Over the years, MicroTools’ owner Bob Japenga has developed a lot of knowledge about the Embedded Systems business.
The following publications are a collection of many of the “lessons learned” along the way. These white papers and published articles cover the range of topic from customer relations and finding a consultant to programming techniques and industry standards. Please enjoy these shared publications and use the information to add to your own “lessons learned”. Our experience is to your benefit.
Publications: List of White Papers
Product Development:
What to Expect: Development Process
What to Expect: Development Process
Improving process development:
MicroTools Development Process for Medical Devices
Software Development Process Improvement
Software Development Practices
Adequate testing means more than just checking against the specification
Principles of Software Driven User Interface Design for Business and Industrial Applications
SEI Capability Maturity Model Levels
Why Use Linux for Real Time Embedded Systems
MicroTools Development Process for Medical Devices
Software Development Process Improvement
Software Development Practices
Adequate testing means more than just checking against the specification
Principles of Software Driven User Interface Design for Business and Industrial Applications
SEI Capability Maturity Model Levels
Why Use Linux for Real Time Embedded Systems
Writing documentation:
How to Write a Software Requirements Specification
How to Write a Great Software Test Plan
Medical Specification for Software Controlled Systems
How to Write a Software Process Procedures and Policy Manual for YOUR COMPANY
How to Write a Version Description Document or Release Notes
How to Write a Software Requirements Specification
How to Write a Great Software Test Plan
Medical Specification for Software Controlled Systems
How to Write a Software Process Procedures and Policy Manual for YOUR COMPANY
How to Write a Version Description Document or Release Notes
Certifying products:
How MicroTools Helped Our Customers Become Certified
MicroTools’ 62304 Implementation Guidance
60601-1 Guidance for MicroTools
How MicroTools Helped Our Customers Become Certified
MicroTools’ 62304 Implementation Guidance
60601-1 Guidance for MicroTools
Creating Robust Embedded Systems:
Part 1 – Introduction
Part 2 – Preventing Memory Leaks
Part 3 – Out of Bounds Memory References
Part 4 – Referencing I/O
Part 5 – Handling Out of Memory Conditions
Part 6 – Handling Out of Disk Space
Part 7 – Creating Robust Watchdog Timers
Part 1 – Introduction
Part 2 – Preventing Memory Leaks
Part 3 – Out of Bounds Memory References
Part 4 – Referencing I/O
Part 5 – Handling Out of Memory Conditions
Part 6 – Handling Out of Disk Space
Part 7 – Creating Robust Watchdog Timers
Building resources:
How to Pick a Real-Time Embedded Software Consultant
How to Grow your Software Engineering Department: A Case Study (Or “Why Hire MicroTools?”)
How to Pick a Real-Time Embedded Software Consultant
How to Grow your Software Engineering Department: A Case Study (Or “Why Hire MicroTools?”)
Publications: Articles in PDF format
Applications Case History – If it’s not tested, it doesn’t work!
How to Fail with the Rational Unified Process: Seven Steps to Pain and Suffering
Software Policy And Standards
How to Fail with the Rational Unified Process: Seven Steps to Pain and Suffering
Software Policy And Standards
Publications: Circuit Cellar Articles

Concurrency in Embedded Systems
File Systems in Embedded Systems
Linux System Configuration
Estimating Your Embedded Systems Project
The Internet of Things
Part 2 – Choosing a Wireless Carrier for your Embedded System
Part 3 – Connect Wirelessly with a Microcontroller
Part 4 – Cell Modem Certification
Part 5 – IoT Security
Part 6 – IoT Security Examples
Part 7 – DoS Attacks with a Twist
Part 8 – Security for Web Enabled Devices
Part 9 – Security Vulnerabilities from the OWASP
Part 3 – Connect Wirelessly with a Microcontroller
Part 4 – Cell Modem Certification
Part 5 – IoT Security
Part 6 – IoT Security Examples
Part 7 – DoS Attacks with a Twist
Part 8 – Security for Web Enabled Devices
Part 9 – Security Vulnerabilities from the OWASP
How to Build an Embedded Systems Consulting Company
Internet of Things Security
BlueTooth Mesh