CODE QUALITY BLOG: You’ve secured your Internet of Things (IoT)-connected system with components for authentication such as password, retina scan, physical key, plus encryption/decryption and more. But building these things in is not enough. You’ve got to be certain that they all work together properly and that the code doesn’t contain any flaws that could grant access to hackers. Security needs to be built in at the very start of the project by using secure protocols and continuing on up to functional elements in the application. One powerful tool for gaining this assurance is dynamic analysis.
FOUNTAIN HILLS, AZ. Safety certification experts from LDRA are presenting a webcast titled “What You DON’T Know Can Hurt You: What you NEED to know about MISRA C:2012” at 2 pm Est. today Feb. 26 at 2 pm Est. The event is hosted by Military Embedded Systems online and OpenSystems Media.