TIDC07-Hands-On MULTI for Davinci

Total Page:16

File Type:pdf, Size:1020Kb

TIDC07-Hands-On MULTI for Davinci MULTI for DaVinci Workshop Joe Fabbre [email protected] Agenda 1 • Begin install of MULTI tools • Intro to Green Hills Software • INTEGRITY RTOS • MULTI IDE for DaVinci • Why to choose GHS for DaVinci – INTEGRITY –MULTI • Lab: Building a BIOS project for the TI simulator • Demo: BIOS on the DV-EVM • Lab: Building a stand-alone ARM application for the GHS ARM simulator • Demo: Simultaneous dual-core debug on the DV-EVM • Break Agenda 2 • Lab: TimeMachine • Demo: Linux kernel awareness on the DV-EVM – How to rebuild the Linux kernel for MULTI – Freeze mode kernel debug – Linux Kernel Awareness (OSA) – Linux Run Mode debug • Fork debugging – Debugging kernel modules Green Hills Software, Inc. GHS provides embedded software development solutions to produce the most reliable products, with the highest quality, in the shortest time • 25 years in embedded software industry – Averaging 30% per year – Profitable each year in business – Privately held • Largest RTOS market share growth three years in a row • #2 in total RTOS revenue worldwide in only five years • 35 offices worldwide (20 U.S. FAEs, 15 ROTW) Green Hills Software: Overview Worldwide, single-source leader with total software development solutions and services for embedded systems – Royalty Free Real-Time Operating System for systems that require total reliability, including full memory protection, POSIX.1 conformance, and the highest levels of safety, reliability and security, to systems needing small, fast and simple-to-use capabilities. – Optimizing C/C++/MISRA C/Ada Compilers for many microprocessors for the fastest, smallest code. – MULTI Integrated Development Environment including the C/C++/MISRA C/Ada Source-Level Debugger, Event and Performance Analyzer, Memory Leak Detector and other code quality features for building the most reliable applications in the shortest time. – Hardware Probes for the industry’s fastest download time to your embedded targets optionally connecting up to 1GB of trace data to make sure you don’t miss anything running on your targets. – Custom Engineering and Services providing, for example, porting services to selected RTOS, custom BSPs, device drivers, middleware integration and validation, feasibility studies rapid prototyping and more. Green Hills RTOS Solutions • Royalty-free, innovative and proven deterministic real-time operating system that includes support for processors MMU • Mature technology – shipping for 7+ years • Designed for products demanding robust reliability and security • Ecosystem shared with velOSity – 100% common API with velOSity – Shares services and middleware support with velOSity – Shares tools integration and debug features support with velOSity The Green Hills RTOS Pedigree Green Hills is dedicated to continued development and availability of the most reliable and secure Royalty-Free RTOS products in the industry. INTEGRITY and velOSity • The embedded industry’s leading reliable, scalable and open RTOS solution • Commercially available since 1997 INTEGRITY-178B • FAA DO-178B Level A certification for safety-critical applications in commercial and military avionics • Customer certifications achieved since 2002 INTEGRITY-MLS • Common Criteria EAL 6+ certification to the Separation Kernel Protection Profile (SKPP) for high-security applications in government and financial markets • In progress – expected completion in 2006 INTEGRITY-61508 • IEC 61508 SIL 3 certification for industrial automation & control, automotive industries INTEGRITY-MED • Customized package for medical device industry type I to III certifications INTEGRITY Middleware • File Systems – Formats • DOS/FAT, Unix/Linux compatible FFS, CD-ROM, DVD, PJFS – Network file systems: NFS and CIFS (Samba) – Device types – IDE/EIDE/ATAPI (hard disk drives, CD-ROM drives, DVD drives) –RAM disk – Flash memory (wear leveling NAND and NOR flash support) – Compact Flash – USB mass storage – M-Systems •USB 2.0 – Host and device stacks •Networking – IPv4/IPv6 – Security protocols: SSH, SSL, IPSec, firewall, VPN plus many more – WiFi: 802.11 a/b/g with WPA/WPA2 • DSP/BIOS Link • 2D and 3D graphics INTEGRITY Performance • INTEGRITY on ARM 920T at 184 MHz – Context switch • Between 2 VAS processes: 1.724 usec • Between 2 KS processes: 1.216 usec – Interrupt handler callback latency • 1.015 