Electronics & Software

Software

News: Information Technology
What’s New on Tech Briefs: Can You Answer Our Readers’ Big Questions?

New web-exclusive stories this month highlight soft robots, bio-printing successes, and opportunities to answer readers' questions.

On-Demand Webinars: Information Technology
Cybersecurity Challenges and Solutions

Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk. Cyberspace and its underlying infrastructure are vulnerable to those seeking...

On-Demand Webinars: Automotive
Eliminating Blind Spots in Commercial Trucking with IoT

Learn how Internet of Things (IoT) technology strategies are revolutionizing approaches to vehicle operations. On-board diagnostics and telematics systems are a good first step, but they only...

White Papers: Information Technology
Addressing Security Vulnerabilities at the Source

Many embedded developers underestimate how vulnerable embedded devices are to cyber-attacks. When security issues do occur, organizations often respond by addressing the symptoms of poor security...

White Papers: Information Technology
How IoT is Making Security Imperative for All Embedded Software

Many IoT products lack proper security due to outdated software development practices. Hackers and criminals are acutely aware that many of the security procedures and applications in...

White Papers: Software
Developing Secure Embedded Software: Quality Doesn't Equal Security

Most organization put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that’s...

White Papers: Information Technology
Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

Many embedded systems and "connected” IoT products lack proper security due to outdated software development practices....

White Papers: Information Technology
A Guide to the MISRA Coding Standard: What you need to know

This white paper will provide your development organization with the critical information needed to adopt MISRA the standard and to quickly update code review practices and documentation...

White Papers: Software
Using Static Analysis to Overcome the Challenges of Reusing Code for Embedded Software

This paper explains why software reuse is a growing problem within development organizations, why the way embedded software is developed needs to change and...

White Papers: Electronics & Computers
ISO 26262 & Automotive Electronics Development

Compliance standards, especially those that involve relatively new functional safety elements, will likely add additional requirements to the development process. But ISO 26262, in particular, will...

White Papers: Robotics, Automation & Control
Eliminating Blind Spots in Commercial Trucking with IoT

Technology is becoming a critical business tool for truck manufacturers, fleet operators, and service centers. On-board diagnostics and telematic systems are a first step, but only provide a...

White Papers: Automotive
The Reality of Application Security: Scare Tactics or Genuine Threat?

Guardians of application security have perhaps become slightly immune to the fearful messages of cybersecurity vendors. The combination of ‘Big Data’ with an exponentially...

Briefs: Information Technology
Generalized Query Tool for Accessing the Database of the Mars Relay Operations Service (MaROS)

The Generalized Query Tool for accessing the database of MaROS can be utilized in three modes: (1) batch mode where a user's authentication...

Briefs: Information Technology
High-Performance Fault-Tolerant xEmbedded Computing (HPFEC) Benchmark Suite

This work arises out of the Next Generation Space Processor (NGSP) project, a collaborative effort among several NASA centers and the Air Force Research Laboratory....

Briefs: Information Technology
JPF-NAS Extension of Java Pathfinder

Java PathFinder (JPF) version 7 provides basic support for verifying the distributed Java applications. It can receive a distributed Java application as input that is perceived as multiple Java processes....

Technology Leaders

Tech Briefs TV