Renesas RX family gains from software compatibility
Software compiled with any tool chain compliant with the Renesas RX ABI is now linkable by IAR Embedded Workbench. For example, libraries and modules such as hardware drivers and middleware originally developed for the Renesas proprietary tools can be reused by IAR Embedded Workbench without costly and timeconsuming porting efforts.
For the developer this means that the optimization advantages of IAR Embedded Workbench can be fully exploited while benefiting from third party software originally developed for another tool chain. Recent benchmarks for RX compilers show the advantage of IAR Embedded Workbench for RX for generating efficient software with small memory footprint. The benchmark test results are available at www.iar.com/ewrx/benchmarks
"Many customers favor IAR Embedded Workbench for software development on our targets", said David Noverraz, Tools Marketing Manager, Industrial Business Group, Renesas Electronics. "We are very happy that they now in a simple way can benefit from the support middleware we make available for the RX family."
More information on IAR Embedded Workbench for RX can be found here: www.iar.com/ewrx
IAR Systems GmbH
IAR Systems is the world's leading supplier of software tools for embedded systems that enable large and small companies to develop premium products based on 8-, 16-, and 32bit microcontrollers, mainly in the areas of industrial automation, medical devices, consumer electronics and automotive products. IAR Systems has an extensive network of partners and cooperates with the world's leading semiconductor vendors. Established in 1983, IAR Systems is part of the Intoi Group since 2005. For more information, please visit www.iar.com.
Press releases you might also be interested in
Weitere Informationen zum Thema "Software":
Das gekaperte Office 365-Konto
Office 365 ist nicht nur bei Unternehmen beliebt, sondern zunehmend auch bei Cyberkriminellen. Immer häufiger werden Office 365-Konten durch gezielte Phishing-Attacken gekapert. Die Angreifer nutzen dann die gestohlene Identität um weitere Angriffe innerhalb des Unternehmens auszuführen.Weiterlesen