Operations | Monitoring | ITSM | DevOps | Cloud

Memfault

Sequential-storage Efficiently Store Data in Flash

While using a full-blown filesystem for storing your data in non-volatile memory is common practice, those filesystems are often too big, not to mention annoying to use, for the things I want to do. My solution? I’ve been hard at work creating the sequential-storage crate. In this blog post I’d like to go over what it is, why I created it and what it does.

Embedded World North America 2024 Recap

Last week, a handful of Memfolks had the opportunity to travel to Austin to attend the first ever Embedded World North America1! Embedded World NA welcomed 3,500 visitors and 180 vendors across 3 days2. While it was surely a smaller showing than Nueremburg’s Embedded World, we still wanted to quickly touch on our takeaways from the event. In this post, we will cover what we learned from the first Embedded World North America.

Comparing Firmware Development Environments - Linux, Windows, WSL2, and VMWare

About a year and a half ago, I decided to take a different approach to setting up a Zephyr environment for a new project at Intercreate. Instead of using my trusty VMWare Workstation Linux VM, I opted for WSL2. I was curious to find out: Would hardware pass-through for debugging work reliably? Would all of the tooling dependencies be supported? What about build system performance?

Launch Week Keynote: Log Management and Analytics

Logs have always been a critical component of observability, extending beyond embedded development. Many embedded teams rely heavily on logs and strive to enhance efficiency. Some struggle to extract value from their logs due to the complexities of collection and analysis. Regardless of your team's current situation, we are here to help. Our new Log Management and Analytics offering streamlines log collection, accelerates investigations, and transforms your logs into easily accessible insights across your entire fleet.

How New IoT Security Regulations Will Shape the Industry's Future

New IoT security regulations are imminent, with businesses across the US, UK, and EU bracing for the impacts of the Cyber Resilience Act (CRA), Product Security Telecommunications Infrastructure, and Cyber Trust Mark. These are not just administrative changes; they represent a pivotal shift in how IoT devices will be developed, deployed, and managed. Ensuring security, privacy, and compliance is business-critical.

How Memory Usage Patterns Can Derail Real-time Performance

In this article, we will learn how memory usage patterns can affect the real-time performance of an embedded application, drawing from a recent experience tracing an audio DSP application running on an embedded Linux platform. First, I will introduce the product in question and the real-time audio software I developed for it. Then, I’ll describe the issues I encountered with audio callbacks and the strategy I followed to determine the cause of the issues, ending with my solution and lessons learned.

Diving into JTAG - Security (Part 6)

The JTAG interface is an important tool for debugging and testing embedded systems, providing low-level access to the internal workings of microcontrollers and other integrated circuits. However, this powerful interface also presents significant security threats. In the sixth and final part of this Diving into JTAG article series, we will focus on security issues related to JTAG and the Debug Port.

Optimizing IoT Development: Key Takeaways from the 2024 Industry Report

Listen to VDC Research’s Executive Vice President, Chris Rommel, as he dives into the 2024 State of IoT Software Development Report. He breaks down the data collected from over 775 professionals directly involved in IoT and embedded electronic systems and shares key insights to guide your software development processes.