News, Stories, and Articles
Want to receive a curated selection of similar articles directly in your inbox?
Subscribe to our Embedded Notes newsletter. Sent occasionally. No marketing noise.
Some design decisions don’t fail loudly.They decay slowly. In embedded systems, some design features deserve a more precise classification. I propose we start qualifying certain embedded design...
A company considers hiring an external contractor for development work. The choice between Fixed Price and Time & Materials is examined from that perspective. The discussion often focuses on risk...
In the previous article, we explored why risk-based assessment alone does not secure products, and how misusing it can lead to paper security and false closure. This article focuses on the other side...
Recently, I’ve witnessed a growing number of risk-based cybersecurity assessment trainings emerge, while far fewer initiatives focus on practical cybersecurity engineering. As a result, many product...
Walk into any embedded development team and you can often tell whether a project is healthy long before you speak to anyone. Forget the dashboards. Forget the planning meetings. Forget the beautifully...
Most embedded products start life as proofs of concept, and their security often shows it. This article explains the difference between perimetric and volumetric security, why both are essential, and...
In many companies, there’s a common belief: progress on a project always requires an engineer. But this assumption is often counterproductive. An engineer is not always the best person for every task...
Embedded projects can be wonderfully complex. High-speed electronics, kernels, drivers, protocols, deadlines sometimes it all plays together like a symphony. And sometimes it doesn’t. If you’ve ever...
Hacking vintage electronics from the 1930s has become more than a hobby for me. It’s a return to fundamentals, a study in elegance, and an ongoing reminder of how much we’ve gained (and what...