Operations | Monitoring | ITSM | DevOps | Cloud

Successful Launch - Then Came The Problems

About 15 years ago, I worked at a company building network security appliances (with ARM-based network processors) and was responsible for the development of custom Linux firmware. The product launch was successful; we shipped and managed a large fleet of devices in the field. After a few firmware releases, we received alerts from the device management system telling us that there were intermittent problems. Remoted into the appliances but could not reproduce the error.

COREDUMP #009: Zephyr's Meteoric Rise and What It Means for the Future of Embedded

In today’s Coredump Session, we dive into the origins and evolution of Zephyr RTOS with Kate Stewart, VP of Dependable Embedded Systems at the Linux Foundation. From Intel’s early ambitions to a thriving global community, Kate unpacks how Zephyr grew into a leading open-source RTOS and what makes it uniquely resilient and developer-friendly. This conversation also explores the technical shifts shaping embedded development and how governance, safety, and collaboration continue to steer Zephyr’s trajectory.

The History Behind Area Codes and Why They Still Matter Today

In the era of smartphones, internet calling, and global connectivity, the concept of an area code might seem like a relic of the past. But these three-digit numbers continue to serve a vital role in telecommunications, even as technology advances far beyond the rotary phones of the mid-20th century.

Is Your Product Safe? Crucial Steps Every Engineering Leader Should Know

Are you sure your product is truly secure? In this eye-opening video, we uncover the often overlooked basics that most companies miss. Discover why understanding your product's components and vulnerabilities is a game-changer in cybersecurity. Plus, learn why monitoring CVEs and addressing weak credentials could be your next crucial steps.