Home » IP Systems » IP Systems Blog Review – Tuesday January 27, 2015

IP Systems Blog Review – Tuesday January 27, 2015

Microcontrollers and the 68000; Neural networks; Stacked dies; a Study of Studies; Always On; Smart Cities; Code Monkeys; Test Strategy; and Biometric Security

By Hamilton Carter, Senior Editor

Analog Devices discusses building motor controller applications using model based design.

Mentor’s Colin Walls is contemplating the value of video blogs for embedded development.  Get in on the ground floor and let him know what you think would be useful.

A very nice piece on the evolution of the micro-controller, the processor, and what distinguishes the two.  There’s plenty of detail.  None of it’s too technical.  If you’ve seen “Blackhat” and made it all the way through the movie, (we didn’t; had to go relieve the nanny before it was over), but I digress…  This article will give you a few microcontroller phrases and a bit of street cred.

Jama’s Cary Bryczek lays out “the key elements to a successful testing strategy”.  Cary  thinks deeply about additional value you can get from your testing work by employing principles of traceability.

Here’s a fairly extensive primer on convolutional neural networks.  They’re poised to break out of the world of academia and into an embedded object recognition application near you.

Find out how Intel sees the IoT enabling ‘Smart Cities’: cleaner, safer places to live and work.

Watch a video on the challenges of ‘Always On’, and how they’re being addressed.

Software developers:  Code Monkeys,  or Arteests?

Are stacked dies a security enhancement, or a hiding place for Trojan circuitry?

Mentor’s Harry Foster discusses the many biases that can influence a survey study.  He hasn’t switched jobs to public polling, he’s talking about a very specific study, the “2014 Wilson Research Group Functional Verification Study”, to be exact.  It’s also a pretty nice read if you’re often curious about how accurate the poll results on the nightly news are.

NXP discusses the security considerations involved in biometric smart card applications.  Short answer:  It depends a lot on where the card’s being used.

Warren Savage of IPextreme details some of the history of the ColdFire processor, (it’s a descendant of the 68000).

 

 

 

 

 

 

 

 

 

Great information delivered straight to your inbox

Leave a Reply

Your email address will not be published. Required fields are marked *

*