Embedded Linux: Core Skills for Development

Embedded Linux: Core Skills for Development

Many newcomers and engineers learning embedded systems often feel confused halfway through their studies. They don’t know where to start, how to advance, or what level they are currently at in their learning journey. To address these common concerns, today, an embedded engineer with 8 years of experience will share insights on what skills you … Read more

Setting Up Embedded Linux Qt Environment

Setting Up Embedded Linux Qt Environment

This article introduces how to configure the Qt runtime environment on an embedded Linux development board and perform Qt program running tests. 1 Compiling tslib I have previously used tslib for testing the touchscreen, so I will record the compilation process here. Download the source code of the tslib library: https://github.com/libts/tslib/tags Copy the downloaded source … Read more

Handcrafted OS Transformation Benchmark Code – Simple Scheduling Algorithm (Part 2)

Handcrafted OS Transformation Benchmark Code - Simple Scheduling Algorithm (Part 2)

This article will rewrite the handcrafted OS – a function running the minimum core code of FREERTOS, as shown in the figure below. Mainly: rewriting vTaskSwitchContext + background tick interrupt automatically switches tasks. In fact, the functionality has been completed in two articles, but it seems clumsy to represent using UART. This article aims to … Read more

Information Security in Embedded Systems

Information Security in Embedded Systems

In a controlled environment, preventing accidental errors and hardware failures is sufficient to achieve secure behavior. If an unrecoverable situation is detected, the system can switch to a limited or non-functional state, but it remains safe. In uncontrolled environments, various forms of attacks can jeopardize the security of the system. Only by considering security at … Read more

Common Security Threats and Protections in Embedded Systems

Common Security Threats and Protections in Embedded Systems

Due to the uniqueness of embedded systems, there are many security threats. Firstly, because embedded systems have limited resources, with small RAM and ROM and limited processing speed, they cannot implement multiple security defense measures simultaneously, making them vulnerable to attacks. Secondly, the diverse deployment environments of embedded systems, such as industrial production environments, medical … Read more

Differences Between Cybersecurity and Embedded Systems

Differences Between Cybersecurity and Embedded Systems

1. What is Cybersecurity? Cybersecurity includes network software security, network device security, and network information security, which refers to protecting the hardware, software, and data in network systems from accidental or malicious changes, destruction, or leakage, ensuring that the system can operate reliably, continuously, and normally, with uninterrupted network services. For example, certain official websites … Read more

Security in Embedded Design

Security in Embedded Design

Embedded systems are the core of modern electronic devices, and their security is crucial. These systems often contain sensitive data and critical functions, and if attacked, could lead to data breaches, system failures, or even physical damage. Therefore, security must be fully considered during the embedded design process. This article will delve into the security … Read more

TinyML for Microcontrollers in Machine Learning

TinyML for Microcontrollers in Machine Learning

Author: C. J. Abate (USA) Translator: Jun Qian Machine Learning (ML), as a subset of Artificial Intelligence, has been widely applied in various fields including atmospheric science and computer vision. As Dr. Matthew Stewart from Harvard University states, tinyML is an emerging discipline that enables low-resource consumption and low-power machine learning algorithms on resource-constrained microcontrollers. … Read more

Will SCADA Be Replaced by IIoT?

Will SCADA Be Replaced by IIoT?

This article is from the control engineering column of the Technical Articles published in May 2022. Recommendation Digital Transformation Framework: Initiate, Build, and Expand Essential for Embedded Development Engineers: Finite State Machine The “Unsung Heroes” of the Digital Factory at Saike Petrochemical How to Choose an Automation Control System? — Four Key Questions You Must … Read more

New Generation Wireless Microcontroller STM32WB BLE Application Development Course

New Generation Wireless Microcontroller STM32WB BLE Application Development Course

●Course Introduction● STM32WB is a new generation of wireless dual-core IC, supporting various mainstream 2.4GHz protocol stacks, including: BLE, ZigBee, Thread, etc. It supports both static and dynamic concurrency modes, allowing multiple protocol stacks to run simultaneously. It features high integration, high performance, and low power consumption, making it very suitable for industrial gateways, telecommunications … Read more