Blockchains Unchained

CATEGORIES : Embedded system, IoT/AUTHOR : Ron Wilson

It first came to our attention as the plausible-sounding but obscure data structure that made Bitcoin unhackable. Then some people lost a lot of money in attacks on Bitcoin exchanges. But before the cyberspace version of yellow crime-scene tape could come down, blockchain was back. Exonerated for the bitcoin fiascos, blockchains were now being researched […]

Is that Drone the Sound of Progress?

CATEGORIES : Embedded system/AUTHOR : Ron Wilson

By now, thanks to the attentions of marketing writers and news reporters, the word “drone” is overloaded with meanings. Let’s set aside traditional senses: a low-frequency, continuous sound; a male bee; an unsounded string on a musical instrument. We are interested in aircraft. Somehow in the mid-20th century the military began calling unmanned target aircraft […]

Power and Complexity: Welcome to AMP

CATEGORIES : All, Embedded system, System Architecture/AUTHOR : Ron Wilson

Asymmetric multiprocessing (AMP) is on the short list to be the technology acronym of the year for 2016. But what is it, exactly, and why would you want any? More usefully, what are the considerations and challenges in implementing AMP in an embedded system? Let’s begin with definitions. A symmetric multiprocessing (SMP) system is one […]

Is Tomorrow’s Embedded-Systems Programming Language Still C?

CATEGORIES : All, Embedded system, IoT/AUTHOR : Ron Wilson

What is the best language in which to code your next project? If you are an embedded-system designer, that question has always been a bit silly. You will use, C—or if you are trying to impress management, C disguised as C++. Perhaps a few critical code fragments will be written in assembly language. But according […]

System Security: A Model from Medieval History

CATEGORIES : All, Embedded system, System Security/AUTHOR : Ron Wilson

As one security expert has said, system security is not a thing, it is a process. In our increasingly connected—and increasingly hostile—environment, security has become a continuous case of new attacks leading to new countermeasures, followed by more innovative new attacks, and so on. Just as the Cold War arms race sapped the resources of […]