usec – These times are deterministic! • Linux on ARM926 at 200 MHz – Context switch is non-deterministic • Varies from ~100 usec to ~350 usec – Source: http://linuxdevices.com/articles/AT2598317046.html MULTI for DaVinci DaVinci Software Architecture A/V process Video thread Audio Video Application Audio codec codec process thread Codec engine Operating Systems INTEGRITY Kernel DSP/BIOS velOSity module u-velOSity DSP/BIOS Link Linux ARM DSP MULTI: Complete Integrated Solution for DaVinci Program Development Target Host System Connection Targets GHS Optimizing MULTI ToolSuite CompilerSuite Ethernet MPserv ICEPick (GHS Probe) or USB C TI DaVinci TIserv Freeze Mode DM644x Misra C Debug Global TI Target PCI/USB XDS560 Optimization Server ICEPick C++ TI DaVinci DM644x EC++ Ethernet LINUXserv Linux TI Optimizing Ethernet CompilerSuite RTserv TI DaVinci DM644x C Debug INDRT TI Info TIserv C64x+ Conver- INTEGRITY sion C++ TI Target TI DaVinci Run Mode DM644xi Server Debug ARM TI C64x+ Simulator Simulator DaVinci C64x+ DSP/BIOS Support • Create and manage a project • Build standard TI DSP/BIOS examples • C64x+ target connection options – Green Hills probe – TI XDS560 probe – TI simulator – BlackHawk XDS560 – Spectrum Digital XDS560 • Advanced MULTI debug features – BIOS kernel awareness (GUI) Freeze Mode Debugging • Uses JTAG for run control of processor cores • When a breakpoint is hit, execution on the entire core is stopped • Good for: – Low-level debugging – Board bring-up – Device driver development – Kernel aware application development • Process-specific breakpoints possible through “hiccup” debugging – When breakpoint is hit, MULTI checks current process context Where Can I Use Freeze Mode? A/V process Video thread Audio Video Application Audio codec codec process thread Codec engine Operating Systems INTEGRITY Kernel DSP/BIOS velOSity module u-velOSity DSP/BIOS Link Linux ARM DSP Simultaneous Dual-Core ARM/C64x+ Freeze Mode Debugging • Loading and debugging images on both cores • Multi-core debug – Individual core instruction stepping – Processor context debugging and viewing (e.g., registers, variables, etc.) • Single instance of MULTI debugger • Kernel aware debugging on all cores – Green Hills Software: INTEGRITY, velOSity and u-velOSity –MontavistaLinux – TI DSP/BIOS Simultaneous Dual-Core Debugging What Does “Kernel Awareness” Mean? • Object Structure Awareness (OSA) – Ability to explore the internal data structures of the operating system •Processes • Semaphores • Message queues • Dynamically loaded kernel modules •Etc. – In-depth look at the current state of the OS • Thread/Task/Process Aware Debugging – Debugger controls system based on thread-level events – Thread-level break points • Stop the system when thread “a” hits a common break point, but not if thread “b” hits the same break point. – Thread-specific variable and register views – Thread-specific call stack and local variables Debugging the Linux Kernel Object Structure Awareness Explorer Object Structure Awareness Explorer (Kernel Modules) Run-Mode Debugging • Uses target resident debug agent (linuxserv or rtserv) to perform run control. • MULTI gains run-control at the individual thread or process level. – Start and stop individual threads while the rest of the system continues to run uninterrupted. – Stop an arbitrary number of threads, controlling each independently. • Not limited to one thread at a time. – Threads can be grouped or managed independently. • Good for application developers who need visibility of interaction between processes and threads. Where Can I Use Run Mode? A/V process Video thread Audio Video Application Audio codec codec process thread Codec engine Operating Systems INTEGRITY Kernel DSP/BIOS velOSity module u-velOSity DSP/BIOS Link Linux ARM DSP Run-Mode Application Debugging (ARM) Low-Level Debugging and Custom Board Bring Up • Connect to hardware and access memory and registers without a program. – Low-intrusion mode disables MULTI’s cache. • Debug and perfect setup scripts with MULTI’s setup script debugger and script creation mechanism. • Create register view windows on the fly for custom devices. • Program flash memory using custom drivers. Register Viewer Advanced Register Visualization • Databook look and feel • Integrated bitfield descriptions • Graphically add new descriptions on the fly • Search for register window Integrated Memory Test Tool Test memory on