Managing enterprise-wide verification results

  In today’s software-driven world, ensuring the security and integrity of your codebase is paramount. LDRAvault offers a comprehensive solution to address these concerns, empowering developers and organizations to streamline their Software Development Lifecycle (SDLC) while maintaining the highest quality…

eBook – Securing embedded & IoT systems

Embedded system security is vital to protect end users and organisations against numerous threats. With the increasing number of cyberattackstargeting embedded systems, ensuring the security of these systems has become more crucial than ever before. One of the main reasons…

6 types of security testing for embedded and IoT systems

    Security testing ensures the robustness and resilience of embedded systems against potential threats and vulnerabilities. As embedded systems become more prevalent in various industries, it is imperative for development teams to be well-versed in the different types of…

4 proven strategies for secure embedded and IoT devices

Rather than merely reacting to threats, product development teams should anticipate and plan for potential vulnerabilities throughout the development process. This includes conducting a comprehensive risk assessment early on, identifying potential attack vectors, and developing mitigation strategies. One effective way…

eBook – Data Management at the Edge

There are important differences between desiging for traditional edge and desiging for Edge AI. In this eBook we dive into these differences, focussing on data management.  

Use Case: GUIs made easy

Our client noticed that there was a lot of friction between the marketing team, which was responsible for the look &  the feel of the new GUI, and the software team that had to implement it with the hardware. We…

Y-CONTOOL-13: Special Offer

This versatile tool effortlessly handles all Y-Con plugs, ensuring efficient and reliable connections every time. Its user-friendly design simplifies the process, saving you time and effort. Get your Y-CONTOOL-13 at €650 ex. VAT. Don’t miss out on this limited-time offer!…

Deep Dive: the impact of AI on vision-based edge devices

In this article we highlighted the benefits and use cases of AI on vision-based edge devices. In this post, we will take a deeper dive into the technical aspects of this innovative technology. Data Collection: Vision-based edge devices, such as…

The Impact of AI on Vision-Based Edge Devices

Imagine applications powered by AI vision, processing data instantly, securely and right at the edge. That’s the revolution of vision-based edge applications and it’s changing the game for every industry. The integration of artificial intelligence (AI) into vision-based edge devices…

eBook – Creating A Safe Future Proof IoT SDLC

A Secure Software Development Lifecycle Is An Essential Element In Your Product Development Process

The Landrovers

The Landrovers is a Dutch company that focuses on reimaging the good old fashioned Land Rover Defender. After acquiring a Land Rover, the car is completely stripped and built back up to the highest standards, including a custom interior and…

Requirements Management: Traceability

Traceability is a sub-discipline of requirements management within software development and systems engineering and it mainly serves the purpose of accelerating and improving development activities. As a result, it also prevents software defects by visualizing relationships between components. Let’s describe…

Industry 4.0: Super Easy Explanation

The industrial revolution has gone through many phases to reach where it is today. It began from the days of manually operated simple machines to hydro/steam-powered machines. The next revolution was the era of electricity-powered plants and today, industrialization has…

Real-time database management systems for critical applications

In the most general sense, database management enables users to define, create, maintain and control access to the database. If we translate this into the sphere of critical systems, like avionics and aircraft navigation systems, driver assistance systems, critical medical…

Choosing a BIOS for an embedded x86 design

Which BIOS you can use for your embedded X86 device depends on a number of interdependent factors: Is this a one-time off design, or are you planning multiple designs and/or derivatives? Are you expecting to switch to newer CPU SKU’s…

The 3 critical elements of product development

When an engineer starts designing a new product, there are lots of things to take into consideration before even starting the actual development. It could be months into the development process when suddenly you realize that the hardware that was…

Shift-Left: Regression Testing

There are many different methods of testing your software. Regression testing is just one of many examples. However, they all share a common aspect, being that testing software brings along overhead costs in the form of time and tools. The most obvious reason for software testing is ruling out errors in the code, though there are other things we need to test for. We also need to compare the actual functionality of the device against its specifications. This aspect of testing is called requirement based testing.

Deciso

Deciso is a highly innovative company that develops network appliances and middleware software. Their field of expertise ranges from open source firewall & utm technology to telecommunications and business intelligence. Security meets functionality While being a big advocate of open…

Siemens

Industrial notebooks and PC’s must survive the most challenging conditions. Extreme temperature ranges, moisture, vibrations and dust are just some of the challenges they must survive on a 24/7 basis. Finding the right combination Industrial equipment has to meet a…

Airbus | ISS

The International Space Station (ISS) is one of the most ambitious scientific and technical projects ever undertaken in human spaceflight. Airbus is leading the European contribution to this project and is part of ESA’s industrial operator team for the operation…

Nortek AS

Everyone wonders what lies beneath the surface of the ocean. Nortek is on a mission to discover just that. By creating reliable oceangraphic data through innovative devices, Nortek is helping the world map the oceans. The right data at the…

Guide: Accelerate Development

Accelerate your product development cycle with tools, software stacks and industrial grade hardware. While off-loading overhead and complexity from the development team. Happy team, great products and a short time to-test.

Q&A – Build Acceleration

In this Q&A Gilles and Yohai deep-dive into to the frequently asked questions about build acceleration.

Hard Real-time database systems: why they make the difference

It is often said that a database system operates real-time, when the operating system is qualified hard real-time. Although this statement might appear sufficient for high performance computing applications, when operating on a s small scale embedded system with limited…

The Top 10 emerging cybersecurity threats

“If everything is connected, everything can be hacked” – European Commission President – Ursula von der Leyen ENISA, the European Union Agency for Cybersecurity has released the top 10 emerging cyber-security threats for 2030. The list is the result of…

Enable smart and sustainable EV charging development

EV Charging stations are a vital element of the future of electric driving. The global EV charging station market is expected to grow at a compound annual growth rate of 32.5% from 2021 to 2028, reaching €135.5 billion by 2028….

Security in IoT: the next steps

By 2024 any IoT or smart device sold in the EU must meet certain standards or the product will be banned from the EU market. In November 2019, the European Union Agency for Cybersecurity, “enisa”, released a study on Good Practices for Security of IoT – Secure Software Development Lifecycle” bringing together the views on best Secure SDLC practices from industry leaders from all over the world to make European manufacturers of smart connected devices aware of the eminent threats of hacks and cybercrimes and their danger for infrastructure and economies.