Watchdog Strategies

File uploaded by Jessica Lane on Jan 29, 2018
Version 1Show Document
  • View in full screen mode

This PDF describes how to use a Watchdog to protect the system when using an embedded RTOS.

Attachments

Outcomes