new hardware with memory test tool. • Address walking • Data walking • Data patterns • CRC computation • Specify access size STL/Container Visualization • Display STL containers as arrays in view windows and when printing. • Customizable for custom- written C or C++ containers. TimeMachine: Revolutionary Debugging • Currently supported on Green Hills operating systems: INTEGRITY, velOSity and u-velOSity. • CodeReplay allows programs to step forward or backward through execution inside the MULTI debugger. • View Functions/Events/Call Stack vs. Time. • Non-intrusive real-time profiling and code coverage information. • EventAnalyzer to visualize RTOS events. • Analyze long-term changes in variables. • Debug virtual address spaces from trace data (INTEGRITY only). CodeReplay Debugger Debug collected trace data as though
Recommended publications
  • Microsoft and Wind River Are Currently in a "Dead Heat" For
    Microsoft and Wind River are currently in a "dead heat" for the top position in sales of embedded operating system software and toolkits, according to Stephen Balacco, embedded software analyst at Venture Development Corp. (VDC). In terms of the sale of real-time operating systems, on the other hand, Balacco said Wind River still maintains a "commanding market leadership position," but noted that Wind River has been "as challenged as any supplier in this market space over the last two years in the face of a slumping telecommunications industry, where they have been highly leveraged for sales, as well as [from] increased competition from royalty-free and Linux OS vendors making inroads." While not disclosing specific market share numbers publicly, VDC provided the following list indicating the market share position in terms of sales revenue, for the leading vendors in the embedded operating system market . 1. Microsoft 2. Wind River 3. Symbian 4. Palm 5. QNX 6. Enea Data 7. Green Hills Software 8. LynuxWorks 9. MontaVista Software 10. Accelerated Technology (Mentor Graphics) Included among key factors identified by VDC as impacting this market were . • Increased focus and emphasis on bundling integrated development solutions that minimize unnecessary and repetitive development and allow OEMs to focus on their core competencies in differentiating their product through the application; • Ability of OS vendors to adapt business models that are flexible in their pricing and terms and conditions in response to a changing set of market requirements spurred on by competitive market forces; and • A telecommunications market that continues to struggle has affected investments in new projects.
    [Show full text]
  • ADSP-BF537 EZ-KIT Lite® Evaluation System Manual
    ADSP-BF537 EZ-KIT Lite® Evaluation System Manual Revision 2.4, April 2008 Part Number 82-000865-01 Analog Devices, Inc. One Technology Way Norwood, Mass. 02062-9106 a Copyright Information ©2008 Analog Devices, Inc., ALL RIGHTS RESERVED. This document may not be reproduced in any form without prior, express written consent from Analog Devices, Inc. Printed in the USA. Limited Warranty The EZ-KIT Lite evaluation system is warranted against defects in materi- als and workmanship for a period of one year from the date of purchase from Analog Devices or from an authorized dealer. Disclaimer Analog Devices, Inc. reserves the right to change this product without prior notice. Information furnished by Analog Devices is believed to be accurate and reliable. However, no responsibility is assumed by Analog Devices for its use; nor for any infringement of patents or other rights of third parties which may result from its use. No license is granted by impli- cation or otherwise under the patent rights of Analog Devices, Inc. Trademark and Service Mark Notice The Analog Devices icon bar and logo, VisualDSP++, the VisualDSP++ logo, Blackfin, the Blackfin logo, the CROSSCORE logo, EZ-KIT Lite, and EZ-Extender are registered trademarks of Analog Devices, Inc. All other brand and product names are trademarks or service marks of their respective owners. Regulatory Compliance The ADSP-BF537 EZ-KIT Lite is designed to be used solely in a labora- tory environment. The board is not intended for use as a consumer end product or as a portion of a consumer end product. The board is an open system design which does not include a shielded enclosure and therefore may cause interference to other electrical devices in close proximity.
