The Embedded Frontier Podcast Por Jacob Beningo arte de portada

The Embedded Frontier

The Embedded Frontier

De: Jacob Beningo
Escúchala gratis

OFERTA POR TIEMPO LIMITADO | Obtén 3 meses por US$0.99 al mes

$14.95/mes despues- se aplican términos.

The Embedded Frontier, hosted by embedded systems expert Jacob Beningo, is a cutting-edge podcast dedicated to exploring the rapidly evolving world of embedded software and embedded system trends. Each episode delves into the latest technological advancements, industry standards, and innovative strategies that are shaping the future of embedded systems. Jacob Beningo, with his deep industry knowledge and experience, guides listeners through complex topics, making them accessible for both seasoned developers and newcomers alike.

This podcast serves as an educational platform, offering insights, interviews, and discussions with leading experts and innovators in the field. Listeners can expect to gain valuable knowledge on how to modernize their embedded software, implement best practices, and stay ahead in this dynamic and critical sector of technology. Whether you're an embedded software developer, a systems engineer, or simply a tech enthusiast, "The Embedded Frontier" is your go-to source for staying updated and inspired in the world of embedded systems. Join Jacob Beningo as he navigates the intricate and fascinating landscape of embedded technologies, providing a unique blend of technical expertise, industry updates, and practical advice.

© 2025 Beningo Embedded Group, LLC
Economía
Episodios
  • #021 - From Pray and Patch to Proactive: Modernizing Embedded Security
    Dec 11 2025

    Visit our sponsor's website to learn more about their embedded security solutions at https://www.RunSafeSecurity.com/jacob

    This episode explores the critical shift from reactive "patch and pray" security approaches to proactive embedded security strategies. Host Jacob discusses common vulnerabilities in embedded systems, real-world security threats from nation-state actors, and practical tools and processes developers can implement to secure their devices throughout the entire development lifecycle.

    Key Takeaways:

    • Memory exploits (buffer overflows, out-of-bounds reads/writes, use-after-free) are the most common embedded system vulnerabilities
    • Nation-state actors like Voltaifun are actively targeting critical infrastructure through embedded devices
    • Even simple connected devices like $20 coffee makers pose significant security risks through botnets and grid manipulation
    • Supply chain attacks have risen 700% in recent years, requiring secure programming and signed keys throughout manufacturing
    • Threat Model Security Analysis (TMSA) should be performed upfront to identify critical data and potential attack vectors
    • Hardware isolation using ARM TrustZone, multi-core processors, or memory protection units provides essential security layers
    • Software Bill of Materials (SBOM) helps track open source components and monitor for newly discovered vulnerabilities
    • Static and dynamic analysis tools should be integrated into CI/CD pipelines for continuous security monitoring
    • Security must be considered throughout the entire device lifecycle, from design to end-of-life decommissioning
    • Proactive security approaches using runtime protection tools are more effective than reactive patching strategies

    Más Menos
    38 m
  • #020 - Embedded DevOps with GitLabs Darwin Sanoy
    Nov 26 2025

    In this episode of the Embedded Frontier podcast, host Jacob interviews Darwin from GitLab's field CTO office about the adoption and implementation of DevOps practices in embedded systems development. They explore the unique challenges embedded developers face when modernizing their workflows, including managing complex codebases with hundreds of millions of lines of code, compliance requirements, and the critical differences between software-only products and embedded systems where software is just one component of the final product.

    Key Takeaways:

    • Embedded systems require different DevOps approaches than pure software products since shipping software doesn't mean shipping the final product
    • Modern vehicles contain 650 million lines of code in 2025, up from 200 million just five years ago, creating new complexity management challenges
    • Three categories of embedded systems each need different DevOps strategies: digital disruptors, stable machines, and functional safety systems
    • Containerized builds and shared development environments eliminate "works on my machine" problems and create reproducible, auditable builds
    • Software supply chain security through Solza attestation provides traceability from source code to final artifacts
    • Compliance as code can automate many regulatory requirements like ISO 26262 and MISRA C++, reducing manual bottlenecks
    • AI integration at the platform level helps embedded developers onboard to DevOps without becoming DevOps experts
    • Continuous delivery (creating release-ready firmware) is more appropriate for embedded than continuous deployment to production
    • Automated testing and QA are crucial to prevent manual processes from becoming the limiting factor in development speed
    • Over-the-air updates in embedded systems require managed deployments with higher reliability than cloud container replacements

    Más Menos
    25 m
  • #019 – Modernizing Embedded Systems: Step #3 – Adopt DevOps
    Nov 18 2025
    This podcast episode explores step three of modernizing embedded software development: adopting DevOps practices to solve the critical problem of late and over-budget project delivery in embedded systems. Host Jacob Beningo discusses the four core DevOps principles, presents a compelling case study of the Ariane 5 rocket failure that cost $500 million, and provides practical guidance for implementing CI/CD pipelines to improve software quality and delivery speed.

    Key Takeaways:

    • Only 35% of embedded development teams deliver projects on time, with most running 3-6 months late
    • DevOps focuses on incremental value delivery, improved collaboration, automation, and continuous improvement
    • The Ariane 5 rocket explosion ($500 million loss) could have been prevented with proper integration testing and CI/CD practices
    • Start DevOps implementation with automated builds using containers to create unified development environments
    • Enforce code quality and standards automatically within CI/CD pipelines using tools like Misra C/C++
    • Implement regression testing to catch bugs early when they're easier and less costly to fix
    • Use metrics analysis to automatically identify tight coupling and potential bug locations in code
    • Artifact management ensures traceability and ability to deliver specific software versions to customers
    • Deployment automation should at minimum enable automatic hardware testing, even if not direct customer deployment
    • DevOps creates a value feedback loop between companies and customers through observability and telemetry
    Más Menos
    30 m
Todavía no hay opiniones