Just to let you know that this year's 2017 Device Developers' Conference has been cancelled, as we have not been able to raise sufficient sponsorship and industry participation on this occasion.

In view of this, we will instead be sending out a series of e-mail newsletters that we hope you will find informative and beneficial. Each newsletter will cover such topics as embedded and realtime training opportunities, new technologies and technical white papers. Please see below for this month's collection of news stories.


Article : A Guide to Debug Tools for Multicore Development

Article : Using Advanced Debug Tools to Ensure Code Quality in Mission Critical Systems


UK Embedded Systems News

February 2017 newsletter...

Lauterbach 2017 Bulletin Explores Hypervisor Debugging and Debug Tools for Intel x86/x64

File System Releases from Datalight Improve Data Integrity and Device Reliability

Using an MPU to Enforce Spatial Separation

A Toolkit for IoT Security

4 Common Pitfalls and Misconceptions About The Software Security Problem

Implementing an Agile-Waterfall Hybrid Methodology in Embedded Systems Development

Why Bother to Unit Test? - White Paper




January 2017 Newsletter....

Lauterbach Announces Debug Support for ARMv8-M

New UK workshops for 2017 - PCIe, USB, FPGA, JTAG, Functional Test, Ethernet

New book: The Engineering of Reliable Embedded Systems (Second Edition)

Phaedrus rings in the New Year with TESSY

Achieve MISRA Compliance and Improve Code Quality - Download PRQA's whitepaper

SDC Tools Address Code Security

 

Lauterbach 2017 Bulletin Explores Hypervisor Debugging and Debug Tools for Intel x86/x64

Leading debug tool company Lauterbach has just released its 2017 newsletter that explores, in detail, topics such as Hypervisor Debugging, Debug Tools for x86/x84, CombiProbe for Tricore DAP and the latest AUTOSAR standard ARTI.

The Lauterbach 2017 newsletter can be downloaded from http://www.lauterbach.com/doc/news17_1.pdf

www.lauterbach.com

back to the top>>

 

File System Releases from Datalight Improve Data Integrity and Device Reliability

Nothing is more important to the success of a product than the integrity and reliability of the data which it stores. Linux has become a popular choice for embedded devices and developers can choose from many open-source file systems. Design criteria include:

Do they provide performance that is fast enough to make a favourable impression with device users?

Can the reliability of these open-source file systems be trusted for critical applications especially when it comes to failsafe use of modern NAND flash?

When data integrity, device lifespan, and performance matter, the world's best-known device manufacturers rely on Datalight. The release of Reliance Nitro 4.2 adds support for Linux kernels to v4.9 and the upcoming release of Reliance Nitro 5.0 will deliver improved features for working with NAND-based media, including eMMC, SD and SSD, along with increased performance.

The transactional architecture of Reliance Nitro eliminates the risk of corruption of directory information and user data due to power failures. Unlike journaling/logging file systems, which have slow mount times and significant overhead, Reliance Nitro mounts with just three blocks read, irrespective of the partition size.

Download the whitepaper "Commercial vs. Open Source File Systems for Linux" to discover which file systems will work best for your Linux-based designs.

For more information on Datalight's file systems and flash memory drivers, other best-in-class embedded software components or our hardware and software design services please contact SDC Systems on 0118 990 8400 or info@sdcsystems.com

back to the top>>




Using an MPU to Enforce Spatial Separation

WITTENSTEIN high integrity systems, provider of SAFERTOS® the safety certified RTOS, have just released a new white paper: "Using an MPU to Enforce Spatial Separation"

Download it free today from white-papers. It addresses the challenge that system designers now face; providing safety and functionality as part of the same system. In many cases safety critical systems have to support feature rich graphical interfaces, responsive networking communications, diagnostics, data storage and much more. Due to the rigors of developing safety critical software the development costs are high and it would not be feasible to develop all the software used within the system to the
highest safety level required.

Therefore the software within the system needs to be partitioned, grouping software of the same safety level together, and ensuring that software from lower safety levels cannot interfere with software relating to the higher safety levels. Partitioning allows the safety related software to be kept small and concise, whilst allowing the use of third party software modules, which shortens development times and lowers costs. The paper discusses techniques for achieving spatial separation or partitioning
within mixed safety level embedded systems.

WITTENSTEIN high integrity systems supply advanced RTOS and Middleware components to the industrial, medical, automotive and aerospace sectors, from basic embedded designs, up to complex safety systems demanding the highest levels of certification. They have an excellent reputation for quality and support, and support all popular platforms.

http://www.highintegritysystems.com/

back to the top>>

 

 

 

A Toolkit for IoT Security

People are waking up to the security issues that the Internet of Things (IoT) is creating and are looking for ways to secure their devices and networks.

Icon Labs has assembled the Floodgate IoT Security Toolkit to provide the building blocks that will produce systems that will comply with security standards including EDSA, ISA/IEC 62443 and NIST Cybersecurity guidelines.