    [Show full text]
  • Green Hills Software INTEGRITY-178B Separation Kernel, Comprising
    CCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT ASSURANCE CONTINUITY MAINTENANCE REPORT FOR TM Green Hills Software INTEGRITY-178B Separation Kernel, comprising: INTEGRITY-178B Real Time Operating System (RTOS), version IN-ISP448-0100-SK_LMFWPCD2_Rel running on JSF PCD System Processor CCA, version 437140-007 with PowerPC, version 7448 Maintenance Report Number: CCEVS-VR-VID10119-2008a Date of Activity: 31 July 2009 References: Common Criteria document CCIMB-2004-02-009 “Assurance Continuity: CCRA Requirements”, version 1.0, February 2004; Impact Analysis Report, “High Assurance Security Products GHS JSF Panoramic Cockpit Display Separation Kernel Security Impact Analysis, DO-ISP448-0100- SK_LMFWPCD2SIA” High Assurance Security Products GHS Assurance Maintenance Plan, IN-INNNNN- 0101-HASPAMP Documentation Updated: Green Hills Software INTEGRITY-178B Separation Kernel developer evidence Assurance Continuity Maintenance Report: The vendor for the Green Hills Software INTEGRITY-178B Separation Kernel Operating System, submitted an Impact Analysis Report (IAR) to CCEVS for approval on 09 July 2009. The IAR is intended to satisfy requirements outlined in Common Criteria document CCIMB-2004-02-009, “Assurance Continuity: CCRA Requirements”, version 1.0, February 2004. In accordance with those requirements, the IAR describes the changes made to the certified TOE and the security impact of the changes. Changes to TOE: This maintenance activity consists of a functional and hardware platform modification to the Green Hills Software (GHS)
    [Show full text]
  • Research Purpose Operating Systems – a Wide Survey
    GESJ: Computer Science and Telecommunications 2010|No.3(26) ISSN 1512-1232 RESEARCH PURPOSE OPERATING SYSTEMS – A WIDE SURVEY Pinaki Chakraborty School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi – 110067, India. E-mail: [email protected] Abstract Operating systems constitute a class of vital software. A plethora of operating systems, of different types and developed by different manufacturers over the years, are available now. This paper concentrates on research purpose operating systems because many of them have high technological significance and they have been vividly documented in the research literature. Thirty-four academic and research purpose operating systems have been briefly reviewed in this paper. It was observed that the microkernel based architecture is being used widely to design research purpose operating systems. It was also noticed that object oriented operating systems are emerging as a promising option. Hence, the paper concludes by suggesting a study of the scope of microkernel based object oriented operating systems. Keywords: Operating system, research purpose operating system, object oriented operating system, microkernel 1. Introduction An operating system is a software that manages all the resources of a computer, both hardware and software, and provides an environment in which a user can execute programs in a convenient and efficient manner [1]. However, the principles and concepts used in the operating systems were not standardized in a day. In fact, operating systems have been evolving through the years [2]. There were no operating systems in the early computers. In those systems, every program required full hardware specification to execute correctly and perform each trivial task, and its own drivers for peripheral devices like card readers and line printers.
