1~28 item / All 28 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~28 item / All 28 items
When looking at programming books, compiler manuals, etc., terms like "heap area" and "stack area" come up. What exactly are these? In the embedded world, generally, the addresses and sizes of sections are determined at the time the program or OS is compiled, and the addresses or sizes of sections do not change during operation. In contrast, "heap area" and "stack area" refer to memory that is temporarily used within the program, and they typically belong to some part of a section in RAM. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationUsing the USB controller as an example, I will explain the specific operation of DMA transfer. As an example, let's consider the case of writing to the built-in FIFO of a DMA slave-type USB controller using a general-purpose DMAC. Typically, the capacity of the FIFO built into the USB controller is not very large, generally around the size of two packets at most. *For detailed content of the column, you can view it from the related links. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen we undertake software development on the customer's hardware, we often hear, "We want you to implement DMA support to improve transfer performance." What exactly does "DMA support" entail? I will explain the overview of DMA transfer, how to implement device drivers, and points to be cautious about. *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis time, let's talk about the technology that determines whether the data itself has been forged or tampered with. In addition to using public key cryptography to prove that "this is indeed a document written by the person," there is another method called a message digest. Another technology that has recently gained a lot of attention is cryptographic techniques for copyright protection. This includes scrambling in paid broadcasts and copy protection technologies for digital terrestrial television. This might actually be more familiar to us. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen it comes to security, many people might think of encryption. Indeed, we often hear stories about "encryption being broken," and there is a common misconception that increasing encryption strength equates to strong security. However, what is actually more important than whether or not to encrypt is "authentication." There is also a term similar to security, which is safety, and recently, concepts like functional safety and product safety have been gaining attention in Japan. What I will discuss next is the safety aspect of "security." Let's first consider the security system of an apartment building. *For more details on this column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOne of the major tasks in embedded systems is the development of programs (device drivers) that directly control hardware (devices). This is a field where experience speaks more than in application development, and since knowledge of hardware is indispensable, it may be said to be the essence of embedded systems in a sense. Even though we refer to "devices" in general, there are many devices surrounding the CPU these days. This means that we must develop a wide variety of device drivers. *For more detailed information, please refer to the related links. Feel free to contact us for more details.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn the world of computers, you may have a general understanding of a technology called cache, which is used to speed up processing. Cache is used in various places, and applications typically do not need to be aware of its existence. This time, I will explain about "cache"! *You can view the detailed content of the column through the related links. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen customers are considering embedded middleware products, a common question is, "What is the code size?" What should I answer when asked about "code size"? In this context, code size refers to "the amount of memory required to store the program" when the middleware product is embedded in the hardware. *For more details, you can view the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationExceptions can occur when running software on a computer (CPU), not just in embedded devices. But what exactly is an "exception"? In the world of computers, an exception refers to a state where normal processing cannot continue. *For more detailed information, you can view the related links. Please feel free to contact us for more details.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationYou know that compilers have optimization options, right? There are various types of optimizations, including those related to code size and those related to execution speed. However, sometimes compiler optimizations can cause issues, leading embedded software to malfunction. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationYou may have heard the news that "a security hole has been found," but do you know what it means? A security hole refers to a "gap in software" that can be exploited. Among these, the most common type is something called "buffer overflow." When a buffer overflow occurs, there is a risk that arbitrary code can be executed, making it a very dangerous vulnerability. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationLet's start by explaining some important points regarding stack memory. In a multitasking environment, multiple tasks operate concurrently. This means that each task is executing separate functions independently. To achieve this, stack memory is allocated separately for each task. *For detailed information, you can view the related links. Please feel free to contact us for more details.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationYou may have heard a conversation like, "I took a day off from work yesterday because I caught a cold, so my work got stacked up." The term "stacked" means "to pile up," so it's relatively easy to visualize. However, in the embedded industry, it is used in the following ways: "The stack overflowed and caused an exception." "What should the stack size for this task be?" "Can't we get a stack trace?" ...It feels quite different. What do these phrases mean? *You can view the detailed content of the column through the related link. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationYou've heard the term "multitasking," right? For example, it is used in a jargon-like way such as, "Performing development, design, and administrative tasks through multitasking" or "If you can handle customer support through multitasking, you're considered competent." Multitasking also plays a very important role when creating programs, but what exactly is multitasking in the first place? *You can view the detailed content of the column through the related link. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen looking at specifications for devices and software, the term "endian" often comes up. This time, I will explain what endian is and what precautions need to be taken when creating programs and circuit boards based on endian. In the embedded world, various CPUs are used depending on the application, so it is necessary to be aware of endian as well. