Extending XJTAG’s Signal Integrity Error Analysis

Continuing from XJTAG 3.12’s Enhanced Signal Integrity Analysis feature (see here and here), XJTAG 3.13 brings more algorithms to help identify potential issues with the JTAG chain. This article describes more of the symptoms it can spot and their likely causes. […]

XJTAG statement about log4j vulnerability

There has been a lot of press about the recently discovered vulnerabilities in the Apache log4j software component, and companies are starting to do due diligence about whether they are exposed to related exploits due to its inclusion in software that they own. XJTAG would like therefore to reassure customers that no XJTAG software uses [...]

2021-12-21T11:10:06+00:00By |Categories: Support|Tags: |

Installing XJTAG when Microsoft Defender Controlled Folder Access is enabled

Microsoft Defender has an optional feature called Controlled Folder Access, which is designed to protect sensitive folders from being modified by malicious software. This feature is not switched on by default and is only available if you are using Microsoft Defender Antivirus or Microsoft Defender for Endpoint; if you’re using a third party antivirus solution [...]

2021-10-29T15:11:10+01:00By |Categories: Support|Tags: , |
Improve your printed circuit board test, debug and programming processes using XJTAG’s powerful boundary scan test suite. It can speed up your design and development, as well as providing excellent test coverage in production.
Go to Top