Embedded Software // Articles
Refine Embedded Software articles:
embedded linux embedded software software analysis rtos real-time operating system embedded real-time operating system arinc 653 embedded os embedded real time embedded realtime lynxos osek psos qnx os real time real time embedded software real time embedded system real time embedded systems real time kernel real time operating system real time operating systems real time os real time system real time systems real-time operating systems realtime realtime operating system realtime os rtxc threadx vrtx vx works vxworks vxworks os interface designer embedded gui nucleus ment1 meng static analysis embedded system programming java tools embedded software system embedded software systems embedded software company embedded software companies embedded software development embedded software architecture embedded software design embedded programming embedded software engineering embedded java java software software debug switch management execution sequencing runtime memory cyassl windows ce c windowsce ce download windows embedded ce for windowsce microsoft windows ce.net microsoft windows ce.net 4.2 microsoft.windowsce opennetcf.windowsce or windowsce pocket pc database pocket pc development programming windows embedded ce 6.0 public.windowsce virtual pc/windows ce win ce wince window ce 5 window ce 6 window ce download window ce.net windows ce.forms windows ce.net windows ce.net 5 windows embedded windows embedded ce windows embedded ce 6 windows embedded ce 6.0 windows mobile windows mobile ce windows mobile software windows pocket windows xp ce windows xpe windowsce 4.2 windowsce device windowsce software windowsce.forms windowsce.net embedded: dev tools and os -
Security→ November 2012
Distributed software execution using a Trusted Execution Environment
read more]
More sensitive commerce- and entertainment-related credentials assets are finding their way onto devices with open operating systems, creating a wider array of attack vectors. The prevalent approach to mitigate this threat is based on hardware isolation of an execution environment for sensitive info... [Signal processing→ January/February 2017Building highly parallel rugged computers for electronic warfare
read more]
Electronic warfare (EW) systems are among the most challenging embedded systems to design and deploy. Not only do they require voracious amounts of signal processing, they also require more mundane server-style processing (for signal library maintenance, data logging, etc.) and are often packaged in... [Avionics Safety Certification→ March 2013Cache partitioning increases CPU utilization for safety-critical multicore applications
Operating systems→ Spring 2013Operating system developments impact critical systems
Signal processing→ January/February 2017FPGA coprocessors for low-power adaptive beamforming in hybrid VPX HPEC systems
read more]
Beamforming techniques have become very important in the fields of radar, electronic warfare (EW), sonar, wireless communication, and medical imaging. These enable continuous formation of beams from array antennas (or array transducers) towards a tracked target - or a moving user in the case of wire... [Multicore→ February/March 2014Demystifying multi-core architecture for avionics
read more]
Avionics system architects making design decisions today are often frustrated by an expensive problem - having to perform a substantial redesign because an existing system lacked the flexibility required to support an update. Such inflexible barriers in the design process may be overcome by using ne... [artificial intelligence→ January/February 2019Stacked, high-speed DDR4 and DDR5 memory useful in harsh battle environments
read more]
Today's autonomous and artificial intelligence (AI) military systems process an ever-growing amount of sensor data. To handle this extreme workload, system architects must design boards using the fastest FPGA [field-programmable gate array] devices and Intel multicore processors. These devices canno... [Virtualization→ October 2012Virtualization: A real weapon for embedded software development
Integrated development environment→ June 2014Embedded IDEs shaped by Internet of Things, DIY, virtualization, multicore
read more]
Embedded systems are becoming smaller, more consolidated, and contain a mix of real-time processing with network connectivity and graphics capabilities. This trend in embedded development is facilitated by multicore processors and virtualization capabilities that enable real-time OS environments to ... [Verification→ August 2014Conquering concurrency bugs in multicore systems
DO-178C→ July 2015White Paper: Solving DO-178C design challenges with SCADE model-based tools
read more]
Embedded software in today's aircraft is becoming continually larger and more complex. A sizable part of this software is safety critical. In order to reach the required level of quality, verification of such software applications requires an effort on the verification side that may sometimes reach ... [Choosing the right processor→ February 2013Choosing a processor is a multifaceted process
Multicore→ June 2013ARM's big.LITTLE architecture aims to satisfy the hunger for power - Q&A with John Goodacre, Director, Technology and Systems, ARM Processor Division
read more]