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis time, let's talk about CPUs. In the world of computers, Intel CPUs like Pentium and Celeron are overwhelmingly famous, but in reality, there are many more types of CPUs. These types are referred to as CPU architectures, and in the current world of computers, they can be roughly divided into two categories: Intel-based and PowerPC-based. *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationHow does everyone debug the programs they create? Using printf() to display logs and check if the configuration values and sequences are as designed is the quickest method. However, in embedded development, it's not that easy to use printf(). First, there are cases where the function itself is not provided. For example, the specifications of the μITRON OS, which is very commonly used in Japan, do not include it. *You can view the detailed content of the column through the related links. For more information, please feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIt is not an exaggeration to say that current computer systems cannot be realized without "interrupts." In particular, programming that makes full use of "interrupts" is essential in embedded systems. This time, I would like to introduce what "interrupts" are, along with the contrasting method known as "polling." *For detailed content of the column, you can view it through the related links. For more information, please feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn the world of embedded systems, being able to handle binary and hexadecimal numbers quickly and accurately is one of the very important skills. In various situations, the ability to instantly convert between binary, decimal, and hexadecimal is required. Making mistakes in this area can lead directly to bugs, and if you have to think about it every time, it won't work in a professional setting. *For more details on the column, you can view it through the related links. Please feel free to contact us for more information.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur company provides IoT solutions and software for embedded systems in various fields. The embedded system software "MatrixQuest Series" is a product developed from scratch based on standards/specifications. It offers functionalities centered around communication, such as USB (host/function), Wi-Fi, TCP/IP, file systems, and SD host drivers, and we also develop ECHONET Lite and OpenADR in-house. Additionally, with the cooperation of many partner companies, we offer a variety of products including the deep learning framework "KAIBER," embedded fonts "DynaFont," Bluetooth, and real-time operating systems. We also provide support for Wi-Fi certification, BlueZ, Bluedroid compatibility, wireless certification, and SIG certification acquisition.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration【Overview】 1. High Portability Designed to facilitate easy combinations with various wireless LAN drivers. 2. Supports WPA/WPA2 - WPA-PSK/WPA2-PSK - WPA-1X/WPA2-1X 3. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support)
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Compatible with various companies' wireless LAN modules" - Manufacturers with signed contracts: Qualcomm Infineon (formerly Cypress) NXP Semiconductors (formerly Marvell) RealTek Broadcom Airoha - Manufacturers scheduled to sign contracts*: MediaTek (can be contracted for individual projects) ROHM Others
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Features** - Supports USB 2.0 HighSpeed - Supports control transfer, bulk transfer, and interrupt transfer - Complies with USB Interface Association Descriptor (IAD) and supports multiple interfaces (optional) - Supports the following class drivers: - MSC (BOT/SCSI) - CDC - RNDIS - SIC - MTP - Provides sample programs compatible with Microsoft Windows Hardware Compatibility Test (HCT 12.1 kit) - Achieves high portability by completely separating system-dependent parts - Easy debugging with a variety of logging functions *Also supports USB 3.0 functions*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Features** - Supports FAT12, FAT16, and FAT32 used in DOS, Windows 3.1, Windows 95/98/XP, and Windows 2000 - Can specify on a volume basis - Data exchange with Windows NT is possible using FAT12/16 - Compatible with VFAT and supports long file names. Supports Japanese file and directory names that include half-width katakana - Achieves optimal memory size through various configurations - Allows specification of cache size on a volume basis for FAT, directories, and data - Provides a normal file operation image from the application, excluding initialization and mounting processes - Supports removable media - Comes standard with logical format tools and DOS partition creation tools - Can be easily adapted for USB memory and other devices when used in combination with MatrixQuestUSB
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Features** - Compliance with major RFCs (Request for Comments) - Dual-stack structure for IPv4/v6 Can be implemented separately through configuration - IPv6 Ready Logo Phase 2 (Core, IPsec acquired, DHCPv6 planned for acquisition) - Compatible with DOD (U.S. Department of Defense) IPv6 Standard Profiles at the Simple Server level - Compact code size - High-speed design with minimized internal copies - Multi-homing capability - Configurable embedded protocols - Available for sale with IPv4 only - Standard attachment of IPsec - Support for IPsec accelerator (Renesas SH7672) - Multicast support - MIB-2 interface support
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Features** - Compliant with USB 2.0 - Allows star topology connections up to 6 levels through a HUB, enabling connection of 1 host and up to 127 targets - Supports a mix of high-speed (480Mbps), full-speed (12Mbps), and low-speed (1.5Mbps) connections - Supports control transfer, bulk transfer, interrupt transfer, and isochronous transfer - Supports root HUB driver - Compatible with hot plug and plug-and-play for connected devices - Provides standard class drivers for keyboard/mouse (HID), printers, and HUBs - Enables independent memory management from other applications - Allows dynamic registration of class drivers - Achieves high portability by completely isolating system-dependent parts - Facilitates debugging with a variety of logging functions *Also compatible with USB 3.0*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration【Features】 - Compact size Designed for embedded use, achieving a very compact size unlike OpenSSL and others. - Support for cryptography Supports public key cryptographic algorithms and symmetric key cryptographic algorithms. Supports message digests. Supports X.509 format certificates. - Supports both server and client. - Support for connections via Proxy Allows connections through HTTP Proxy when using client functionality.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration**Features** 1. Easy setup function for wireless LAN It allows for easy setup with APs that have obtained WPS certification, regardless of the manufacturer. 2. High portability Designed to facilitate combinations with various wireless LAN drivers. 3. Supports WPA/WPA2 (supplicant only) By combining with the proven separate product "MatrixQuestWLAN/wpa," WPS functionality is achieved. - Supports WPA-PSK/WPA2-PSK - Supports WPA-1X/WPA2-1X 4. Supports WPS (Enrollee) - EAP-TLS - EAP-PEAP 5. Supports both PIN code method and push button method 6. Supports numerous authentication protocols - EAP-TLS - EAP-PEAP - EAP-TTLS - EAP-FAST (planned support) - EAP-WSC
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration