XJEase Library Release 183 details
Here is a summary of the additions to the XJEase library made recently in library version 183. Note: Some files in this library require an XJTAG software version of at least 3.10.6. […]
Here is a summary of the additions to the XJEase library made recently in library version 183. Note: Some files in this library require an XJTAG software version of at least 3.10.6. […]
Continuing from XJTAG 3.12’s Enhanced Signal Integrity Analysis feature (see here and here), XJTAG 3.13 brings more algorithms to help identify potential issues with the JTAG chain. This article describes more of the symptoms it can spot and their likely causes. […]
XJTAG 3.12 expanded the capability of the Signal Integrity Analysis in XJTAG tools, adding the ability to suggest certain causes of error. This post continues from the previous post on this subject, and describes further errors that XJTAG tries to identify. […]
XJTAG 3.12 has extended the functionality of the Find and Replace dialog that is accessible when viewing XJEase or BSDL code files. […]
(This updates an older article due to the addition of the Excluded category in XJTAG 3.12) One of the questions we are commonly asked by new users, and also by users who have not used XJTAG for a while and are coming back to it, is about the differences between device categorisations in XJDeveloper. [...]
Some devices need more than a standard Test Reset sequence to enter the state when they behave as described in their BSDL file and boundary scan can run. Infineon’s Aurix TriCore TC3xx microcontroller family is one such group. […]
There has been a lot of press about the recently discovered vulnerabilities in the Apache log4j software component, and companies are starting to do due diligence about whether they are exposed to related exploits due to its inclusion in software that they own. XJTAG would like therefore to reassure customers that no XJTAG software uses [...]
Microsoft Defender has an optional feature called Controlled Folder Access, which is designed to protect sensitive folders from being modified by malicious software. This feature is not switched on by default and is only available if you are using Microsoft Defender Antivirus or Microsoft Defender for Endpoint; if you’re using a third party antivirus solution [...]
One new feature in XJTAG 3.11 is the ability to filter the formatted log files in the File List of the Log File Viewer based on a variety of different criteria. […]
Historically we have provided three mechanisms for defining some form of constant or default values for a pin/net in XJDeveloper. These are BSDL compliance pins, bus disable values and constant pins, which allow you to define pins which XJTAG should keep in a constant state during automated testing, such as with Connection Test. However these [...]