Blog

  • Corruption of Memory Content

    Corruption of Memory Content

    Safety standard ISO 26262 specifies that freedom from interference between software elements shall be ensured. The current safety mechanisms to address...

    Read Article
  • Corruption of Memory Content

    Corruption of Memory Content

    Safety standard ISO 26262 specifies that freedom from interference between software elements shall be ensured. The current safety mechanisms to address...

    Read Article
  • Accelerate in second gear with AURIX™

    Accelerate in second gear with AURIX™

    Through Altium’s long standing, close cooperation with Infineon Technologies the team at TASKING has always been able to deliver outstanding support for...

    Read Article
  • Accelerate in second gear with AURIX™

    Accelerate in second gear with AURIX™

    Through Altium’s long standing, close cooperation with Infineon Technologies the team at TASKING has always been able to deliver outstanding support for...

    Read Article
  • Gremlins in Legacy Object Files

    Gremlins in Legacy Object Files

    Why you shouldn’t fear linking object files from different compiler versions ('cross linking') with the newest TriCore 6.1 compiler and two older...

    Read Article
  • Gremlins in Legacy Object Files

    Gremlins in Legacy Object Files

    Why you shouldn’t fear linking object files from different compiler versions ('cross linking') with the newest TriCore 6.1 compiler and two older...

    Read Article
  • Enjoying CERT C secure coding analysis with embedded compilers through Safety Checker

    Enjoying CERT C secure coding analysis with embedded compilers through Safety Checker

    The standalone version of TASKING Safety Checker can be used in various industries where IEC 61508 related regulations are in place, like ISO 26262 in...

    Read Article
  • Enjoying CERT C secure coding analysis with embedded compilers through Safety Checker

    Enjoying CERT C secure coding analysis with embedded compilers through Safety Checker

    The standalone version of TASKING Safety Checker can be used in various industries where IEC 61508 related regulations are in place, like ISO 26262 in...

    Read Article
  • The Three Programming Essentials You Need to Know for AURIX™ Multi-Core TriCore™

    The Three Programming Essentials You Need to Know for AURIX™ Multi-Core TriCore™

    With great architecture comes increased complexity, and if you're a developer about to embark on an AURIX™-based project then you’ll need to know these...

    Read Article
  • The Three Programming Essentials You Need to Know for AURIX™ Multi-Core TriCore™

    The Three Programming Essentials You Need to Know for AURIX™ Multi-Core TriCore™

    With great architecture comes increased complexity, and if you're a developer about to embark on an AURIX™-based project then you’ll need to know these...

    Read Article
  • Announcing TASKING VX-toolset for TriCore™ release v6.1r1

    Announcing TASKING VX-toolset for TriCore™ release v6.1r1

    The new TASKING TriCore™ VX-toolset is built specifically to help meet the highest safety standards and increased performance required of today’s...

    Read Article
  • Announcing TASKING VX-toolset for TriCore™ release v6.1r1

    Announcing TASKING VX-toolset for TriCore™ release v6.1r1

    The new TASKING TriCore™ VX-toolset is built specifically to help meet the highest safety standards and increased performance required of today’s...

    Read Article
  • Follow the Data In Order to Assure Freedom from Interference

    Follow the Data In Order to Assure Freedom from Interference

    Addresses of objects, passed as parameters, flow through the whole application. How to keep track of access violation in such a labyrinth of code? To achieve freedom from inte

    Read Article
  • Follow the Data

    Follow the Data

    To achieve freedom from interference as defined by ISO 26262 would be rather simple if all C modules were completely self-contained, i.e. only calling...

    Read Article
  • Call Graph Created by Safety Checker

    Call Graph Created by Safety Checker

    Read Article
  • Call Graph created by Safety Checker

    Call Graph created by Safety Checker

    Read Article
  • Who is calling whom?

    Who is calling whom?

    Call graph construction in the presence of indirect calls.

    Read Article
  • Who is calling whom?

    Who is calling whom?

    Critical to static analysis is whether a tool is capable of building a complete and correct call-graph. This is easy for direct calls, but becomes far...

    Read Article
  • ISO 26262 - Best ideas come in the Shower

    ISO 26262 - Best ideas come in the Shower

    TASKING wants employees to be creative, you get your best ideas when you’re under the shower, so build a couple of showers at the TASKING office. This...

    Read Article
  • ISO 26262 - Best ideas come in the Shower

    ISO 26262 - Best ideas come in the Shower

    TASKING wants employees to be creative, you get your best ideas when you’re under the shower, so build a couple of showers at the TASKING office. This...

    Read Article
  • loading
    Loading More...