Embedded Expertise

News, Stories, and Articles

Technicians Do It Better ❤️

In many companies, there’s a common belief: progress on a project always requires an engineer. But this assumption is often counterproductive. An engineer is not always the best person for every task...

My Project Is Doomed. What Now?

Embedded projects can be wonderfully complex. High-speed electronics, kernels, drivers, protocols, deadlines sometimes it all plays together like a symphony. And sometimes it doesn’t. If you’ve ever...

What I Learned From Dusty Tubes and Glowing Dials

Hacking vintage electronics from the 1930s has become more than a hobby for me. It’s a return to fundamentals, a study in elegance, and an ongoing reminder of how much we’ve gained (and what...

Code Reviews: How We Do It and Why It Works

At Embedded Expertise, we’ve already shared how we approach hardware design reviews. This time, let’s look at the software side and show how good code review practices help improve quality and...

Immutability: The Cornerstone of Embedded Defense

Immutability means that something cannot be altered once it has been created or deployed. In cybersecurity, this property is highly desirable: if an attacker can’t modify a system, they can’t...

My Project Has 1,000 CVEs — What Now?

Running a security scan and seeing 1,000 CVEs in your project can feel like a nightmare. The number alone is enough to induce panic, but here’s the truth: In reality, this is a common situation...

Zephyr Lands on Variscite SoMs

Variscite, a trusted and long-standing System-on-Module supplier, has announced official support for the Zephyr RTOS on its System-on-Modules based on the NXP i.MX8 and i.MX9. This development marks...

Embedded Platform Strategy: Benefit or Burden? Part 2

In Part 1, we looked at what a platform is, where it makes sense, and where it doesn’t. Now let’s focus on how to make it work in the real world — with the right organizational structure...

You’re Not Special: The Fallacy of Not Being a Cybertarget

Every few months, I sit across from a customer explaining why their connected product doesn’t need real cybersecurity. “It’s not a target,” they say with confidence, often followed by a knowing shrug...