Avatar photo
By: Lukas Lansky

April 12, 2022 4:35 pm

3,533 views

Safety RAM: Protecting variables with one’s complement

Firstly please read the Safety RAM: Protecting memory section with checksum blog post if you haven't as certain aspects won't be re-explained. The problem with previous CRC based method was that there shall be no parallelism or interruption during executing of critical section by others, possibly non-safe, processes. So to deal with this limitation we […]

Read More


Avatar photo
By: Lukas Lansky

January 27, 2022 3:37 pm

4,858 views

Safety RAM: Protecting memory section with checksum

This particular blog post is not going to be about Linux memory managements and its safety or how to write a safety critical software but will touch on the topic that all safety critical software must address properly. This topic is Freedom From Interference (FFI).  Before we dive in, let's define some terms and […]

Read More


Avatar photo
By: Olga Gonzalez

June 30, 2021 1:32 pm

3,659 views

Imaging at the Edge

Adoption of game-changing disruptive technologies in heavily regulated fields, such as healthcare, can prove slow, difficult and challenging. Learn how the use of Edge helps to overcome these challenges, transforming the world of medical imaging and providing innovative technology to healthcare professionals. The concept of medical imaging began in 1895 with the invention of the […]

Read More


Avatar photo
By: Michael Knop

June 17, 2021 1:17 pm

5,822 views

Jira as Requirements Management Tool (RMT)

Safety-critical industries can be flippantly defined as those where a software failure could kill you. Think automotive, aviation, or medical devices as examples. Safety-critical industries use heavy processes to ensure that (especially but not exclusively) software is developed in a safe manner. Heavy processes often need heavy tools. In terms of requirements management, those heavy […]

Read More


Avatar photo
By: Angela Ashton

January 20, 2021 12:32 am

8,517 views

Avatar photo
By: Michael Knop

December 17, 2020 10:39 am

71,399 views

An ASPICE Overview

Now that you're well-versed in the Waterfall Model and V-Model, it's time to take the step up into a wider world of ASPICE. I won't bore you with the details of its pedigree but ASPICE descends from a line of ISO documents concerned with setting up standards around software development. ASPICE stands for Automotive SPICE […]

Read More


Avatar photo
By: Michael Knop

December 8, 2020 12:59 pm

11,699 views

The V-Model

Having suffered through my adoration of the venerable Waterfall Model (WM), it's time to expand upon it and bring us out of the bronze age of system development and into the age of steam with the V-Model (VM). The VM is similar to the WM in that it promotes a flow from requirements through architecture […]

Read More


Avatar photo
By: Michael Knop

November 30, 2020 12:21 pm

5,642 views

Developer Strangelove or How I Learned to Stop Worrying and Love the Waterfall Model

Everyone loves to hate the Waterfall Model (WM) and extoll the virtues of modern development methodologies. But while people are rolling their eyes at the mere mention of the WM, they forget that it was one of the first attempts at a systematic approach to complex system development. Few first attempts turn out to be […]

Read More


Avatar photo
By: Jared Matkin

August 6, 2020 4:02 pm

5,122 views

Open Source for the Edge at IoT World

Infrastructure is becoming a more critical element in the conversations and work focused around Edge Computing. An ever-growing range of input devices, from smart phones to automotive sensors, is driving the demand for edge systems and services that can effectively and reliably bridge data between operational technology (OT) and information technology (IT). The expected output […]

Read More