In Part I of this three-part blog post series, I described how I had the idea of recreating one of my favorite electronic games from the early 1980s, Ravensburger’s Galaxis, on the NXP evaluation kit for the i.MX RT1052, using SEGGER tools and software. I also went over the first steps in the process: the […]
Posts in the Embedded Software category:
Reviving a classic electronic game using SEGGER tools and software (Part I)
In the early 1980s, the first electronic games started to emerge. I was a young teenager at the time, so they certainly caught my attention. One of my favorite games was Galaxis, which was released in 1980 by the well-known German company Ravensburger. I even own the game to this day, and it still works! […]
From concept to completion: SEGGER’s toolkit for embedded development
Imagine you’re just stepping into the world of embedded systems. Your possibilities as a developer are endless—from creating smart home devices to powering industrial automation. But with so many tools, technologies, and processes to learn, where do you even begin?
Automated testing made easy with emSim
Software testing, for embedded or for native solutions, can seem like a headache, but it doesn’t have to be! Of course, there are challenges. Time and resource limitations can restrict the level of testing, and it is difficult to simulate all real-world scenarios and corner cases. This can lead to defects being found in the […]
A whole new way to interact with headless devices
We are relying more and more on wearable and connected technology, but how do we configure them without a human interface? A great example are the wireless headsets we now all use for video conferencing (thank you, Covid). The initial set up of the minimal devices can be challenging, holding buttons in what can sometimes […]
Securing embedded systems with digital signatures: The basics
Securing an embedded system is incredibly important, and having a digital signature plays a crucial role in that. A digital signature confirms that a specific piece of information came from a specific organization (i.e. the one with the private key as described below) and has not been modified. Follow-up articles will firstly cover related issues […]
Hacking emSecure?
On October 24th of 2021, we were contacted by the Moscow based security company BI.ZONE Research Lab. BI.ZONE is a security research firm, checking software and computer systems for vulnerabilities. They were trying to find weaknesses in J-Link.
Algorithms for division – part 4 – Using Newton’s method
In the previous article I presented an algorithm for division by calculating a reciprocal. This article presents a way to calculate the reciprocal, rather than looking it up, trading size of lookup table against speed of calculation.
Algorithms for division – part 3 – Using multiplication
We’ve explored simple algorithms that develop a quotient one digit at a time: reliable, understandable, but ultimately quite slow. Now it’s time to change up a couple of gears and turbocharge division for speed!
Algorithms for division – part 2 – Classics
This article will explore the classic division algorithms and how they can be implemented efficiently, in terms of code space and execution time, by exploiting machine features. Don’t expect anything astounding here, the algorithms are classic for a reason: this path is well-trodden.