5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)

In “5 Elements to Secure Embedded Systems – Part #1 Hardware-Based Isolation”, we started our discussion about the five essential elements required to begin securing an embedded system. As you may recall, the five elements that every developer should be looking to implement are: Hardware-based isolation A Root-of-Trust (RoT) A secure boot solution A secure … Continue reading 5 Elements to Secure Embedded System – Part #2 Root-of-Trust (RoT)

CEC – Best Practices for Designing Real-Time Embedded Systems

Development teams today are faced with the need to develop systems within smaller budgets, shorter timeframes and with more features. In order to succeed in this challenging environment, teams need to leverage best practices, which are procedures shown my experience to produce optimal results. In this course, we will explore modern day best practices that … Continue reading CEC – Best Practices for Designing Real-Time Embedded Systems

3 Tips for Speeding Up Interrupt Handlers

Embedded software developers today are a bit spoiled. Many microcontrollers come with an ecosystem that includes peripheral drivers, an RTOS, middleware and even example application code. Many developers can spend most of their time in high-level application code, ignoring the software that meets the hardware. The problem is that while this prebuilt ecosystem can accelerate … Continue reading 3 Tips for Speeding Up Interrupt Handlers

Understanding Weak Symbols

If a developer closely looks at framework and library files, they may come across functions that have __weak in front of them. The weak symbol is a special linker symbol that denotes a function that can be overridden during link time. In today’s post, we will take quick look at weakly linked functions. Weak symbols … Continue reading Understanding Weak Symbols