Blog

  • Home
  • Embedded Office Blogger

Embedded Office Blog

Embedded Market, Basics, Functional Safety, Embedded Security

Embedded Office Blogger

We - the Embedded Office Blogger - want to share our thoughts and knowledge with you. We are planning to discuss topics out of research, software technology and market trends within the Embedded World.

Have fun while reading our articles.

Update Notification

For an automatic notification on new blog articles, just register your EMail address.

Articles from the Embedded Office Blogger

How to Identify Files when leaving Version Control System

by Matthias Riegel

In a safety critical application, a source file that is used by an application, must be the exact same version that was used during code review and software testing. It must be possible to prove, that this is the case. This article describes the short comings of a widely used approach and present an alternative which allows consistent file identification - even when collaborating with multiple independent companies with multiple independent version control systems (VCS).

Powerful new API perspective in embedded software development

by Embedded Office

Reused code now forms part of today’s embedded software and security systems; well- designed APIs or HALs are essential for businesses to stay ahead. This review provides developers with tips and best practice recommendations for reusing embedded code modules and developing APIs.

Data in Embedded Systems

by Matthias Riegel

In this article, I will show some data structures for storing groups of records. They can all be used in any kind of storage (RAM, NVRAM, Flash, hard disk), but some may be more suitable for some storage devices than others.

Secure Random Numbers

by Matthias Riegel

In the previous article (Simple Random Numbers in Embedded Systems) I described basic algorithms and how to use them building upon it, I give an overview in this article on how pseudo random number generators ...

The Value of IoT

by Andrea Dorn

Everywhere, for the last years, you are faced with the Buzz Words "IoT" - Internet of Things, "industrie 4.0" and "Big Data". They shall express that everything is connected and that there are big amounts of data ...

Simple Random Numbers

by Matthias Riegel

Many problems can be solved by using random numbers. In this article, I describe some basic algorithms, how they need to be initialized and how to use them to produce numbers, suitable for unsecure usage ...

Soft Error Protection

by Michael Hillmann

My estimation for the future is a rising number of projects, where soft errors must be considered - even for non safety critical devices. In this article I give an overview of measures we can insert in our software ...

How to run your RTOS on a chip

by Wolfgang Engelhard

It is commonly perceived that porting a kernel scheduler for a Real-Time Operating System (RTOS) is a quick and easy thing. In this article I try to outline the basic steps to get a pre-emptive scheduler running ...

Migrate from EEPROM to FLASH

by Fridolin Kolb

Almost all applications in embedded systems have the need to store some data in non volatile memory areas in order to have it available after power loss. A lot of those systems until now have used ...

Dynamic Memory in IEC61508 System

by Michael Hillmann

The IEC61508 states, that static memory management is highly recommended. We all are following this recommendation - unless there is a good reason to be more dynamic, right? Then it is time to think about dynamic solutions ...

What our articles will be about

by Andrea Dorn

Today Embedded Systems are an indispensible part. They are used in totally different products in many different branches: in cars and airplanes, in consumer appliances like smart phones and coffee machines, ...