Embedded Expertise

News, Stories, and Articles

Want to receive a curated selection of similar articles directly in your inbox?
Subscribe to our Embedded Notes newsletter. Sent occasionally. No marketing noise.

NXP NPUs: Understanding the Shift

NXP recently introduced their latest i.MX937 Application Processor with on-chip Neural Processing Unit (NPU).It’s the opportunity to sit back and reflect on NXP’s NPU journey since their...

Watchdogs: One Concept, Many Meanings

A watchdog in embedded systems is much more than a timer that occasionally forces a reset.From K9 style hardware supervision to software health checks and crash forensics, it is the silent guardian of...

Kr-85: A New Metric for Embedded System Technical Debt

Some design decisions don’t fail loudly.They decay slowly. In embedded systems, some design features deserve a more precise classification. I propose we start qualifying certain embedded design...

Fixed Price vs Time & Materials

A company considers hiring an external contractor for development work. The choice between Fixed Price and Time & Materials is examined from that perspective. The discussion often focuses on risk...

Security Is Built, Not Assessed

In the previous article, we explored why risk-based assessment alone does not secure products, and how misusing it can lead to paper security and false closure. This article focuses on the other side...

Risk-Based Assessment Does Not Secure Products

Recently, I’ve witnessed a growing number of risk-based cybersecurity assessment trainings emerge, while far fewer initiatives focus on practical cybersecurity engineering. As a result, many product...

The Desk KPI That Reveals Project Health

Walk into any embedded development team and you can often tell whether a project is healthy long before you speak to anyone. Forget the dashboards. Forget the planning meetings. Forget the beautifully...

Beyond the Firewall: From Perimetric to In-Depth Security

Most embedded products start life as proofs of concept, and their security often shows it. This article explains the difference between perimetric and volumetric security, why both are essential, and...

Technicians Do It Better ❤️

In many companies, there’s a common belief: progress on a project always requires an engineer. But this assumption is often counterproductive. An engineer is not always the best person for every task...