Operations | Monitoring | ITSM | DevOps | Cloud

November 2023

How Embedded Device Observability Helps Latch Build Ultra-Reliable Products

Embedded developers have historically found it difficult to obtain high-quality data on the performance and health of their devices once deployed in the field. They've had to rely on customer reports and navigate through complex and time-consuming processes to effectively address any issues that arise. For companies like Latch, who care deeply about product reliability and quality, this isn’t good enough. Find out how they use Memfault to collect high-quality debugging and performance data from their devices in the field and use it to ensure their customers get the best possible product.

Diving into JTAG - Overview (Part 1)

As the first segment of a three-part series on JTAG, this post will give an overview of JTAG to set up some more in-depth discussions on debugging and JTAG Boundary-Scan. We will dive into the intricacies of the interface, such as the Test Access Port (TAP), key registers, instructions, and JTAG’s finite state machine. Like Interrupt? Subscribe to get our latest posts straight to your inbox.

NXP + Memfault + Golioth: Bringing Observability and Device Management to IoT Devices

NXP, Golioth, and Memfault have collaborated to give IoT developers the same composable tooling that cloud developers are accustomed to with modern data architectures. With this partnership, NXP developers can leverage a single, secure connection for instant access to data routing, core dump analysis, and observability for rapid time-to-market and improved IoT device performance. In the webinar, our presenters cover.

Counting Crashes to Improve Device Reliability

The first step to making reliable IoT devices is understanding that they are inherently unreliable. They will never work 100% of the time. This is partially because we firmware engineers will never write perfect code. Even if we did, our devices need to operate through various networks and gateways, such as cellular modems, mobile phone Bluetooth applications, Wi-Fi routers, cloud backends, and more, and each of these may introduce unreliability.