Handcrafted OS Transformation Benchmark Code – Simple Scheduling Algorithm (Part 2)

Handcrafted OS Transformation Benchmark Code - Simple Scheduling Algorithm (Part 2)

This article will rewrite the handcrafted OS – a function running the minimum core code of FREERTOS, as shown in the figure below. Mainly: rewriting vTaskSwitchContext + background tick interrupt automatically switches tasks. In fact, the functionality has been completed in two articles, but it seems clumsy to represent using UART. This article aims to … Read more

Information Security in Embedded Systems

Information Security in Embedded Systems

In a controlled environment, preventing accidental errors and hardware failures is sufficient to achieve secure behavior. If an unrecoverable situation is detected, the system can switch to a limited or non-functional state, but it remains safe. In uncontrolled environments, various forms of attacks can jeopardize the security of the system. Only by considering security at … Read more

Common Security Threats and Protections in Embedded Systems

Common Security Threats and Protections in Embedded Systems

Due to the uniqueness of embedded systems, there are many security threats. Firstly, because embedded systems have limited resources, with small RAM and ROM and limited processing speed, they cannot implement multiple security defense measures simultaneously, making them vulnerable to attacks. Secondly, the diverse deployment environments of embedded systems, such as industrial production environments, medical … Read more

Differences Between Cybersecurity and Embedded Systems

Differences Between Cybersecurity and Embedded Systems

1. What is Cybersecurity? Cybersecurity includes network software security, network device security, and network information security, which refers to protecting the hardware, software, and data in network systems from accidental or malicious changes, destruction, or leakage, ensuring that the system can operate reliably, continuously, and normally, with uninterrupted network services. For example, certain official websites … Read more

Security in Embedded Design

Security in Embedded Design

Embedded systems are the core of modern electronic devices, and their security is crucial. These systems often contain sensitive data and critical functions, and if attacked, could lead to data breaches, system failures, or even physical damage. Therefore, security must be fully considered during the embedded design process. This article will delve into the security … Read more

TinyML for Microcontrollers in Machine Learning

TinyML for Microcontrollers in Machine Learning

Author: C. J. Abate (USA) Translator: Jun Qian Machine Learning (ML), as a subset of Artificial Intelligence, has been widely applied in various fields including atmospheric science and computer vision. As Dr. Matthew Stewart from Harvard University states, tinyML is an emerging discipline that enables low-resource consumption and low-power machine learning algorithms on resource-constrained microcontrollers. … Read more

Will SCADA Be Replaced by IIoT?

Will SCADA Be Replaced by IIoT?

This article is from the control engineering column of the Technical Articles published in May 2022. Recommendation Digital Transformation Framework: Initiate, Build, and Expand Essential for Embedded Development Engineers: Finite State Machine The “Unsung Heroes” of the Digital Factory at Saike Petrochemical How to Choose an Automation Control System? — Four Key Questions You Must … Read more

New Generation Wireless Microcontroller STM32WB BLE Application Development Course

New Generation Wireless Microcontroller STM32WB BLE Application Development Course

●Course Introduction● STM32WB is a new generation of wireless dual-core IC, supporting various mainstream 2.4GHz protocol stacks, including: BLE, ZigBee, Thread, etc. It supports both static and dynamic concurrency modes, allowing multiple protocol stacks to run simultaneously. It features high integration, high performance, and low power consumption, making it very suitable for industrial gateways, telecommunications … Read more

Understanding CAN Data Transmission with Code Examples

Understanding CAN Data Transmission with Code Examples

Follow our official account to never miss any updates! This tutorial was originally published by the author strongerHuang in October 2018. Tags: CAN, CANOpen, CanFestival Copyright: Commercial use is prohibited Disclaimer:This document is for personal learning use only. Please contact the author via the official account for authorization if you wish to reprint. 1Introduction This … Read more

Modbus TCP Server Development and Yocto System Construction

Modbus TCP Server Development and Yocto System Construction

13.8 Modbus TCP Server Development Source code: After extraction, the source code is “modbus_server_tcp.c”, which simulates a Modbus TCP sensor. For an explanation of the source code, please refer to “11.7 Modbus TCP Programming and Experimentation”. When the front-end program and the MQTT program use the RPC interface to read and write the Modbus TCP … Read more