When starting an IoT project, it's crucial to consider several constraints that will heavily impact hardware and communication medium choices. This article explores these major concerns and how they guide decision-making to develop IoT devices.
There are numerous communication channels that you can use to reach the cloud. Choosing the right IoT communication protocol requires reflecting on the following constraints: energy consumption, throughput, latency, range, cost, security, public or private network, coverage, and obsolescence. We will divide them into two categories: short-range and long-range.
Firmware updates are nowadays an essential aspect of our embedded systems management. Whether it's fixing bugs, optimizing performance, introducing new features, or patching security vulnerabilities, firmware updates play a pivotal role in ensuring the longevity and reliability of all types of devices. Let's take a look at how to define your firmware update strategy.
Having a comprehensive understanding of your software's components and dependencies has become vital with the increasing complexity of software applications and the growing concern of supply chain attacks.
On this page, we will guide you through the process of creating, managing, and utilizing SBOMs (Software Bill of Material) to enhance your software development practices. By leveraging SBOM, you can enhance your software development processes, strengthen supply chain security, and protect your organization against potential threats.
With the upcoming cybersecurity regulations, you will probably be expected to detect, monitor and communicate on the vulnerabilities of your embedded Linux systems. That’s where Linux vulnerability scanners come in handy.
Dive into the strengths and weaknesses of four prominent software composition analysis (SCA) tools to identify and mitigate the vulnerabilities of your embedded Linux systems: cve-check by the Yocto Project, Vigiles by Timesys, Black Duck by Synopsys, and CVE Scan by The Embedded Kit.
The advent of embedded devices has ushered in remarkable advancements across industries, yet with connectivity comes a heightened susceptibility to cybersecurity threats. As regulatory bodies worldwide respond to this pressing concern, the European Union is at the forefront with the Cyber Resilience Act (CRA), aimed at fortifying the security of embedded devices. While the CRA awaits finalization by the European Commission, its proposed directives suggest a significant overhaul in cybersecurity requirements for European equipment manufacturers. Let's delve into the potential implications of the CRA and the additional measures manufacturers must consider to secure their embedded devices and ensure compliance.
Embedded systems have become ubiquitous in our modern world, powering everything from smart appliances to industrial machinery. At the heart of many of these systems lies Linux, the open-source operating system renowned for its flexibility and customization options. However, navigating the intricacies of embedded Linux can be daunting, especially for those unfamiliar with its nuances.
At The Embedded Kit, we’ve conducted a study and gained valuable insights into the challenges and opportunities facing OEMs in the embedded Linux landscape. Discover the key takeaways from the study Pierre Gal shared with Rich Nass on the Embedded Executive podcast.
When evaluating a system on module for your next generation product, the focus naturally shifts towards module performance and its ability to run your business applications.
However, the journey takes a different turn once hardware selection is made and the path to production begins. It becomes imperative to customize your system to ensure its security. In this article, we delve into two complementary solutions that facilitate Avnet Embedded SMARC module evaluation and accelerate the transition to production: SimpleSwitch and The Embedded Kit.
When it comes to understanding the boot sequence in ARM-based hardware architectures, it's important to note that ARM-based architectures are not as standardized as their Intel counterparts, with each manufacturer adding their own unique touch. But first, let’s get back to what exactly the boot sequence is.
Choosing the right software for your hardware is crucial for a strong and secure product. In this blog post, we'll compare popular embedded Linux options like Windriver, Ubuntu Core, Welma Yocto Linux, Debian, or even create your own custom distribution independently or with a service provider. Join us to find the best Linux distro for your embedded system.