When not working Phaedrus Systems and a few selected individuals have been musing on various topics: some arising from Phaedsys conference papers, some
from things in the news and others items that are to big to go into the Phaedsys Newsletters. The guilty are using pseudonyms as they are writing for themselves not their employers but are going to be well known to many of you (and their employers).. |
---|
If your bedtime reading includes ISO/IEC 61508 [functional Safety] Part 3 [software requirements], you will obviously have seen in the annexes A and C reference to a “certificated compiler” as highly recommended for higher SIL level projects. That is becoming most of them these days so certified compilers are being required more often. read on....
Can you patent Software in the UK in 2019? Addressing one of the most common misconceptions in the electronics industry relating to intellectual property, Sam Cleary (European Patent Attorney at Dehns) provides insight on the elusive (or not so elusive) patent for software-based inventions. Perhaps getting protection for your ideas isn’t beyond the realms of possibility, even if those ideas exist in software implementations rather than in the hardware itself.. read on....
These days there is no shortage of comment from bloggerati on safer or more secure C. Now Phaedrus brings you something different. Welcome to the Subversive C spot, where The Wicked Witch of the West shows you how both compilers and tools can be fooled by contrived coding, often with surprising consequences. read on....
Flora has had some real problems with the planned CoreSight configuration article (postponed till later). However she has revisited something that is often overlooked and almost universally under-rated - JTAG memory access. It sounds a bit boring (read memory, write memory, rinse, repeat) but read this tutorial to uncover some clever things that have been overlaid on top of this.>read on....
The Internet of Things (IoT) is growing. If you’re relaxed about that, maybe you should think again and read the latest book from security guru Bruce Schneier: Click Here to Kill Everybody: Survival in a Hyper-Connected World however whilst much of this has been known since the worm in 1988. the size and complexity of the problem has grown. > read on...
We hear horror stories in the media on such a regular basis about security breaches that we have possibly become immune to them unless like me you are in the industry. It never ceases to amaze me that large can make such fundamental mistakes, but I guess that what keeps in me a job! I am an independent Senior Security Consultant, grey hair, needs glasses to read the laptop screen, although happy to say not much spread around the middle, but enough! Who, has been in the security industry since before it became trendy. The last newsletter prompted me to think back and ask myself why we keep making the same security faux pax...... .>read on....
Profanity is an odd thing. My children come out with stuff that would make a docker blush and, yet, it is a rare occasion indeed when I resort to a curse. My parents almost never swore; I think in all my years my Mum has only ever sworn twice and although my Dad did swear a little more (and not the obscenities that even the BBC seem to think is OK) it always reserved for the car. I remember, as a youngster, going on a family outing and my Dad would always make sure he had his toolbox in the boot of the car because “the ruddy thing” would breakdown before we got to our destination and he would have to get out and fix it at the roadside. That’s when Mum would tell us all to block our ears. .>read on....
The whole world seems to be going IoT crazy at the moment with Internet connected fridges that tell me if I’ve run out of milk (because I’m too busy updating my status to open the door), Internet connected toasters that let me set how brown my toast is via an app on my smartphone and Internet enabled door bells that tell ne’er-do-wells that I’m not home right now and the nearest police are (according to their Twitter feed) at least 20 minutes away. All of these are making my life more fulfilled whilst..... .>read on....
There is a faily simple way lf not having any "bugs" in software. This solution has been used by many for decades (saving both time and money in the process. So lets make 2018 the year we finally get rid of "bugs" in software .>read on....
A fascinating article on why "my language is best" and why none of them are. Where are the other 450 languages Ada was supposed to replace? Why isn't everyone using SPARK? .>read on....
The Wicked Witch in her work in setting up and maintaining some MS Windows 7 computers, has written some notes which may be of interest to development teams (or their IT support depts) who are not rushing to Win10. The project was for a compiler validation exercise, where you have to be very precise in the setup which often leads to some deeper questions being asked read on....
A fascinating article on the lexicon of writing your own programming language and an introduction to FORTH .>read on....
Chris is a great campaigner against the religion that open source software is inherently better and more secure than closed source. However, at times I he goes too far, and assumes anyone from the open-source community can’t be talking sense. One case is Chris’s recent reaction to Linus Torvalds’ commentss.>read on....
Why bother with Trade shows and conferences? Aren’t they just full of salesmen trying to make commission and all the information is on the Internet anyway? Well, not exactly and it is not a simple as it sounds. This became obvious as I attended a raft of conferences and trade shows over the last 5 months.>read on....
After last month’s missive in these pages, your author wondered whether his article might have been a little complacent. Probably it wasn’t, but some other developments have put things in an alternative light.... > read on...
TWW signed out last year with an heads-up piece on Mozilla's new language Rust. This month she gets into some details. Rust fans speak of the trifecta of Rust which refers to its safety, speed and concurrency. Let's deal with speed first. > read on....
This article discusses the IoT is not static, everything changes. The cloud is virtual and, like real clouds, it can move or evaporate altogether leaving you with nothing. In some cases the cloud will move location or change ownership and the new owners change the rules. You may get caught out or locked out if your cloud services evaporate>read on....
A recent article in ArsTechnica reports that NSA can break 512-bit elliptic curve cryptographic keys to facilitate “man-in-the-middle” attacks on internet communications. Apparently, to initiate key-exchange dialogues, most internet servers use numbers generated from only a limited set of elliptic curves..... > read on...
The Mozilla Foundation has become the latest outfit trying to provide a language that extends C without creating the disadvantages of C's successors, C++, Java and C#. The language, called RUST, has an eclectic approach to language design, citing many earlier languages as influences. Mozilla has supported the development of RUST as a language for its future client/server products. > read on....