White Papers
-
The Best Defense is a Good Offense
With military systems' life cycles of 20 to 50 years, component obsolescence is always an issue. Now, however, OEMs are adopting more proactive Bill of Materials (BOM) management practices to lessen the impact of End-of-Life (EOL) notices.
-
Memory Design Considerations When Migrating to DDR3 Interfaces from DDR2
The emerging DDR3 memory standard will extend the performance range of DDR memories considerably.
-
Improving Determinism of Industrial Applications Over Ethernet
It is possible to achieve the determinism required by industrial applications using standard Quality of Service techniques. In order to do so, the software architecture of the industrial device has to be adapted in order to separate as much as possible processing of low and high priority flows.
-
Device software optimization for concurrent and consecutive systems
An SMP-capable OS can be instantiated in memory just once and manage multiple PEs in an SMP system concurrently. The OS for an AMP system must be instantiated once per PE, and each instance of the OS manages just one PE. PEs in an SMP system typically have peer-peer relationships with each other, since they share resources. PEs in an AMP system typically have master-slave relationships with each other, since they are assigned their own resources.
-
A Fully Standards-Based Approach to Logging High-Throughput Distributed Real-Time Data
Leveraging the DDS and SQL Standards
-
What Do You Do When The Horse You're Riding Drops Dead?
Your horse has died while you were riding it - what do you do?
-
What Do You Do When The Horse You're Riding Drops Dead?
There is a very clever children's story regarding what one can do if the horse your riding drops dead – and the absurd options have been used to illustrate similar decision making efforts that have been set forth as "solutions" to business strategies, administrative problems and herein for what technical managers do when their product design has fallen apart and critical decisions need to be made.
-
The Cell Broadband Engine processor security architecture
The unrelenting evolution toward an even more open and connected computing infrastructure requires robust security to thrive. Learn how the Cell Broadband Engine™ processor's security architecture is uniquely suited for the challenges of this digital future.
-
SHARC processors surround consumers with sound - case study
Processors compute complex algorithms for SRS Circle Surround II Technology.
-
UML for C
There are three strategies for using the UML for developing C real-time and Object-oriented modeling; Object-based modeling; and Functional-based modeling. This paper focuses on the last approach, Functional-based modeling.
-
Blending Asymmetric and Symmetric Multiprocessing with a Single OS on ARM11 MPCore
Discussion about issues and pros and cons of AMP/SMP, including throughput, concurrency, real-time determinism, reuse of existing software, programming model, and debug/analysis, and how eSOL's T-Kernel Multi-Core Edition RTOS and eBinder tools can solve today's challenges in AMP/SMP environment.
-
Save time, boost performance with COTS reference design: Digital radio receiver system ready to go
In the competitive world of the quick and the dead, a Commercial Off-the-Shelf (COTS) design solution can give the Software-Defined Radio designer a significant time-to-market advantage. Using a COTS system, the designer can accelerate the development of a new product with a flexible platform that can be configured to meet multiple emerging and future standards.
-
Building Next-Generation Telecom Equipment Based on the AMD64 Processor Family
The ATCA specification of chassis and boards was developed to facilitate the faster introduction of next-generation telecom products which need to have higher performance, more functionality and must be less costly to build, implement and manage. With its open and scalable architecture and rich set of unique features, the AMD Opteron processor is an ideal solution for next generation high performance products.
-
Efficient Development of Wireless IP with High Level Modeling and Synthesis
Advanced wireless technologies are driving designers to design highly complex DSP algorithms into fast-growing markets. By applying advanced new DSP synthesis methodologies in the development effort, they can quickly model algorithm designs without hav...
-
Choosing a Secured Data Storage Solution for Gaming Machines
uDiskOnChip, the first embedded USB 2.0 flash device on the market, delivers a solid-state solution to meet gaming machine data storage requirements. Its built-in RSA-based write protection provides the required WORM capability. Its read and write speeds are sufficient to meet any OS or video streaming performance requirements, while its patented TrueFFS wear-leveling technology makes flash burnout due to repeated write/erase cycles non-existent when measured against the life expectancy of gaming machines.
-
A comparison and mapping of Data Distribution Service (DDS) and Java Message Service (JMS)
Data-centric design is emerging as a key tenet for building advanced data-critical distributed embedded and enterprise systems. DDS and JMS are popular middleware API standards that are easy to use, and offer the benefits of using a publish-subscribe communication model resulting in loosely coupled scalable distributed applications. However, their differences have significant impact on a data-centric design.
-
Portable Multimedia: Powerful, Flexible Solutions Powered by CEVA's Mobile-Media
The convergence of mobility, connectivity and multimedia has created a market of enormous diversity and opportunity.
-
DSP on FPGAS
This article describes the implementation of a common DSP application, Spectrum Analysis, on the COTS WILDSTAR II for VME FPGA-based processing board with a 1.5 GHz A/D I/O card, using the CoreFire FPGA Design Suite.
-
A building-block approach to media gateway development
This article will review the general functional requirements of MGs, and then present hardware and software strategies that can reduce development cost, risk, and time-to-market without sacrificing functionality or flexibility.