News, Stories, and Articles
Want to receive a curated selection of similar articles directly in your inbox?
Subscribe to our Embedded Notes newsletter. Sent occasionally. No marketing noise.
NXP recently introduced their latest i.MX937 Application Processor with on-chip Neural Processing Unit (NPU).It’s the opportunity to sit back and reflect on NXP’s NPU journey since their...
A watchdog in embedded systems is much more than a timer that occasionally forces a reset.From K9 style hardware supervision to software health checks and crash forensics, it is the silent guardian of...
Some design decisions don’t fail loudly.They decay slowly. In embedded systems, some design features deserve a more precise classification. I propose we start qualifying certain embedded design...
A company considers hiring an external contractor for development work. The choice between Fixed Price and Time & Materials is examined from that perspective. The discussion often focuses on risk...
In the previous article, we explored why risk-based assessment alone does not secure products, and how misusing it can lead to paper security and false closure. This article focuses on the other side...
Recently, I’ve witnessed a growing number of risk-based cybersecurity assessment trainings emerge, while far fewer initiatives focus on practical cybersecurity engineering. As a result, many product...
Walk into any embedded development team and you can often tell whether a project is healthy long before you speak to anyone. Forget the dashboards. Forget the planning meetings. Forget the beautifully...
Most embedded products start life as proofs of concept, and their security often shows it. This article explains the difference between perimetric and volumetric security, why both are essential, and...
In many companies, there’s a common belief: progress on a project always requires an engineer. But this assumption is often counterproductive. An engineer is not always the best person for every task...