Embedded Linux Conference Europe 2013 - Day 1

Today was the first day of ELC-E 2013 and I was anxiuos to meet some people who I see once a year, and to attend some talks.

embedded Linux is the default operating system

Yocto Project Developer Day 2013

Yocto Project Developer Day 2013 in Edimburgh and I am here also this year. 
Yes, I have to admit I wouldn't miss it for any reason because I really trust in this project which is continuosly growing sice I joined OpenEmbedded in 2009.

Here we are at Edimburgh EICC 

 

The first presentation done by Khem Raj (right) introduced by Jeff Osier-Mixon (left)

Embedded Linux Conference Europe 2013

 Embedded Linux Conference Europe 2013

Qt5 differences with Qt4

Qt5 tries to eliminate this gap. With the platform plugin approach - the HW "platform" is expected to provide OpenGL ES2, and any other additional HW acceleration on top of that as part of the platform. In essence - with GLES2 - every screen update in Qt5 happens via an OpenGL ES texturing operation, rather than any other means. In addition to this fundamental change, Qt5 brings in another major programming model update - that of QML, Qt3D etc.

The year 2038 problem

2038 BugIn every computer systems there is a latent bug that is similar to the so-called 'Millennium Bug' or 'Y2K' bug or Year 2000 bug, its name is 'The year 2038 problem' or 'Y2K38'. Do not be misled by its definition that makes it seem like a minor problem, the year 2038 bug is a problem that involves a time-wrap problem not handled by programmers and although many overlook it because it is considered remote in time (15 years away from the date of writing) or because it is believed that it will resolves itself with the progressive adoption of 64bit systems, may cause some computer software to fail at some point near the year 2038. Although this may be true for desktop systems frequently updated, it is not so for embedded systems, which have a considerably longer life cycle. Do not forget that the embedded systems are also a lot more critical as they could be used to control devices that can compromise the security or worse the safety of persons.

Syndicate content