Schwerpunkte | Real-Time Software (RTOS), Hardwarenahe Software, OS-Treiber, Bootloader & BSP, Security & Safety Critical Software (MISRA-C:2004, CERT C Secure Coding Standard), Hardware/Software Codesign (SoC) |
Sprachen | C/C++, Assembler, Shell, Make (Pascal, PHP, XML, HTML) |
Betriebssysteme | VxWorks, Linux, Xilkernel, FreeRTOS (sonstige Proprietär/Embedded und POSIX) |
Werkzeuge | Wind River Workbench, Eclipse, GNU-Tools (gcc, gdb, make, autoconf/automake), Xilinx SDK, Lauterbach TRACE32, IAR C-SPY & Compiler, Hitex-Emulator & Keil C51 |
Prozessoren | i.MX6 / ARM Cortex A9 (Freescale), HD62 / ARM Cortex A5 (Socionext), Zynq-7000 / ARM Cortex A9 MPCore (Xilinx), Microblaze (Xilinx), i.MX25 / ARM9 (Freescale), SPARC-V8 Leon3 (Gaisler Research), ixp425 / ARMv7 (Intel), PowerPC 74xx (Freescale), PowerQUICC 83xx (Freescale), M16C (Mitsubishi), TLCS900L (Toshiba), DS80C320 (Dallas), SAB80C537 (Siemens), SAB80C535 (Siemens), 80C51, i8086 (Intel), Z80 (Zilog) |
Schwerpunkte | Requirements Engineering, Vorgehensmodelle (V-Modell, CMMI), Qualitätssicherung, Configuration Management (Change Management, Version Control, Produktstrukturen) |
Werkzeuge: | |
Analyse | Doors |
Design | UML (Rational Rose, Enterprise Architect), SA/RT, SDL |
Version Control | GIT, Subversion, RCS/CVS, Clearcase |
Quality | PC-Lint, QAC, Klocwork, SilkCentral, Doxygen |
Office | MS Office, MS Project, Lotus Notes, Visio, LaTeX/LyX, Postscript/PDF |
Vermittlungstechnik | ATM, ISDN, PSTN, TETRA, Signalisierung, SS7, OAM |
Übertragungstechnik | PCM, ADPCM, SDH/SONET, PDH, HDLC, Funktechnik & Modulation (AM/FM, QAM, FDM/TDM), Kodierung, Transceiver |
Netzwerktechnik | Gigabit/Fast-Ethernet, Router/Switches, TCP/IP (HTTPS/HTTPS, IPsec, SSL, SNMP/MIB, Syslog, DHCP, ARP) |
Tools | Net-SNMP, Wireshark, IxNetwork, Interwatch |
APIs & Libs | Sockets, EmWeb, Lighttpd, Wind River Web Server, Net-SNMP, EMANATE/Lite, Envoy, FASTPATH (Broadcom) |
Chipkarten | USIM, SIM Application Toolkit (SAT), T=1 Protokoll, ISO 7816, CardOS/M4, TCOS, Security Controller |
Infrastrukturen | Schlüsselverteilsysteme, PKI, Zertifikate |
Protokolle | VPN/IPSec, ATM Security Specification, Key Distribution, TETRA Air Interface Encryption, TETRA End-to-End Encryption, Ethernet Link Encryption |
Algorithmen | (3)DES, AES, RSA, Hash (SHA, MD), DSA, Modes of Operation (MAC), Elliptische Kurven |
APIs & Libs | OpenSSL, Wind River VPN/IPsec, Firewall & NAT |
Analog | Integraltransformationen, Approximationstheorie, Stabilität, LTI-Systeme, Vierpolanalyse und -synthese, Modulation, Konventionelle Filter, Korrelation, Rauschen, Harmonische Analyse, Optimalfilter, Leitungstheorie |
Digital | Algorithmen und numerische Verfahren, Transformationen (Z, DFT, FFT), Systembeschreibung und -synthese, Filter (lineare, FIR, IIR, adaptive, regressive, Optimal-), Korrelation, Modulation |
Mixed | Abtastung, Antialiasing, Oversampling, Fensterfunktionen, Quantisierungsrauschen |
Schwerpunkte | Industrial Design, Low-Power (portable) Geräte, High-Speed, Thermik, EMV, Zuverlässigkeit, FMEA, MTBF, Produktions- und Serviceaspekte |
Gerätetypen | Kommunikationsgeräte, Verschlüsselungsgeräte, Medizingeräte |
Konformität | CE, FDA, ISO 9001, RoHS, R&TTE (FTEG) |