    [Show full text]
  • MILS Architectural Approach Supporting Trustworthiness of the Iiot Solutions
    MILS Architectural Approach Supporting Trustworthiness of the IIoT Solutions An Industrial Internet Consortium Whitepaper Rance J. DeLong (The Open Group); Ekaterina Rudina (Kaspersky) MILS Architectural Approach Context and Overview 1 Context and Overview ...................................................................................................... 4 1.1 Need for Trustworthy System Operation ............................................................................. 5 1.2 What is MILS today .............................................................................................................. 6 1.3 How MILS Addresses Safety ................................................................................................. 7 1.4 How MILS Addresses Security .............................................................................................. 8 1.5 How MILS Supports Reliability, Resilience, and Privacy ........................................................ 9 2 MILS Concepts .................................................................................................................. 9 2.1 Centralized vs Distributed Security Architecture .................................................................. 9 2.1.1 Domain Isolation .................................................................................................................................. 10 2.1.2 Isolation and Information Flow Control ............................................................................................... 11 2.1.3 Separation
    [Show full text]
  • Selection of a New Hardware and Software Platform for Railway Interlocking
    Selection of a new hardware and software platform for railway interlocking Arghya Kamal Bhattacharya School of Electrical Engineering Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 27.04.2020 Supervisor Prof. Valeriy Vyatkin Advisor MSc. Tommi Kokkonen Copyright ⃝c 2020 Arghya Kamal Bhattacharya Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Arghya Kamal Bhattacharya Title Selection of a new hardware and software platform for railway interlocking Degree programme Automation and Electrical Engineering Major Control, Robotics and Autonomous Systems Code of major ELEC3025 Supervisor Prof. Valeriy Vyatkin Advisor MSc. Tommi Kokkonen Date 27.04.2020 Number of pages 82+34 Language English Abstract The interlocking system is one of the main actors for safe railway transportation. In most cases, the whole system is supplied by a single vendor. The recent regulations from the European Union direct for an “open” architecture to invite new game changers and reduce life-cycle costs. The objective of the thesis is to propose an alternative platform that could replace a legacy interlocking system. In the thesis, various commercial off-the-shelf hardware and software products are studied which could be assembled to compose an alternative interlocking platform. The platform must be open enough to adapt to any changes in the constituent elements and abide by the proposed baselines of new standardization initiatives, such as ERTMS, EULYNX, and RCA. In this thesis, a comparative study is performed between these products based on hardware capacity, architecture, communication protocols, programming tools, security, railway certifications, life-cycle issues, etc.
    [Show full text]
  • Microkernel Construction Introduction
    Microkernel Construction Introduction Nils Asmussen 04/06/2017 1 / 28 Outline Introduction Goals Administration Monolithic vs. Microkernel Overview About L4/NOVA 2 / 28 Goals 1 Provide deeper understanding of OS mechanisms 2 Look at the implementation details of microkernels 3 Make you become enthusiastic microkernel hackers 4 Propaganda for OS research at TU Dresden 3 / 28 Administration Thursday, 4th DS, 2 SWS Slides: www.tudos.org ! Teaching ! Microkernel Construction Subscribe to our mailing list: www.tudos.org/mailman/listinfo/mkc2017 In winter term: Microkernel-based operating systems (MOS) Various labs 4 / 28 Outline Introduction Monolithic vs. Microkernel Kernel design comparison Examples for microkernel-based systems Vision vs. Reality Challenges Overview About L4/NOVA 5 / 28 Monolithic Kernel System Design u s Application Application Application e r k Kernel e r File Network n e Systems Stacks l m Memory Process o Drivers Management Management d e Hardware 6 / 28 Monolithic Kernel OS (Propaganda) System components run in privileged mode No protection between system components Faulty driver can crash the whole system Malicious app could exploit bug in faulty driver More than 2=3 of today's OS code are drivers No need for good system design Direct access to data structures Undocumented and frequently changing interfaces Big and inflexible Difficult to replace system components Difficult to understand and maintain Why something different? ! Increasingly difficult to manage growing OS complexity 7 / 28 Microkernel System Design Application
