
Blog


Alternative to Torizon OS for embedded Linux development

How to upgrade Linux kernel in Yocto? Strategies, constraints, and vendor support

The Cyber Resilience Act & Open Source: achieving compliance for composed products

Raspberry Pi: secure boot enablement

Case study: Maintaining a secure and up-to-date embedded system in the railway sector

Embedded Linux trends for 2026

From Azure IoT Hub to Kubernetes architecture for IoT device management

Feedback on dm-verity integration under secure boot with Yocto

Why device manufacturers are moving away from SaaS IoT device management platforms

Yocto or not? Selecting the right build system for your Linux system

6 strategic design moves to mitigate embedded obsolescence risks

Software composition: the key to being CRA-ready from Day One

How we improved Zephyr SBOM accuracy for efficient vulnerability management

Embedded agents: rethinking connectivity in distributed systems

Designing connected embedded systems: Why you need an IoT platform

How we reduced Linux boot time on iMX93 to 1.8s

Vulnerability management plan: process, team & tools

Building a Yocto test automation infrastructure: what we learned

Vulnerability management lifecycle in embedded devices

