ESC Silicon Valley

Embedded Basics

- June 14, 2012

Embedded Basics examines the boundaries of hardware and software by exploring the inner workings of microcontrollers and the embedded software techniques that power them. 


7 Cardinal sins of embedded software development

  • 06.30.2015

The opposite of best practices are development sins. Here are seven of the worst.Read More...


Summer reading list for embedded developers - 2015

  • 06.23.2015

To address the need to keep their skills current, here's a summer reading list that embedded developers might want to at least peruse or, better still, add to their library. Read More...


Tune up your embedded software design processs

  • 06.19.2015

Like a precision machine, your software development process can benefit from periodic tune-ups to keep it running smoothly.Read More...

5 forbidden C features that aren't (necessarily)

  • 06.16.2015

Technology changes can obsolete what used to be standard practice. Here are five C functions worth reconsidering. Read More...

Weighing the costs: BOM versus NRE

  • 06.08.2015

Which is more important, development cost or product BOM? The answer depends on volume.Read More...


10 Tips for designing a HAL

  • 06.02.2015

A hardware abstraction layer can simplify embedded design and reduce the chance of error, but only if done right.Read More...

10 must-have development tools that (mostly) won't strain the budget

  • 05.28.2015

To speed development and reduce the chance of error, here are ten tools every embedded developer needs.Read More...


7 lessons for embedded developers from ESC Boston 2015

  • 05.08.2015

Back from ESC Boston, Jacob reflects on seven key lessons gleaned from the conference. Read More...

7 takeaways on embedded security

  • 05.07.2015

Jacob reveals some lessons learned from attending the reverse-engineering security session at ESC Boston.Read More...

7 steps to reusable debounce (and other) code

  • 04.30.2015

All pushbuttons need debouncing, and Jacob tells us how to construct a reusable algorithm for doing so.Read More...


Loading comments...

Write a Comment

To comment please Log In