Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

These blog posts relate to the design of secure embedded systems.

Inexpensive Firmware Process Improvements for Small Teams

Are you a member of a small design team? Does your team struggle to use industry best practices for software development because they are believed to be too costly or difficult to setup and use? In this webinar, learn practical and easy-to-apply process improvements that even the smallest design teams can use to make firmware easier to code, debug and test, with a tools cost of less than $600.

ESC Boston: Dangerous Flaws in Safety-Critical Device Design

On May 3, 2017, Barr Group CTO Michael Barr delivered this year's keynote address at Embedded Systems Conference (ESC) Boston.  In this important presentation, Michael discusses safety and security concerns that exist in the IoT landscape.  This includes designing security into connected safety-critical devices to prevent serious attacks, which can be deadly.

2017 Barr Group Embedded Systems Safety & Security Survey

For the third year in a row, Barr Group conducted its annual Embedded Systems Safety & Security Survey of embedded systems designers in an effort to gain valuable insight on the current trends in design practices for both safety-critical and non-safety critical applications. With over 2,000 participants in this year's survey, we were able to gather important and telling data from members of the embedded systems industry in the US & Canada (52%), Europe (27%), Asia (12%), and other parts of the world (9%).

Security and the IoT

by Andrew Girson

In the most recent DDoS attack, IoT devices such as webcams and DVRs were used to launch an attack on domain service provider, Dyn. The enormity of this event brings to light the importance of securing all devices capable of connecting to the internet. Developers cannot control what viruses or malware may try to attack their systems. However, developers do have a very profound impact on how resilient their products are in the event of an attack.

Pages

What’s happening and how it’s done. Get in the know.

Sign up for our newsletter today!

Receive free how-to articles, industry news, and the latest info on Barr Group webinars and training courses via email. 

To prevent automated spam submissions leave this field empty.