Abstract:
By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit
microcontrollers can be monitored and controlled over the Internet. With embedded Linux, these
gateways are easily moved from full-blown host PCs to embedded platforms like the PC104. In
this class you will learn about hardware platforms that support embedded Linux, Linux kernel
configuration, feature selection, installation, booting and tuning.
Learn how to build a custom Linux® distribution to use in an embedded environment,
in this case to drive a Technologic Systems TS-7800 single-board computer. In this
tutorial, you learn about cross-compiling, the boot loader, file systems, the root file
system, disk images, and the boot process, all with respect to the decisions you
make as you re building the system and creating the distribution.
C++ is widely used in the software industry. Some of its application domains include systems software, application software, device drivers, embedded software, high-performance server and client applications, and entertainment software such as video games. Several groups provide both free and proprietary C++ compiler software, including the GNU Project, Microsoft, Intel, Borland and others.
Switched systems are embedded devices widespread in industrial
applications such as power electronics and automotive control. They
consist of continuous-time dynamical subsystems and a rule that
controls the switching between them. Under a suitable control rule, the
system can improve its steady-state performance and meet essential
properties, such as safety and stability, in desirable operating zones.
Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.