As smartphone and tablet users continue to demand much higher performance to keep pace with an ever-more-connected lifestyle, the demand for extended battery life naturally follows. However, one way ARM is meeting the challenge is with its big.LITTLE multicore-based architecture, which aims to boost... [Design considerations→ September 2012eLearning Course: Security Boot Camp
read more]
Denial of service attacks. Data leaks. System crashes. Malicious code execution. These are all examples of the impact of exploited vulnerabilities in your code. As a diligent and security-conscious software developer, you need to arm yourself with the knowledge to defend your code against these issu... [Single Board Computers→ Summer 2013VITA technology SBCs of the future
read more]
Almost every backplane-based embedded computing system in existence has a board that is considered the controller. Over the years, the industry has often used the term Single Board Computer (SBC) to describe that board. The term is used because all of the basic computer functionality is integrated o... [Future Airborne Capability Environment→ April/May 2013Full speed ahead: FACE initiative fosters reuse, cuts costs and delivery time of military avionics systems
read more]
The Future Airborne Capability Environment (FACE) Technical Standard aims to hasten delivery and cut costs of military avionics systems via a modular architecture, data models, standard interfaces, and conformance criteria that meld to enable reusable software components and a common operating envir... [signal processing→ January 2014Using high-performance SRAMs to increase performance in DSP-intensive applications
read more]
Military applications such as radar, Software Defined Radio (SDR), smart munitions and target detection systems, Electronic Warfare (EW), aircraft imaging, and many more benefit from Digital Signal Processors (DSPs). DSPs accelerate performance using deterministic processing and have capabilities th... [Multiple Independent Levels of Security (MILS)→ September 2012Adding real-time Java to a MILS operating system
read more]
A Multiple Independent Levels of Security (MILS) operating system supports secure deployment of multiple applications with each application representing data belonging to a different security realm. Writing software for deployment with a MILS operating system requires attention to details that are n... [Security→ June 2015The case for security in Linux-based IoT devices
read more]
Are you among the OEM and system integrators adding Internet connectivity and services into devices that were not originally intended to do so? If you are, then you know that by connecting these products to the Internet, customers are discovering new forms of revenue and, in some cases, entirely new... [Security→ June 20155 steps to secure embedded software
read more]
"When we do cybersecurity assessments, we get in almost every time. In our view, [the agencies] didn't need to wait until DOT&E found security issues, [the flaws] could have been found during software development." – Dr J. Michael Gilmore, Director of Operational Test and Evaluation, Office of the S... [Security→ February 2014White Paper: POS Security That Pays Its Own Way: The rising costs of POS system management and security
read more]
Retailers are experiencing runaway spending on securing and managing their POS systems, in large part because organized criminals around the world have discovered that point-of-sale (POS) systems are low-risk, high-reward targets that are often poorly defended. The 2012 Verizon Data Breach Investiga... [software development→ April/May 2014Software development tools as force multipliers
Intel architecture and AdvancedTCA→ Winter E-letter 2012Rock solid Xeon performance takes Sandy Bridge(s) to the server room
COM Express→ September 2015White Paper: Rugged by Design -- Helping Push the Environmental Limits of Defense Systems
Signal processing→ January 2014Embedded signal processing enables advanced radars and EW systems with low latency
read more]
Modern radar and electronic warfare designs rely heavily on embedded computing systems that leverage high-speed commercial processors and FPGAs to find every target or signal and enable the warfighter to respond in real time. Meanwhile, signal processing system designers are cutting costs by using p... [EDA→ May 2014Reducing bugs in hardware design with EDA and formal verification technology
Radar→ Jan/Feb 2013Radar's brave new world: OSA
Static code analysis→ May 2015White Paper: Challenging Some of the Myths About Static Code Analysis
read more]
Why Static Code Analysis? Static code analysis, or SCA, can be described as the analysis of whole-program source code without the execution of that program. A number of interpretations and even misconceptions about this technology and how it impacts or benefits you, the developer, have emerged over ... [embedded software→ October 2015Encrypting storage in small form factors
Design security→ November 2012Embedded lockdown: Designing secure devices
embedded hardware→ Nov/Dec 2015More efficient power supplies using health monitoring
CompactPCI Serial→ Fall 2015Further developments in CompactPCI Serial
Big 3 Executive Interview→ 2012 Resource GuideBig 3 Executive Interview - John Chilton, Senior VP, Marketing and Strategic Development, Synopsys, Inc.