In Part 1 of this article series, I demonstrated the use of EXDI with DCI to explore the Windows hypervisor. In this article, weโll take a first look at the Windows Secure Kernel.
Iโm having a tremendous amount of fun learning about Windows internals with the new support of WinDbg via our SourcePoint JTAG debugger. This is a multi-part series on exploring some of the undebuggable code within the Windows hypervisor and secure kernel.
An advanced tutorial on the timestamp correlation of Windows kernel event and instruction trace, using Intel Processor Trace and Architectural Event Trace.
Leveraging boundary scan provides great ROI, however, a successful product deployment requires knowledge, expertise, and planning. How do you navigate boundary scan knowledge gaps in your organization?
Structures have been put in place. There is a commitment to funding. Strategies are being established. In this blog I cover some of the things that have happened since the passage of the CHIPS and Science Act in August last year.
Using the Device Browser to specify cluster, dummy, and resistor models for non-Boundary Scan devices on our board. This blog is a continuation of Part 11, "Everything You Need to Know About ScanWorks Interconnect โ Working with a Netlist".
Before we can test our device-to-device interconnects with an Interconnect action, we need to complete the Describe Design step. In this blog post we discuss working with netlists.
The topic of Silent Data Corruption (SDC) is very hot; in short, SDC is a result of flaws within a semiconductor that causes invisible errors in the data that it processes. As one example of this, a CPU might erroneously calculate 1+1 and yield 3.