Q&A – Secure Bootloader Webinar Nov 29, 2017
I’ve had several requests to post the Q&A from my webinars so that attendees can review them offline. After giving…
Jacob's Blog
I’ve had several requests to post the Q&A from my webinars so that attendees can review them offline. After giving…
Hashes are crucial in computer science and provide a wide range of capabilities and functionality. In addition, hashes play an…
Developing a secure, connected device that can also operate efficiently requires that developers select a microcontroller that includes specific hardware…
Semi-hosting is a debugging capability supported by ARM processors that allows the embedded target to access i/o capabilities on a…
Engineers and scientists have always relied upon notebooks to document their ideas, inventions, progress and even their missteps. Some of…
Last week I attended Arm TechCon and a major theme through-out was embedded security. During the conference, Arm released their…
The way developers select a microcontroller for their embedded systems is dramatically changing. Traditionally developers have focused on the hardware…
Designing an IoT device requires more than expertise in embedded system design. Developers also need to understand the IoT architecture…
The C Programming language has been a dominate tool in embedded systems since its inception but as compiler and microcontroller…
There are two excuses that I typically hear from developers on why they refuse to use a RTOS: • An…
Object-oriented programming has become a very popular and critical programming methodology for developing applications. While traditional embedded software development has…
The greatest annoyance that I’ve ever encountered when developing embedded software is when I have to guess at what the…