• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Jeff Shepard

Securing devices for the IoT — managing memory

February 14, 2024 By Jeff Shepard Leave a Comment

Memory management is important in all digital electronic devices, including devices designed for use on the Internet of Things (IoT). It supports efficient resource allocation and memory utilization and prevents memory fragmentation, improving efficiency. It also supports memory protection and device security. This FAQ briefly reviews the common weakness enumeration (CWE) scheme for identifying software […]

Filed Under: FAQ, Featured, IoT, Security Tagged With: FAQ

Securing devices for the IoT – firmware, software, and OTA

February 12, 2024 By Jeff Shepard Leave a Comment

Over-the-air (OTA) updating of firmware and software on Internet of Things (IoT) devices is a requirement, not an option. The large number of IoT devices makes manual updates impractical and even dangerous. This FAQ reviews two key tools for managing and implementing OTA for IoT devices: open-source standards for managing resource-constrained devices and industry standards […]

Filed Under: Applications, FAQ, Featured, IoT, Security Tagged With: FAQ

Securing devices for the IoT — minimize the attack surface

February 7, 2024 By Jeff Shepard Leave a Comment

An attack surface is the sum of all the attack vectors or ways an attacker can gain malicious access to a network or system. The growth in remote work and the adoption of cloud services have increased the number of attack vectors and the attack surface size for most organizations and applications. This FAQ reviews […]

Filed Under: Applications, FAQ, Featured, IoT, Security Tagged With: FAQ

What are the four types of machine learning, and what are they used for?

December 11, 2023 By Jeff Shepard Leave a Comment

Machine learning (ML) is a subset of artificial intelligence (AI). It’s used to enable machines to independently improve their performance using data and experience to modify future actions. ML applications range from autonomous vehicles to business processes. Various approaches to ML use different learning styles, require different levels of data input, and are optimized for […]

Filed Under: Artificial intelligence, FAQ, Featured, Machine learning Tagged With: FAQ

What are the top five neural network architectures?

December 8, 2023 By Jeff Shepard Leave a Comment

There are many artificial neural network (ANN) architectures, each suited for specific tasks. This FAQ begins with a review of the components of the neurons that make up ANNs, looks at the basic elements of ANNs, and then presents the top architectures. There are several forms of neurons with slightly different mathematical structures. Most neurons […]

Filed Under: FAQ, Featured Tagged With: FAQ

What is Rust used for in an embedded system?

December 6, 2023 By Jeff Shepard Leave a Comment

Rust is an emerging systems programming language that’s mostly used for memory management, safety, and performance. It’s a statically typed programming language like Java, C, and C++, where variable types are known at compile time, and it’s designed for performance and safety, especially safe concurrency and memory management. Rust’s low-level control and memory safety make […]

Filed Under: Embedded, FAQ, Featured, Machine learning, Programming Tagged With: FAQ

What’s the difference between IEC 61508 and 61511 and ISO 26262 and 13849 functional safety standards?

December 4, 2023 By Jeff Shepard Leave a Comment

There are numerous functional safety standards. Most are based on IEC 61508, the foundational safety integrity level (SIL) standard. IEC 61511 is the SIL standard for the process industry. ISO 26262 is applicable to safety in automotive systems. ISO 13849 is a safety standard that applies to parts of machinery control systems that provide safety […]

Filed Under: FAQ, Featured Tagged With: FAQ

What is the MIPI I3C HCI good for?

December 1, 2023 By Jeff Shepard Leave a Comment

The mobile industry processor interface (MIPI) improved inter-integrated circuit (I3C) host controller interface (HCI) provides a scalable, low-power, medium-speed, two-wire I3C utility and control bus interface for connecting peripheral devices to application processors in smartphones, computers, Internet of Things (IoT) devices, automotive systems, and similar applications. MIPI I3C HCI supports faster design times for applications […]

Filed Under: FAQ, Featured Tagged With: FAQ

How does MISRA fit into automotive and industrial systems?

November 28, 2023 By Jeff Shepard 1 Comment

MISRA is a set of C and C++ coding standards developed by the Motor Industry Software Reliability Association (MISRA). Today it’s being maintained and expanded by the MISRA Consortium. MISRA has grown into a standard for embedded industries as well as automotive systems. For example, ISO 26262 Functional Safety – Road Vehicles cites MISRA C […]

Filed Under: Applications, Automotive, FAQ, Featured, Industrial, microcontroller Tagged With: FAQ

Post-quantum crypto standardization — background

October 4, 2023 By Jeff Shepard

At some point in the not-too-distant future, it’s expected that quantum computing will pose a security risk to all currently used encryption techniques. Most current encryption methods are based on the challenges associated with factoring large numbers into their prime factors. They provide good levels of security when classical computers are being used. Still, quantum […]

Filed Under: Applications, Computer, Embedded, FAQ, Featured, Security Tagged With: FAQ

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Interim pages omitted …
  • Page 15
  • Go to Next Page »

Primary Sidebar

Featured Contributions

How software segregation minimizes the impact of AI/ML on safety-critical software

Future connected car

10Base-T1S/L connects sensors in cars and buildings

Matter 1.2 is here — what does that mean for the smart home? 

IoT standards

IoT standards: The End Game

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy