News, Stories, and Articles
Most embedded products start life as proofs of concept, and their security often shows it. This article explains the difference between perimetric and volumetric security, why both are essential, and...
In many companies, there’s a common belief: progress on a project always requires an engineer. But this assumption is often counterproductive. An engineer is not always the best person for every task...
Embedded projects can be wonderfully complex. High-speed electronics, kernels, drivers, protocols, deadlines sometimes it all plays together like a symphony. And sometimes it doesn’t. If you’ve ever...
Hacking vintage electronics from the 1930s has become more than a hobby for me. It’s a return to fundamentals, a study in elegance, and an ongoing reminder of how much we’ve gained (and what...
At Embedded Expertise, we’ve already shared how we approach hardware design reviews. This time, let’s look at the software side and show how good code review practices help improve quality and...
Immutability means that something cannot be altered once it has been created or deployed. In cybersecurity, this property is highly desirable: if an attacker can’t modify a system, they can’t...
Running a security scan and seeing 1,000 CVEs in your project can feel like a nightmare. The number alone is enough to induce panic, but here’s the truth: In reality, this is a common situation...
Variscite, a trusted and long-standing System-on-Module supplier, has announced official support for the Zephyr RTOS on its System-on-Modules based on the NXP i.MX8 and i.MX9. This development marks...
In Part 1, we looked at what a platform is, where it makes sense, and where it doesn’t. Now let’s focus on how to make it work in the real world — with the right organizational structure...