Dev Tools and OS

  • Imperas riscvOVPsim brings free, open-source modeling and simulation to RISC-V ecosystem

    Imperas Software has released the RISC-V Open Virtual Platform Simulator (riscvOVPsim), a free simulator and open-source model of a single-core RISC-V CPU.

    Read Article
  • What They Didn’t Teach You in Engineering School About Pressure Drop

    What They Didn’t Teach You in Engineering School About Pressure Drop

    A guide to understanding how to solve even complex pressure related design issues.

    Download PDF
  • Practical Guide to Maximizing DC Measurement Performance

    Practical Guide to Maximizing DC Measurement Performance

    The various methods covered in this guide can help you achieve greater accuracy in your applications requiring DC measurements.

    Download PDF
  • Why You Didn't Get the RTOS Business
    & Other Software Stories

    By Colin Walls
  • Linux, RISC-V Foundations to Collaborate on Open Architectures

    In addition to tools, services, and training support, the Linux Foundation will provide neutral governance, best practices for open source development, community outreach, marketing, and legal advice.

    Read Article
  • OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol

    The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).

    Read Article
  • NASA InSight Lands Safely on Mars with VxWorks

    NASA InSight Lands Safely on Mars with VxWorks

    VxWorks was responsible for complex automated maneuvers of the InSight landing craft, providing system-wide determinism and synchronization through a Red Planet atmosphere 100x thinner than Earth's.

    Read Article
  • Embedded Insiders: Is There Really an Engineering Shortage, and Why?

    Embedded Insiders: Is There Really an Engineering Shortage, and Why?

    Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technology firms now gobbling up as much engineering talent as possible for IT and enterprise...

    Read Article
  • Finding Concurrency Errors with GrammaTech Static Analysis

    Finding Concurrency Errors with GrammaTech Static Analysis

    Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.

    Download PDF
  • Making Safety-Critical Software Development Affordable with Static Analysis

    Making Safety-Critical Software Development Affordable with Static Analysis

    Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe

    Download PDF
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Protecting Against Tainted Data in Embedded Apps with Static Analysis

    This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...

    Download PDF
  • Containerized Linux: The Secret to IoT Security

    Containerized Linux: The Secret to IoT Security

    A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.

    Download PDF
  • Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs6:22

    Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs

    Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi

    Watch Video
  • Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon5:59

    Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon

    The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,

    Watch Video
  • So, How Secure are your Coding Practices? Ask AdaCore5:53

    So, How Secure are your Coding Practices? Ask AdaCore

    Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve

    Watch Video
  • IAR Systems leads the way for secure IoT development based on Arm TrustZone and Arm Cortex-M

    The leading independent Arm tools provider enables companies to go to market early with robust, secure IoT products

    Read Article
  • Connect to an Embedded Web Server with Automated Certificate Management

    Don't let your users get caught in a security web. Make it easy for them.

    Read Article
  • Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC

    Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC

    On February 21st, 2017, Xilinx® announced the introduction of a new technology called RFSoC with the rather dramatic headline “Xilinx Unveils Disruptive Integration and Architectural Breakthrough for

    Download PDF
  • Neural Network Optimization with Sparse Computing and Facebook Glow

    There are 27 different types of neural networks. The number of neural network types has increased as engineers and data scientists seek out optimized implementations of AI for use cases.

    Read Article
  • Riding the Deep Learning Wave: Simulations Enabling Software Engineers to Generate Data Needed to Train Neural Networks

    Riding the Deep Learning Wave: Simulations Enabling Software Engineers to Generate Data Needed to Train Neural Networks

    The vision of software solutions evolving from exposure to data has some compelling aspects: training by example offers the possibility of a true mass manufacturing technique for software.

    Read Article
  • Significance of Certified Ethical Hacker (CEH) Training and Certification

    In order to save your company from online hackers, the significance of becoming a Certified Ethical Hacker (CEH) is gaining momentum around the world.

    Read Article
  • loading
    Loading More...