    [Show full text]
  • Partitioned System with Xtratum on Powerpc
    Tesina de M´asteren Autom´aticae Inform´aticaIndustrial Partitioned System with XtratuM on PowerPC Author: Rui Zhou Advisor: Prof. Alfons Crespo i Lorente December 2009 Contents 1. Introduction1 1.1. MILS......................................2 1.2. ARINC 653..................................3 1.3. PikeOS.....................................6 1.4. ADEOS....................................7 2. Overview of XtratuM 11 2.1. Virtualization and Hypervisor........................ 11 2.2. XtratuM.................................... 12 3. Overview of PowerPC 16 3.1. POWER.................................... 16 3.2. PowerPC.................................... 17 3.3. PowerPC in Safety-critical.......................... 19 4. Main PowerPC Drivers to Virtualize 20 4.1. Processors................................... 20 4.2. Timer..................................... 21 4.3. Interrupt.................................... 23 4.4. Memory.................................... 24 5. Porting Implementation 25 5.1. Hypercall................................... 26 5.2. Timer..................................... 27 5.3. Interrupt.................................... 28 5.4. Memory.................................... 31 5.5. Partition.................................... 32 6. Benchmark 34 7. Conclusions and Future Work 38 Abstract Nowadays, the diversity of embedded applications has been developed into a new stage with the availability of various new high-performance processors and low cost on-chip memory. As the result of these new advances in hardware, there is a
    [Show full text]
  • Future-Proofing the Connected World: 13 Steps to Developing Secure Iot Products
    Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products Presented by the IoT Working Group Table of Contents Forward Introduction Document Scope The Need for IoT Security IoT Products Can Compromise Privacy IoT products can lend their computing power to launch DDoS Attacks Medical Devices and Medical Standard Protocols are Vulnerable to Attack Drones Are Approaching Mainstream Status and Being Used as a Platform for Reconnaissance Critical national infrastructure can rely on the IoT ecosystem Cars are becoming connected and autonomous Moving Forward Why Development Organizations Should Care About Securing IoT Products IoT Device Security Challenges IoT products may be deployed in insecure or physically exposed environments Security is new to many manufacturers and there is limited security planning in development methodologies Security is not a business driver and there is limited security sponsorship and management support in development of IoT products There is a lack of defined standards and reference architecture for secure IoT development There are difficulties recruiting and retaining requisite skills for IoT development teams including architects, secure software engineers, hardware security engineers, and security testing staff The low price point increases the potential adversary pool Resource constraints in embedded systems limit security options IoT Security Survey Guidance for Secure IoT Development 1. Start with a Secure Development Methodology Security Requirements Security Processes Perform Safety Impact Assessment Perform Threat Modeling 2. Implement a Secure Development and Integration Environment Evaluate Programming Languages OWASP Python Security Project Link Integrated Development Environments Continuous Integration Plugins Testing and Code Quality Processes 3. Identify Framework and Platform Security Features Selecting an Integration Framework Evaluate Platform Security Features 4.
    [Show full text]
  • Embedded Operating Systems and Linux
