The IoT is turning software development upside down
Peter Thorne, Cambashi Ltd.
embedded.com (September 30, 2014)
There are many complexities to a ‘disconnected’ embedded system, but at least the software is operating within a defined domain of memory and processors, together with the I/O registers that connect to real-world sensors, timers, displays and actuators. Development engineers create architecture and design documents to specify every piece of the system, and define the response to every external stimulus. In this type of environment, an embedded system software developer can access all the design documentation. The entire universe for the embedded software in this system is well defined.
The Internet of Things has made the environment for embedded software a lot more complex. Architects and designers are finding ways of making products more functional, more competitive and more convenient by creating ‘systems-of-systems’ to implement and deliver new capabilities.
There are examples in every industry, from aerospace and industrial machinery to healthcare and consumer electronics. If you are building controllers for agricultural machinery today, you have to think about GPS capabilities to enable the connected controller to determine the optimum amount of fertilizer to apply to each square yard of the field.
To read the full article, click here
Related Semiconductor IP
- Multi-channel Ultra Ethernet TSS Transform Engine
- Configurable CPU tailored precisely to your needs
- Ultra high-performance low-power ADC
- HiFi iQ DSP
- CXL 4 Verification IP
Related Articles
- SystemC in SOC Development
- Automotive System & Software Development Challenges - Part 1
- Automotive System & Software Development Challenges - Part 2
- Why Embedded Software Development Still Matters: Optimizing a Computer Vision Application on the ARM Cortex A8
Latest Articles
- GenAI for Systems: Recurring Challenges and Design Principles from Software to Silicon
- Creating a Frequency Plan for a System using a PLL
- RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
- MING: An Automated CNN-to-Edge MLIR HLS framework
- Fault Tolerant Design of IGZO-based Binary Search ADCs