Special Coverage

Self-Healing Wire Insulation
Thermomechanical Methodology for Stabilizing Shape Memory Alloy (SMA) Response
Space Optical Communications Using Laser Beams
High Field Superconducting Magnets
Active Response Gravity Offload and Method
Strat-X
Sonar Inspection Robot System
Home

A Guide to the MISRA Coding Standard: What you need to know

This white paper will provide your development organization with the critical information needed to adopt MISRA the standard and to quickly update code review practices and documentation efforts.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

Read More >>

Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

An introduction to applying CWE coding guidelines and achieving CERT security compliance using static analysis tools Many embedded systems and "connected” IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

Read More >>

Developing Secure Embedded Software

Quality Doesn’t Equal Security Most organization put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that’s inherently insecure; and quality assurance does little to ensure security.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

Read More >>

How IoT is Making Security Imperative for All Embedded Software

Why embedded software development needs to change and what organizations can do to improve software security while reducing development time Many IoT products lack proper security due to outdated software development practices. Hackers and criminals are acutely aware that many of the security procedures and applications in use today were designed to defend against attacks in the PC era – not current IoT threat vectors. Security isn't a product "add-on" or feature; it must be built in. Learn about the unique challenges of securing embedded applications and how to deploy processes and tools to deliver more secure products faster.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

Read More >>

Addressing Security Vulnerabilities at the Source

A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software Many embedded developers underestimate how vulnerable embedded devices are to cyber-attacks. When security issues do occur, organizations often respond by addressing the symptoms of poor security rather than the root causes.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

Read More >>

BALFIT Version 3.1 Multivariate Regression Analysis and Regression Model Optimization Software

Ames Research Center, Moffett Field, California The software package BALFIT was developed for both the processing of wind tunnel strain-gage balance data and the analysis of more general multivariate experimental data sets. The software uses automatically generated regression models for the analysis. These optimized regression models are the result of the application of a math model search algorithm to a given multivariate data set. This important feature of BALFIT greatly reduces the time it takes to do an analysis. It has also made the prediction of the dependent variable values more reliable because widely accepted objective metrics are used for the regression model term selection.

Posted in: Briefs, Electronics & Computers, Software

Read More >>

Mariana Text Classification System

Ames Research Center, Moffett Field, California Support Vector Machines (SVM) can be used as a binary classifier for a wide range of data and problems. For text, it is often used to determine automatically if a document belongs to a given topic category. Automatic and reliable classification of documents can be an invaluable tool for industries that monitor problem reports, accident reports, maintenance logs, and corrective action reports that span different specialties.

Posted in: Briefs, Electronics & Computers, Software

Read More >>

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.