At the heart of the Toolkit is Floodgate Firewall, an award-winning embedded firewall, that provides Stateful Packet Inspection (SPI), rules-based filtering, and threshold-based filtering to protect IoT devices from Internet-based threats. Supporting this is Floodgate Intrusion Detection Software (IDS) which provides a critical layer of security for the IoT. It protects IoT devices from malicious or accidental changes to firmware, configuration information, or static data.

Other elements are; Floodgate Secure Boot which ensures only authenticated firmware from the OEM is allowed to run on the IoT device; Floodgate Secure Firmware Update which validates software updates before installation and Floodgate Agent provides the system management with situational awareness, security event reporting, command audit log support and security policy management for embedded and IoT devices.

For further information on this solution please contact Phaedrus Systems www.phaedsys.com

back to the top>>

 

4 Common Pitfalls and misconceptions About The Software Security Problem

What you'll learn:

This paper explains why some commonly used approaches to security typically fail and outlines a development strategy for getting security right
Gain a better understanding of:

· Why Quality Assurance doesn't address security
· Common pitfalls and misconceptions about security
· Processes to improve security
· Secure development approaches and testing tools
· How to deliver more secure software faster


Download our whitepaper now to understand how you can deliver more secure software faster.
http://info.programmingresearch.com/secure-software-quality-isnt-security-dd

back to the top>>

 

Implementing an Agile-Waterfall Hybrid Methodology in Embedded Systems Development

In an increasingly competitive market environment, developers of safety-critical embedded systems are striving to juggle seemingly contradictory goals. On one hand, they need to reduce development time and costs in order to stay ahead of the competition. On the other, they have to maintain product quality, and compliance with relevant regulatory standards.

While adopting Agile practices offers a solution to the issue of reducing time to market, it makes it difficult to maintain adherence to the requirements of safety-critical standards.
To resolve this contradiction, more and more companies turn to hybrid frameworks that allow them to combine the benefits of both Agile and Waterfall. Implementing a custom Agile-Waterfall Hybrid method enables development teams to adopt Agile elements and practices to a pre-existing Waterfall development process.

The flexible architecture of Intland Software's codeBeamer ALM enables the combination of these methodologies, allowing embedded developers to reap some of the advantages of Agile software development while sticking to the structured and controlled approach of Waterfall project planning & management.

Intland's expert webinar & comprehensive guide to Agile-Waterfall Hybrid methodologies will help you understand when, why, and how to use a hybrid methodology in the development of complex embedded systems. To learn more, join our webinar on 29 Mar 2017 titled Implementing Agile-Waterfall Hybrid: Theory and Reality
http://content.intland.com/webinar/implementing-agile-waterfall-hybrid-theory-and-relativity

While you're waiting for the date to roll around, feel free to download our free eBook titled When, Why and How to Use an Agile-Waterfall Hybrid Methodology http://content.intland.com/agile-waterfall/when-why-and-how-to-use-an-agile-waterfall-hybrid-methodology.

back to the top>>

 

Why Bother to Unit Test? - White Paper

This paper addresses a question often posed by developers: Why bother to unit test?

Adopting the position of devil's advocate, we examine some common arguments made against unit testing and show why they are far outweighed by the advantages.

Visit www.qa-systems.com/Why_Bother_to_Unit_Test to download this whitepaper

back to the top>>

 

 

February 2017 newsletter...

 

Lauterbach Announces Debug Support for ARMv8-M

Lauterbach has announced that its TRACE32® debug tools now support cores of the new ARMv8-M family

Lauterbach, the leading manufacturer of microprocessor development tools, has announced that its TRACE32® debug tools now support cores of the new ARMv8-M family. 

These new cores of the ARMv8-M family include the Cortex®-M23 and Cortex®-M33 core and have similar performance to the existing Cortex®-M3/M4 devices, whilst offering low power performance and a small footprint. They also include a new integrated version of the ARM® TrustZone® ensuring that these cores are suitable for secure IoT applications.

“Our TRACE32® tools fully support these new cores,” said Barry Lock, UK Manager at Lauterbach. “This includes support for the ARM® TrustZone® mechanism, enabling the developer to have full visibility and control during the development process.”

Lauterbach debug tools have become a favourite with many hi-tech engineers, and the company is recognised for both engineering excellence and exceptional technical support. Lauterbach tools support all of the major families of microprocessor cores, covering products from 75 silicon companies. The quality and capability of Lauterbach tools enable engineering teams to develop robust code whilst minimising development time lost to debugging.

“The TRACE32® tools provide the ARM® Cortex®-M microprocessor developer with a comprehensive debug environment,” said Barry Lock.  “For customers who already have Lauterbach debug tools for Cortex®-M, a software update will enable access to these new device types.”

www.lauterbach.com

back to the top>>

     


New UK workshops for 2017 - PCIe, USB, FPGA, JTAG, Functional Test, Ethernet

Last year Telexsus had a record number of engineers attend practical one day training and workshop events. They've scheduled their 2017 events - so book now to ensure a date that's convenient with you.
New in 2017 - additional training days for PCI Express and USB, covering the more advanced aspects of protocol analysis, verification and compliance. There is also a new workshop on functional testing of high-value hardware, for example with FPGAs and other high-end devices, including comprehensive power testing.

