Knowledge center
Discover our latest news, customer cases and publications.
Embedded World 2026 Recap
Embedded World 2026 once again highlighted the rapid evolution of the embedded industry. From increasing focus on the Cyber Resilience Act (CRA) to the growing adoption of Zephyr OS, the event showcased key trends shaping the future of embedded development....
SEGGER announces new, competitively priced 4-channel Flasher ATE2
Our partner SEGGER has expanded its gang programming portfolio with the Flasher ATE2 (4-channel), a new entry-level single-board in-system programmer. This 4-channel variant is designed to reduce the initial investment for manufacturers while maintaining the high-performance standards of the Flasher...
The revised Product Liability Directive, software is now a product in law
The revised EU Product Liability Directive (PLD) marks a fundamental shift by officially treating software and AI systems as products. This update introduces strict liability for digital goods, meaning consumers can seek compensation for defects without having to prove fault....
The 7 Foundational Requirements as a Technical Baseline for EU CRA
As the EU Cyber Resilience Act (CRA) moves from legal theory to technical enforcement, the IEC 62443 standard has emerged as the most concrete engineering baseline for compliance. By focusing on the Seven Foundational Requirements (FRs), engineering teams can anchor...
Bring Datacenter-Grade Manageability to the Edge with Supervyse OPF OpenBMC Firmware
As edge platforms scale to support AI and mission-critical workloads, operational complexity rises. Together with our partner Insyde Software, Logic Technology provides the answer: Supervyse® OPF. This production-ready OpenBMC solution shifts critical control, telemetry, and recovery to a secure, out-of-band...
EU CRA Compliance with Insyde Software at Embedded World 2026
The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for embedded and edge products sold in the EU. From 2026 onwards, manufacturers are required to adopt secure-by-design development practices, manage vulnerabilities throughout the full product lifecycle and ensure software transparency....
