• Introduction.
  • 1. Best practice.
  • 2. Hardware capabilities.
  • 3a. Built in Watchdog.
  • 3b. User Watchdog.
  • 4. Glossary
  • 5. References.