All the events combine a mixture of theory and practical hands on labs to help hardware, software and test engineers not just understand the topic but leave with skills that can be put to practical use. Spaces for the events are allocated on a first come first served basis and are free of charge for up to 2 people per company. All events will take place in Maidenhead unless otherwise stated, typically, 9am - 4pm.

• PCI Express introductory workshop* : 28/2/17, 4/10/17

• Advanced PCI Express Protocol Analysis & Compliance training: 7/6/17

• USB introductory training day: 1/3/17, 5/10/17

• Advanced USB Analysis & Compliance training including Type-C and Power Delivery: 8/6/17

• High-end real-time FPGA debug workshop*: 2/3/17, 6/6/17

• JTAG boundary scan workshop*: 16/2/17, 27/4/17 (Edinburgh), 22/6/17, 19/10/17

• Functional and power testing of high-value hardware workshop*: 28/3/17, 12/9/17

• 25/40/50/100G Ethernet & Storage Area Networks workshop*: 27/4/17, 9/11/17

For dates and further details, and to register, please go to http://www.telexsus.com/events

back to the top>>

 

 

New book: The Engineering of Reliable Embedded Systems (Second Edition)

The Second Edition of 'The Engineering of Reliable Embedded Systems' is now available.

The book documents an industry-proven approach to the development of
software for reliable, real-time embedded systems, based on the use of 'Time Triggered' (TT) architectures.
What distinguishes TT approaches is that it is possible to model the expected system behaviour precisely.

This means that during the development process, developers can demonstrate that all of the requirements have been met, and at run time, developers can detect problems very quickly. The end result is that we can have a high level of confidence that a TT system will either operate precisely as required or it will move into an appropriate state if a problem occurs. The above characteristics mean that appropriately-implemented TT systems provide a particularly effective means of meeting the requirements of various international safety standards.

Case studies
In order to illustrate how the TT techniques presented in ERES2 can be employed in practical designs, five detailed case studies are included. These studies describe the development of embedded control and monitoring systems for the following products:

back to the top>>

 

 

Phaedrus rings in the New Year with TESSY

Top testing tool joins safety critical and high reliability product offering.

Phaedrus Systems, the specialist in tools for safety critical and high reliability embedded software development is celebrating the start of 2017 by announcing it now distributing the products from Berlin-based Razorcat in the UK and Ireland. The best known of the tools is TESSY, the leading unit and integration test tool for embedded software. TESSY is certified to IEC 61508 and ISO 26262, and is being used in a large number of software projects across all branches of industry for the verification of safety-critical and high-quality software.

The Razorcat product portfolio also includes the Integrated Test Environment (ITE), Test Operator Platform (TOP) and Check Case Definition Language (CCDL) tools.

Michael Wittner, Managing Director at Razorcat Development GmbH, explained, "Razorcat has been growing continuously over the last few years, so we are intensifying our activities in the different regions with the support of partners, "With Phaedrus Systems we have found the perfect distribution partner: Chris Hills has known TESSY for many years and therefore is a competent partner for our customers in UK and Ireland."

Chris hills, CTO of Phaedrus Systems has been a long term fan of TESSY, "TESSY is regarded by many as the gold standard in embedded software testing tools. I am delighted to provide it and the other Razorcat tools to those developers developing projects for the most demanding environments."

For more about TESSY and other leading system development tools, visit www.phaedsys.com

back to the top>>

 

 

Achieve MISRA Compliance and Improve Code Quality - Download PRQA's whitepaper

Learn how to ensure that your source code is safe and secure, and free of software defects and vulnerabilities.

Read PRQA's whitepaper to discover how you can achieve MISRA compliance, improve code quality, reduce risks and ultimately save costs http://info.programmingresearch.com/misra-overview-dd

back to the top>>



SDC Tools Address Code Security

The recent UK Banking and US based CCTV camera DDoS Maleware attacks have now made secure development everybody's problem, even more so when the threat of potential litigation or as happened very recently, the loss of a lucrative contract because an application could not be either secured or updated.

In the last few months EMEA based security centres have experienced a 100% increase in DDoS attacks, many of which have been amplified by combining thousands of compromised embedded applications and IIOT devices to target a single, innocent entity.




The recent Ponemon Institute survey found that nearly 80% of IIOT and mobile devices are being released without any security testing and has emphasised the need to ensure that security based coding standards are part of the development process, third party Open Source components are constantly checked against a vulnerability database and that hidden Technical Debt complexity risks are analysed to avoid the release of any insecure embedded applications or compromised devices.

If you are interested in enhancing or introducing AppSec Development technologies that can be quickly implemented into an application development stream, policy or process, please contact SDC Systems on 0118 990 8400 or info@sdcsystems.com for further information.

wwww.sdcsystems.com

back to the top>>



Click here to visit a Gallery of Photo's from DDC2016 and H/WExpo 2016  - Click here to see the 2016 website/agenda