Skip to content
  • Products
    • Welma Yocto Linux
    • Kamea IoT
    • Pluma testing
    • CVE Scan
    • Vulnerability management software
  • About
    • Who we are
    • Success stories
    • Plans & pricing
    • Support
  • Insights
    • Yocto
    • Cyber Resilience Act
    • OTA updates
    • Embedded testing
    • IoT connectivity
    • Blog
    • Newsletter
  • Engineers
    • Welma docs
    • Kamea docs
    • Pluma docs
    • CVE Scan docs
The Embedded Kit blue logoThe Embedded Kit blue logo
  • Products
    • Welma Yocto Linux
    • Kamea IoT
    • Pluma testing
    • CVE Scan
    • Vulnerability management software
  • About
    • Who we are
    • Success stories
    • Plans & pricing
    • Support
  • Insights
    • Yocto
    • Cyber Resilience Act
    • OTA updates
    • Embedded testing
    • IoT connectivity
    • Blog
    • Newsletter
  • Engineers
    • Welma docs
    • Kamea docs
    • Pluma docs
    • CVE Scan docs
Contact us
The Embedded Kit blue logoThe Embedded Kit blue logo
Home Blog

Blog

Managing dual images in Yocto-based embedded systems

  • Yocto
Systemd networkd vs NetworkManager vs ConnMan: which is the best network manager for Linux?

Systemd networkd vs NetworkManager vs ConnMan: Choosing the best network manager for Linux

  • IoT connectivityYocto
Embedded application integration

Embedded application integration in Yocto-based systems

  • Yocto
DevOps vs DevSecOps definitions and best practices

DevSecOps: definition & best practices for embedded systems

  • CybersecurityEmbedded testingOTA update
AB partitioning for robust OTA update

AB partitions: a path to robust OTA updates for Linux

  • OTA updateYocto
Boot time

Optimizing boot time for embedded Linux systems

  • Yocto
embedded Linux in medical devices

Linux in medical devices: how to achieve compliance?

  • CybersecurityYocto
sbom generation with yocto project

How to generate a Software Bill of Materials (SBOM) with Yocto

  • CybersecurityYocto
cyclonedx sbom

Generating CycloneDX SBOM

  • Cybersecurity
SPDX SBOM (Software Bill of Materials)

Generating SPDX SBOM

  • Cybersecurity
Manual testing vs automation testing

Manual testing vs automation testing

  • Embedded testing
Device under testing DUT

What is a Device Under Test (DUT)?

  • Embedded testing
Block box vs White box testing

Black box vs white box testing

  • Embedded testing
What is The Yocto Project?

What is the Yocto Project?

  • Yocto
i.MX93 support - NXP x The Embedded Kit

Simplifying security implementation on i.MX93-based devices with The Embedded Kit and NXP

  • CybersecurityYocto
Development vs production images embedded systems

Development vs production images in embedded systems

  • Yocto
Test bench global architecture

How to build a test bench for embedded system testing?

  • Embedded testing
AAEON - The Embedded Kit - New partnership

AAEON and The Embedded Kit announce strategic partnership and launch a fully integrated hardware/software bundle

  • CybersecurityYocto
IoT networks types

IoT networks: definition and types

  • IoT connectivity
CVE Scan web interface - Dashboard view

The Embedded Kit releases a new web interface for CVE Scan, its security vulnerability scanner

  • Cybersecurity
Webinar with STMicroelectronics a Witekio - How to keep your product secure for longer

3 steps to keep your product in the market and secure for longer

  • Cybersecurity
Prev
1 2 3 4
Next
The Embedded Kit - Logo (white)

Software Products
Welma Yocto Linux
Kamea IoT device management
Pluma automated testing tool
CVE Scan vulnerability scanner
Vulnerability management software

About
Contact
Who we are
Success stories
Plans & pricing
Support

Resources
Blog
Press releases
Webinars & podcasts
Newsletter

Compare
vs Ubuntu Core
vs Debian
vs Robot Framework
vs Black Duck
vs Timesys Vigiles

Copyright © 2026 - The Embedded Kit

Cookies - Privacy Policy & Statement - Legal Notices - Vulnerability Disclosure Policy

 

Loading Comments...