Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

These blog posts relate to the design of secure embedded systems.

Barr Group to Host Free Webinar on How to Prioritize RTOS Tasks

Attendees Will Learn Optimal Methods for Meeting Hard and Soft Real-Time Deadlines

GERMANTOWN, Maryland – Dec. 15, 2016 – On January 10, 2017, Barr Group, The Embedded Systems Experts® will host a free one-hour embedded systems design webinar, “How to Prioritize RTOS Tasks (and Why it Matters)”. Presented by Barr Group Principal Engineer Salomon Singer, this live webinar will examine best practices for assigning fixed priorities to a set of real-time operating systems (RTOS) tasks and interrupt service routines (ISRs). The webinar will begin at 1:00 p.m. (EST) with a Q&A session following the presentation.

IEEE and Barr Group Emphasize the Importance of Software Safety at Special Event

Barr Group Presents “Top 10 Ways to Design Safer Embedded Software” to Engineers in Canada

GERMANTOWN, Maryland – On January 26, 2017, IEEE and Barr Group, The Embedded Systems Experts®, will co-host a special presentation of Barr Group’s “Top 10 Ways to Design Safer Embedded Software” in Toronto. In this one-day technical seminar, Barr Group will discuss 10 highly effective embedded software design techniques that can be applied to the development of safer and more reliable embedded systems. The seminar will take place at the University of Toronto’s Best Institute and is open to both IEEE members and non-members.

Barr Group Announces Spring 2017 Embedded Systems Training Calendar

“Boot Camps” on Embedded Software, Security, and Android and Two New Comprehensive Courses Offered

GERMANTOWN, Maryland – Dec. 8, 2016 – Barr Group has officially announced their Spring 2017 public training calendar for embedded systems engineers and managers. During this season, Barr Group will be offering three “Boot Camp” courses on embedded software, embedded Android, and embedded security. These comprehensive four-day courses are designed to immerse attendees in valuable aspects of embedded systems software development and improve students’ abilities in creating safe and secure embedded devices.

Security and the IoT

by Andrew Girson

In the most recent DDoS attack, IoT devices such as webcams and DVRs were used to launch an attack on domain service provider, Dyn. The enormity of this event brings to light the importance of securing all devices capable of connecting to the internet. Developers cannot control what viruses or malware may try to attack their systems. However, developers do have a very profound impact on how resilient their products are in the event of an attack.

Pages

What’s happening and how it’s done. Get in the know.

Sign up for our newsletter today!

Receive free how-to articles, industry news, and the latest info on Barr Group webinars and training courses via email. 

To prevent automated spam submissions leave this field empty.