Dev Tools and OS

  • Keeping complexity in check with embedded code generators

    Keeping complexity in check with embedded code generators

    Raspberry Pi and today's MCUs have much in common as they seek to reduce complexity for developers. Though their intricacies can become a challenge, modern embedded code generators can help.

    Read Article
  • Fundamentals of Building a Test System – Selecting Instrumentation

    Fundamentals of Building a Test System – Selecting Instrumentation

    Learn about the major categories of instruments available, and common selection criteria to help you narrow in on the best choice for your application.

    Download PDF
  • Kotlin, a new language for Android

    Kotlin, a new language for Android

    Kotlin is a newer programming language for Android. It appears to have been adopted by Google.

    Read Article
  • Back to the Future with the Millennium Bug

    Everyone over 30 or so can remember the “Y2K problem,” also known as the “Millennium bug.” As the end of the century and millennium loomed, there was widespread concern that chaos would ensue.

    Read Article
  • The impacts of early-stage design

    Early-stage design decisions have big impacts, especially those that involve layout, material choice, make-or-buy, initial subsystems definition, and...

    Read Article
  • Bulls, bears, and bunnies: The 6th RISC-V Workshop in Shanghai

    Bulls, bears, and bunnies: The 6th RISC-V Workshop in Shanghai

    Last week, I attended the 6th RISC-V Workshop, held in Shanghai. RISC-V is, of course, the open-source processor architecture invented and introduced...

    Read Article
  • Performance drop without discards

    We took a lot of performance measurements while working on a recent discards whitepaper "Improving Flash Media Lifetime and Performance with Discards"...

    Read Article
  • Dig deep into safety-critical code testing with coverage analysis

    For safety-critical code, functional testing that ensures that the application does what it is supposed to do and does those things correctly just scr...

    Read Article
  • Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    The risks of incorporating 3rd-party code & best practices for securing it.

    Download PDF
  • Hardware emulation: Tool of choice for verification and validation

    Design in any discipline - electronics, mechanical, aerospace, etc. - begins with a specification that captures what the end product should do and ess...

    Read Article
  • Game-changing audio technology brings professional sound to mobile and IoT applications

    Game-changing audio technology brings professional sound to mobile and IoT applications

    Waves Audio began 25 years ago as an R&D company serving the professional audio industry. They were the first to bring digital equalizer technology to...

    Read Article
  • CES 2017: From competition to coopetition - Standards groups work toward unifying IoT with dotdot

    I'm sure you've all seen the following comic before and chuckled when thinking about the proliferation of Internet of Things (IoT) standards. Until re...

    Read Article
  • Connecting wireless sensor nodes to the cloud with the Thunderboard Sense kit

    Connecting wireless sensor nodes to the cloud with the Thunderboard Sense kit

    If you're developing an application that transfers wireless sensor node data to the cloud, the complexity of wireless sensor design may present challe...

    Read Article
  • It's time to get over the vi addiction

    Hi, my name is Arthur (Hello Arthur!) and I'm a vi addict. It's been six days since I last used vi. Last week, I had a list I was trying to move from...

    Read Article
  • Analytics "at" the edge, on the device, in real time

    Analytics "at" the edge, on the device, in real time

    It takes time for information to travel from the edge of the Internet of Things (IoT) to the cloud and back. That's what happens every time a node tak...

    Read Article
  • Testing is the only way to assure that code is correct

    Testing is the only way to assure that code is correct

    As systems in industrial, automotive, medical, and energy markets that involve human life and limb are connected to the IoT, the stakes get higher and...

    Read Article
  • Functional Safety - Protect your environment, people, products and company brand from the start

    Functional Safety - Protect your environment, people, products and company brand from the start

    Design for safety. Seems like a no-brainer, doesn't it? If that's the case, why do so many designers push functional safety down from the top of the p...

    Read Article
  • FPGA-based prototyping revisited - Cadence Protium S1 Platform

    FPGA-based prototyping revisited - Cadence Protium S1 Platform

    The IoT spans multiple application domains and the requirements for design teams can be vastly different depending on the end application area. While...

    Read Article
  • What it takes for your Linux-based IoT designs to succeed in mass-production IoT

    In Greek mythology, the story of Charon, the ferryman, goes like this: to cross the river Styx to the underworld, souls needed Charon's guidance. Thos...

    Read Article
  • Legacy network boot Preboot eXecution Environment

    Preboot eXecution Environment (PXE) is a protocol that boots computers without using a hard drive or an operating system. PXE boot runs over a network...

    Read Article
  • loading
    Loading More...