Is true continuous integration (CI) steadily making its way into embedded software development?Read More »
We had a great week exploring and speaking with visitors at Embedded World 2016. Here are a few of our key takeaways from the showRead More »
This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and what we learnedRead More »
See what we're bringing to embedded world Exhibition & Conference to help deliver safe, secure, and reliable codeRead More »
At the recent Consumer Electronics Show in Las Vegas, automotive manufacturers focused a lot of attention on the new, improved computers they will be installing in their cars in the coming years. This will make upcoming models far more vulnerable to potential hackers, putting car owners in serious dangerRead More »
Last week, we held a joint webinar with QNX Software Systems discussing how static analysis plays a key role in automotive functional safety and ISO 26262 (you can watch the recording here). We had developers, testers, architects, and students attend from all over the world and they all had one interest in common: better delivery of safe automotive software. We always try to understand our attendees and here’s an interesting result from one of the polls we ran (based on table 9 of ISO 26262-6, which lists methods of design verification for software units): WhichRead More »
Even as the Internet of Things is expected to see rapid growth in the next few years, the security threats associated with more connected devices are growing as well. And the challenges for developers of embedded software in such devices are myriadRead More »
Some SD cards contain embedded software vulnerabilities that enable arbitrary code execution on the cardRead More »
Over the past few years, concerns have been raised at various times about the security of embedded software in medical devices such as insulin pumps, pacemakers and even Fitbit fitness monitorsRead More »
Sony released its highly anticipated Playstation 4 console at midnight on Nov. 15, and, while substantial reports of errors have not emerged, an immediate firmware update required by the console did prompt some confusion and high-flying accusationsRead More »
What you need to know about the latest ransomware attack targeting GitHub source code...
A discussion of the computational procedures for optimization and parameter estimation for the generalized criterion functions. ...
An introduction to implementing SSL in Apache Tomcat and configuring your proxy to use SSL when connecting to ensure end-to-end encryption...
© 2019 Rogue Wave by Perforce © 2019 Perforce Software, Inc.