What is an embedded system?

June 2002 News & Events

Dear Editor,

One of the simplest definitions of an embedded system as described by Open Systems Publishing, a US international leading embedded systems magazine, is a computer without the traditional desktop keyboard and display. Users can interface through keypad, alphanumeric display, serial interface RS232 or through an Ethernet port. In essence, any standalone system not used for regular day-to-day PC requirements can be classed as an embedded system.

In an embedded system there is also no standard embedded operating system - ie an embedded system can use any operating system. The aim is to keep the software as simple as possible to avoid complications and therefore the system failing. Since many embedded systems are built with standard off-the-shelf hardware, uniqueness is through custom-built application software. This is typically written in either C or C++ format! The same as Microsoft Windows.

The platforms used by most operating systems is MS-DOS - Microsoft Disc Operating System. In some cases some developers use others such as Unix, Beos, GPX; in essence most of these base operating platforms use similar or the same kernel structures - the differences being in the built up C or C++ software on top of this platform, be it Windows or Linux or other proprietary software.

There is unfortunately a great deal of misinformation on Microsoft and the Windows Operating Systems. Remember that Windows 95, 98 and Millennium were built for home and SOHO (small office, home office) operation and not for high data rates and continuous long-term operation! Whereas Windows NT (new technology) platforms were designed for corporate and industrial applications. Therefore do not be surprised should your system fall over, that you are using the wrong system in the wrong environment. Likewise with the generations of development from NT4, to 2000 and now XP, each stage is infinitely more stable (look how many service packs NT4 needed).

But that is not all to consider. If your proprietary software has anomalies; such as poor data basing structures, restricted LAN/WAN links, or other issues then your embedded system may still have problems - ask the questions as you shop around.

Finally, remember that most systems use similar hardware. Hardware components are designed for a set period of life and as with most of today's products, have an average life expectancy; some fail within days. Repair and swap out are simple, but what you need to confirm is the quality of hardware components being used, what guarantees are in place, and how quickly a repair under warranty can be completed.

Unfortunately in the South African market there is a tendency to belittle the installer, system integrator or project manager, and assume that they will not understand - "give them a plug-and-play system and they will be alright". With the fast developing pace of software-based solutions in open architecture formats it is now a case of you must learn or you will die! There are very few simple applications and most will involve some degree of computer understanding - better that we as distributors EDUCATE rather than DISCRIMINATE.

Niall Beazley, Vision Catcher

011 465 6396





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.