    Embedded Operating Systems and Linux Amir Hossein Payberah [email protected] 1 Agenda ➲ Embedded Systems ➲ Real Time Systems ➲ Who Are The Players? ➲ Linux As An Embedded OS ➲ Kernel 2.4 vs. 2.6 ➲ Applications And Products ➲ The Embedded OS Market 2 Embedded Systems 3 What is an Embedded OS? ➲ An "embedded system" is any computer sys- tem or computing device that performs a ded- icated function or is designed for use with a specific embedded software application. ➲ Embedded systems may use a ROM-based op- erating system or they may use a disk-based system, like a PC. But an embedded system is not usable as a general purpose computers or devices. 4 What makes a good Embedded OS? ➲ Modular ➲ Scalable ➲ Configurable ➲ Small footprint ➲ Device drivers ➲ etc, etc, etc... 5 Real Time Systems 6 What is Real Time? “A real time system is one in which the correct- ness of the computations not only depends upon the logical correctness of the computation but also upon the time at which the result is produced. If the timing constraints of the sys- tem are not met, system failure is said to have occurred.” Donald Gillies 7 What is Real Time? “Real time in operating systems: The ability of the operating system to provide a required level of service in a bounded re- sponse time.” POSIX Standard 1003.1 8 Hard vs. Soft Real Time ➲ Hard ● Absolute deadlines that must be met ● Example: Braking system controller ➲ Soft ● Time tolerance within which an event can occur ● Example: Multimedia streaming 9 What makes a good Real Time OS? ➲ Multi-threaded and pre-emptible
    [Show full text]
  • Embedded Conference Scandinavia 2017
    CONFERENCE PROGRAM, pages 11-13 EXHIBITOR LIST & FLOOR PLAN, pages 14-15 EMBEDDED CONFERENCE SCANDINAVIA 2017 EUROPE’S LARGEST EMBEDDED CONFERENCE EXCERPTS FROM THE PROGRAM: ∙ INTERNET OF THINGS: Two full days program covering the whole scenario of IoT. From FPGA and μ-Controllers and connected IoT systems to infrastructure and security aspects. We will also look at IoT from a broader application perspective; such as the use of IoT for trucks and buses as well as together with artificial intelligence at datacenters. ∙ SOFTWARE DEVELOPMENT: Agile methods. Modeling and compiler technology. Software security, test and verification. Operating systems. Open source development for embedded applications. EMC design and testing. Wireless communications. ∙ IN-DEPTH TUTORIALS: Reliable code with MISRA C, model-oriented software engineering, code coverage and testing methodologies, design of microcontrollers, long range IoT networks ∙ HANDS-ON WORKSHOPS: - Lauterbach - Keil DS-MDK Register for free attendance at - μ-Controller embeddedconference.se - SeqZap KEYNOTE SPEAKERS: Windows 10 IoT Advanced electronics and own Management and Operations in Applying IoT and AI in the – From Device to Cloud embedded SW – a survival issue the Networked Society operations of the datacenter for trucks and buses MAARTEN STRUYS DR NIKLAS KARPE DR ELENA FERSMAN TOR BJÖRN MINDE Microsoft OEM Division Scania Ericsson Research RISE SICS North NOVEMBER 7-8, 2017 KISTAMÄSSAN • STOCKHOLM www.embeddedconference.se www.embeddedconference.se EMBEDDED CONFERENCE SCANDINAVIA GOING FROM STRENGTH TO STRENGTH! Over the last few years Embedded Conference Scandinavia, the internationally renowned meeting place for professionals in the field of embedded technology, has been growing and is now considered the largest embedded conference in Europe.
    [Show full text]
  • NEWS RELEASE for IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected]
    NEWS RELEASE FOR IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected] Curtiss-Wright Showcases Latest Avionics Solutions at Avionics Expo 2019 AVIONICS EXPO – AEROSPACE TECH WEEK 2019, MOC Event Center, Munich, Germany (Booth A17) – March 12-13, 2019 – Curtiss-Wright’s Defense Solutions division today announced that it will be displaying its latest avionics products at Avionics Expo, Munich Germany, March 12- 13, 2019 (Booth A17). The products featured in Curtiss-Wright’s booth include: DO-254/DO-178 Safety-certifiable 3U and 6U OpenVPX™ single board computers Rugged airborne video management system solutions including a rugged 21'' touchscreen LCD Advance Video Display Unit (AVDU), Video Recorder, Video Switch and Converter Flight Test Instrumentation (FTI) products including the KAM-500 and Axon family of Data Acquisition Units (DAU) The Fortress™ Flight Data Recorder, and… An ultra-compact mission processor system (the Parvus® DuraCOR® 311) and networking system (Parvus DuraNET® 20-11). Live Demonstrations of Curtiss-Wright Products: In addition to a wide range of proven COTS modules and systems, Curtiss-Wright collaborated with other leading technology partners for live demonstrations of open architecture products hosted in the partners’ booths: Featured in Green Hills Software’s Booth - A64 - “Green Hills Software® INTEGRITY-178 tuMPTM for Avionics Systems” The Avionics Systems Demo features Green Hills Software’s INTEGRITY-178 tuMP DO-178B Level A Safety Certified and Future Airborne Capability Environment (FACE™) Conformant RTOS. Curtiss-Wright Corporation Page 2 INTEGRITY-178 will be demonstrated on a Curtiss-Wright’s safety-certifiable VPX3-152 3U OpenVPX NXP® Power Architecture® T2080 SBC and VPX3-716 3U OpenVPX AMD E8860 Graphics Processing Module.
    [Show full text]