time systems. Track Chair: Dave Stewart, Director of Software Engineering, InHand Electronics, Inc.
Project Management Development methodologies, traceable design, developing and managing requirements, agile development, build and change management and other aspects of making a project succeed. Track Chair: Rob Oshana, Director, SW R&D, Networking & Multimedia Group, Freescale
Multicore Understanding, evaluating and programming multiple-processor systems. Track Chair: Robert Cravotta, Principal Analyst, Embedded Insights
Networking & Connectivity Understanding and implementing Internet connections into embedded systems, networks within embedded systems and interfaces such as USB and PCI Express. Track Chair: Christian Legare, Vice President, Micrium
Safety & Security All aspects of developing and testing systems that must be safe to deploy in life-critical applications, and systems that are secure against malicious attacks. Track Chair: Mark Kraeling, Product Manager, GE Transportation
FPGAs in Embedded Systems FPGAs as alternatives to microcontrollers, as signal-processing units, as configurable accelerators, or just as a way of implementing an interface: Selection, design and verification. Understanding and using the FPGA tool chain and how it differs from software development tools. Employing CPUs inside or beside FPGAs. Track Chair: Mike Santarini, Publisher / Sr. Manager Xcell Journal & Editorial Services, Xilinx
Prototyping Embedded Systems Model-based prototyping, use of simulation, selection and use of development kits, FPGAs as prototyping aids. Track Chair: RC Cofer, FAE, Avnet Microcontrollers & SoCs Understanding, selecting and programming microcontrollers; Sorting out the ARM architectures; Peripheral and memory issues in MCUs and SoCs, evaluating an application-specific standard product SoC for a project. Track Chair: Mark Kraeling, Product Manager, GE Transportation Embedded I/O Systems Storage, display and input devices for embedded systems. Track Chair: Larry Mittag, Lead Consultant, Mittag Enterprises
Software Engineering Reviewing programming fundamentals, building programming skills, software architectures, optimization and best practices. Track Chair: Niall Cooling, Director, Feabhas Ltd.
You must verify your email address before signing in. Check your email for your verification email, or enter your email address in the form below to resend the email.
Please confirm the information below before signing in.
{* #socialRegistrationForm *}
{* firstName *}
{* lastName *}
{* displayName *}
{* emailAddress *}
By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.
{* /socialRegistrationForm *}
Almost Done
Please confirm the information below before signing in. Already have an account? Sign In.