![](files/content/img/Blog_default.png)
If you have been working in the world of Linux, you get used to a whole host of command line tools simply being available for use ...
![](files/content/img/Blog_default.png)
Ever since I started my career in the semiconductor industry, the seemingly tacit knowledge that errors found late ...
![](files/content/img/Blog_default.png)
In our earlier post we looked at how the intrepid team at "Hudson Technologies" tackled a transient software bug in an oven contr ...
![](files/content/img/Blog_default.png)
In part 1 of this blog post, we looked that the coverage metrics that are highly recommended in ISO 26262 for software uni ...
![](files/content/img/Blog_default.png)
It is interesting to find out what approaches different people use to test their application code prior to delivering it to the m ...
![](files/content/img/Blog_default.png)
Originally this post was going to review another code failure case in Lisa Simone's book "If I only changed the software, ...
![](files/content/img/Blog_default.png)
Previously in this blog we have talked about the value of code tracing for embedded systems development and how trace forms the e ...
![](files/content/img/Blog_default.png)
We probably never take the time to think about it when we drive in our cars, but between our hands sits a small explosive device ...
![](files/content/img/News_default.png)
Schwabhausen, Stuttgart, 14.04.2016 – Vector and iSYSTEM today introduce their co-operatively designed VCA0301 – an in ...