When tasks share resources, as they often do, strange things can and will happen. Priority inversions in embedded systems can be particularly difficult to anticipate. Here’s an introduction to ...
What do memory leaks, deadlocks, and priority inversions have in common? They're all Hall of Famers in the pantheon of nasty firmware bugs. Finding and killing latent bugs in embedded software is a ...
How to verify RTOS best practices in runtime. How visual trace diagnostics can be used to analyze the software design and detect deviations from best practices. What is priority inheritance? Using a ...