Wednesday, September 15, 2010

My Patent Application is Online

Network traffic monitoring using embedded target-side analyzer during embedded software development

Abstract: A debugging system running on a host device uses an embedded target-side network analyzer to acquire communications information such as packets. The target-side network analyzer logs and analyzes packets by obtaining data from the target's Internet Protocol (IP) stack when diagnostic functions are invoked at breakpoints. This allows display, logging, analysis and other uses of decoded network traffic. This approach can be used in applications (e.g., wireless or those using protocols such as RADIUS and PPP, etc.) where identifying and intercepting traffic to or from a specific target device may be difficult or impossible. With this approach developers can analyze network traffic in real time without any special hardware.
Network traffic monitoring using embedded target-side analyzer during embedded software development

Touseef Liaqat


Tuesday, December 12, 2006

Arvind Gupta Toys

Very impressive. I first saw him on National Geographic and decided to find him on net.
He made science toys out of scrap and educating children in a new and innovative way. Link.

Monday, December 11, 2006

Stack Overflow

I read following tricks for tackling stack overflow problem on latest newsletter of The Embedded Muse

I recently wrote an article about stack management
( ). Ben
Jackson had an interesting take on the subject:

"I just saw your article about catching stack overflow. One trick I
used last year is to use GCC's '-finstrument-functions' flag which
brackets every compiled function with enter/exit function calls. You
can write an enter function which tests the amount of stack space
left. It's not ideal, but it can save a lot of time. After I did
this for the kernel to track down a problem, one of the application
engineers applied the idea to a thread-intensive application and
found several potential problems.

"Another trick is to look for functions where people have mistakenly
put large structures or arrays on the stack. Use a tool like
'objdump' to disassemble your program and then a one-line awk or perl
script to find the first 'sub...esp' in each function and sort them
by size. If you find an irq with 'struct huge', it's just waiting to
blow your stack."

Tuesday, December 05, 2006

Breathtaking fractals

See the beauty and elegance of mathematics with 50 breathtaking fractals:


Tuesday, February 07, 2006

Spellbound for firefox

Spellbound is a spell checker extension for firefox. Currently released spellbound only work with 1.0.. versions. I have and released spellbound was not working on it. After googling i found where a development version is placed which works fine with