
Blog


Raspberry Pi: secure boot enablement

Case study: Maintaining a secure and up-to-date embedded system in the railway sector

Embedded Linux trends for 2026

From Azure IoT Hub to Kubernetes architecture for IoT device management

Feedback on dm-verity integration under secure boot with Yocto

Why device manufacturers are moving away from SaaS IoT device management platforms

Yocto or not? Selecting the right build system for your Linux system

6 strategic design moves to mitigate embedded obsolescence risks

Software composition: the key to being CRA-ready from Day One

How we improved Zephyr SBOM accuracy for efficient vulnerability management

Embedded agents: rethinking connectivity in distributed systems

Designing connected embedded systems: Why you need an IoT platform

How we reduced Linux boot time on iMX93 to 1.8s

Vulnerability management plan: process, team & tools

Building a Yocto test automation infrastructure: what we learned

Vulnerability management lifecycle in embedded devices

Embedded Linux vulnerabilities management with AI: too good to be true?

Managing dual images in Yocto-based embedded systems

Systemd networkd vs NetworkManager vs ConnMan: Choosing the best network manager for Linux

