Risk Assessment of Essential Product Requirements: Prerequisites
Episode 63: Better Built By Burkhard
Episode 63: Better Built By Burkhard
Many embedded Linux systems use a Wayland compositor like Weston for window management. Qt applications act as Wayland clients. Weston composes the windows of the Qt applications into a single window and displays it on a screen. I still have
Episode 62: Better Built By Burkhard
Once we have removed an item from a BitBake variable, we cannot re-append it. The evaluation of the following three assignments of the variable BB_VAR yields the same result, no matter in which order the assignments are executed. # Code
When we look closer at the support period, we'll find more and more interesting questions. * Does the support period start, when the end user buys a product or when a product is released, manufactured or sold for the
Episode 61: Better Built By Burkhard
Episode 60: Better Built By Burkhard
According to Annex I Part II of the EU CRA, manufacturers must actively search for vulnerabilities in their embedded devices, fix them and publicly disclose them to their users and the cybersecurity authorities. Manufacturers must implement a process to release
Episode 59
When developing the operator terminals for their machines, OEMs must reinvent the wheel over and again. Each OEM implements home-grown solutions for standard features like OTA updates, user authentication, factory installation, machine gateways and IoT gateways. None of these features
Every manufacturer must implement the essential requirements in Annex 1 Part 1 of the EU CRA in their products. They must also document how they comply with the essential requirements in a conformity assessment. The wording of the essential requirements