• Home
  • Embedded Office Blogger

Embedded Office Blog

Embedded Market, Basics, Functional Safety, Embedded Security

Embedded Office Blogger

We - the Embedded Office Blogger - want to share our thoughts and knowledge with you. We are planning to discuss topics out of research, software technology and market trends within the Embedded World.

Have fun while reading our articles.

Update Notification

For an automatic notification on new blog articles, just register your EMail address.

Articles from the Embedded Office Blogger

The Importance of Version Control, Git and GitHub

by Embedded Office

Once denigrated by opponents, version control has risen in importance and become essential in embedded software for safety-critical industries and applications. Why is this so? And what of the tools to manage versions, such as Git and GitHub? Here, we summarise the background and look at secure, collaborative solutions for developer teams and organisations, whether small or large.

Power Optimisation in SoCs (Systems on Chips)

by Embedded Office

Review why power optimisation is set to become so critical in SoCs, even though new methodologies to analyse processor heating vs performance at the design stage are still under development. What of future power management trends in embedded circuits – and how will the IEEE P2415 and Portable Stimulus standards work?

Safety and Security in Upcoming Flight Control Systems

by Embedded Office

Safety is essential in critical applications such as fly-by-wire aircraft controls and new WAIC (Wireless Avionics Intra-Communications) technology, but industry experience and news reports show that security threats and hacking are all too frequent. How can embedded hardware and software engineers develop and design safe and secure control systems to protect aeroplanes, passengers and crew?

Secure Embedded Systems in Industrial Settings

by Embedded Office

Small microcontrollers are widespread but are not typically equipped to deal with security challenges and threats from cyber-attacks and hackers. So how can embedded code programmers, software developers and hardware engineers achieve an ideal of server level security in such small systems? Here, we examine these crucial topics and some ways to approach the security issues involved in embedded systems and miniature controllers.

How to Identify Files when leaving Version Control System

by Matthias Riegel

In a safety critical application, a source file that is used by an application, must be the exact same version that was used during code review and software testing. It must be possible to prove, that this is the case. This article describes the short comings of a widely used approach and present an alternative which allows consistent file identification - even when collaborating with multiple independent companies with multiple independent version control systems (VCS).

Powerful new API perspective in embedded software development

by Embedded Office

Reused code now forms part of today’s embedded software and security systems; well- designed APIs or HALs are essential for businesses to stay ahead. This review provides developers with tips and best practice recommendations for reusing embedded code modules and developing APIs.

Data in Embedded Systems

by Matthias Riegel

In this article, I will show some data structures for storing groups of records. They can all be used in any kind of storage (RAM, NVRAM, Flash, hard disk), but some may be more suitable for some storage devices than others.

Secure Random Numbers

by Matthias Riegel

In the previous article (Simple Random Numbers in Embedded Systems) I described basic algorithms and how to use them building upon it, I give an overview in this article on how pseudo random number generators ...

The Value of IoT

by Andrea Dorn

Everywhere, for the last years, you are faced with the Buzz Words "IoT" - Internet of Things, "industrie 4.0" and "Big Data". They shall express that everything is connected and that there are big amounts of data ...

Simple Random Numbers

by Matthias Riegel

Many problems can be solved by using random numbers. In this article, I describe some basic algorithms, how they need to be initialized and how to use them to produce numbers, suitable for unsecure usage ...

Soft Error Protection

by Michael Hillmann

My estimation for the future is a rising number of projects, where soft errors must be considered - even for non safety critical devices. In this article I give an overview of measures we can insert in our software ...

How to run your RTOS on a chip

by Wolfgang Engelhard

It is commonly perceived that porting a kernel scheduler for a Real-Time Operating System (RTOS) is a quick and easy thing. In this article I try to outline the basic steps to get a pre-emptive scheduler running ...

Migrate from EEPROM to FLASH

by Fridolin Kolb

Almost all applications in embedded systems have the need to store some data in non volatile memory areas in order to have it available after power loss. A lot of those systems until now have used ...

Dynamic Memory in IEC61508 System

by Michael Hillmann

The IEC61508 states, that static memory management is highly recommended. We all are following this recommendation - unless there is a good reason to be more dynamic, right? Then it is time to think about dynamic solutions ...

What our articles will be about

by Andrea Dorn

Today Embedded Systems are an indispensible part. They are used in totally different products in many different branches: in cars and airplanes, in consumer appliances like smart phones and coffee machines, ...