Category Blog

3 major concerns regarding IoT devices hardware selection

3 major concerns regarding IoT devices hardware selection

When starting an IoT project, it's crucial to consider several constraints that will heavily impact hardware and communication medium choices. This article explores these major concerns and how they guide decision-making to develop IoT devices.
Define the best firmware update strategy for your embedded system

Defining an effective firmware update strategy for MPU-based devices

Firmware updates are nowadays an essential aspect of our embedded systems management. Whether it's fixing bugs, optimizing performance, introducing new features, or patching security vulnerabilities, firmware updates play a pivotal role in ensuring the longevity and reliability of all types of devices. Let's take a look at how to define your firmware update strategy.
Example of Software Bill of Materials (SBOM) - Welma Yocto Linux The Embedded Kit

What is a Software Bill of Materials? SBOM meaning & management process

Having a comprehensive understanding of your software's components and dependencies has become vital with the increasing complexity of software applications and the growing concern of supply chain attacks. On this page, we will guide you through the process of creating, managing, and utilizing SBOMs (Software Bill of Material) to enhance your software development practices. By leveraging SBOM, you can enhance your software development processes, strengthen supply chain security, and protect your organization against potential threats.
Vigiles vs cve-check vs Black Duck vs CVE Scan _ SCA tool comparison for embedded Linux systems

Vigiles vs cve-check vs Black Duck vs CVE Scan: SCA tool comparison for embedded Linux systems

With the upcoming cybersecurity regulations, you will probably be expected to detect, monitor and communicate on the vulnerabilities of your embedded Linux systems. That’s where Linux vulnerability scanners come in handy. Dive into the strengths and weaknesses of four prominent software composition analysis (SCA) tools to identify and mitigate the vulnerabilities of your embedded Linux systems: cve-check by the Yocto Project, Vigiles by Timesys, Black Duck by Synopsys, and CVE Scan by The Embedded Kit.
Securing embedded devices: navigating the implications of the EU Cyber Resilience Act

Securing embedded devices: navigating the implications of the EU Cyber Resilience Act

The advent of embedded devices has ushered in remarkable advancements across industries, yet with connectivity comes a heightened susceptibility to cybersecurity threats. As regulatory bodies worldwide respond to this pressing concern, the European Union is at the forefront with the Cyber Resilience Act (CRA), aimed at fortifying the security of embedded devices. While the CRA awaits finalization by the European Commission, its proposed directives suggest a significant overhaul in cybersecurity requirements for European equipment manufacturers. Let's delve into the potential implications of the CRA and the additional measures manufacturers must consider to secure their embedded devices and ensure compliance.
The Embedded Kit in Embedded Executive podcast by Embedded Computing Design - 2024

Embedded Linux development challenges may not be what you think – Embedded Executive Podcast

Embedded systems have become ubiquitous in our modern world, powering everything from smart appliances to industrial machinery. At the heart of many of these systems lies Linux, the open-source operating system renowned for its flexibility and customization options. However, navigating the intricacies of embedded Linux can be daunting, especially for those unfamiliar with its nuances. At The Embedded Kit, we’ve conducted a study and gained valuable insights into the challenges and opportunities facing OEMs in the embedded Linux landscape. Discover the key takeaways from the study Pierre Gal shared with Rich Nass on the Embedded Executive podcast.
The Embedded Kit x SimpleSwitch - From Avnet Embedded SMARC module evaluation to production

From Avnet Embedded SMARC module evaluation to secure production

When evaluating a system on module for your next generation product, the focus naturally shifts towards module performance and its ability to run your business applications. However, the journey takes a different turn once hardware selection is made and the path to production begins. It becomes imperative to customize your system to ensure its security. In this article, we delve into two complementary solutions that facilitate Avnet Embedded SMARC module evaluation and accelerate the transition to production: SimpleSwitch and The Embedded Kit.
Example of a boot sequence for a system running on an iMX8

Boot sequence in ARM-based hardware architectures

When it comes to understanding the boot sequence in ARM-based hardware architectures, it's important to note that ARM-based architectures are not as standardized as their Intel counterparts, with each manufacturer adding their own unique touch. But first, let’s get back to what exactly the boot sequence is.
Linux distribution comparison - Debian, Ubuntu Core, Windriver, Welma Yocto Linux - The Embedded Kit

Linux distribution comparison: Debian, Ubuntu Core, Windriver, Welma Yocto Linux

Choosing the right software for your hardware is crucial for a strong and secure product. In this blog post, we'll compare popular embedded Linux options like Windriver, Ubuntu Core, Welma Yocto Linux, Debian, or even create your own custom distribution independently or with a service provider. Join us to find the best Linux distro for your embedded system.