About:

Burkhard Stubert is a solopreneur specializing in smart HMIs for embedded devices, sharing insights on system architecture and team dynamics.

Website:

Specializations:

Interests:

System architecture Team topologies Continuous delivery Test-driven development Refactoring Continuous integration FOSS licensing SoM and SoC selection Solo business
Subscribe to RSS:
The post discusses the risk assessment and mitigation strategies for remote access to ECU parameters in harvesters, emphasizing the importance of access control and security measures. It outlines various mitigation strategies, inc...
The blog post discusses the process of risk assessment for essential product requirements, particularly focusing on the first step: identifying risks. The author outlines a five-step process for lean risk assessment, emphasizing t...
The blog post discusses the author's preparation for a talk on EU Cyber Resilience Act (CRA) compliance, focusing on the risk assessment of essential product requirements. It emphasizes the importance of manufacturers conducting t...
The blog post discusses a webinar hosted by Sarah Fluchs on risk assessment in compliance with the CRA (Cybersecurity Risk Assessment). It highlights the top concerns of manufacturers regarding risk assessment, including interpret...
The author discusses the implications of the Cyber Resilience Act (CRA) for manufacturers, emphasizing the urgency for compliance to avoid penalties and sales bans starting in 2028. The text outlines the challenges of integrating ...
The post discusses a special offer for a course on License Compliance for Embedded Linux Systems and outlines the steps for evaluating and prioritizing risks associated with user stories in compliance with EU regulations. It empha...
The post highlights the struggles of a business owner while critiquing the Cyber Resilience Act's vagueness and the reliance on courts for defining cybersecurity standards.
The author discusses their understanding and research on the EU Cyber Resilience Act (EU CRA), emphasizing the importance of legal texts, guidelines, and expert resources. They highlight the transitional period for compliance and ...
The text discusses the importance of secure OTA updates for embedded devices to comply with the EU Cyber Resilience Act. It also highlights the vulnerability of cars to cyber attacks, particularly the Subaru hack and the CAN injec...
The EU Cyber Resilience Act is important for manufacturers to comply with essential requirements related to product properties and vulnerability handling to avoid heavy penalties and damages from cyber attacks. The Act has been in...
The article discusses the basics of microservices, focusing on extracting microservices from a modular monolith. It provides insights into the benefits and costs of microservices, and the author's personal experiences and opinions...
The article discusses the anti-tivoisation clause for LGPL-2.1 and whether it should already hold for libraries under LGPL-2.1. It provides a detailed analysis of a legal case involving a German router maker and the implications f...
The text discusses the importance of teamwork in the embedded ecosystem, focusing on the Yocto Project Summit 2024.12. It highlights the challenges faced by system integrators in implementing OTA update solutions and secure boot, ...
The text discusses the challenges of building custom embedded Linux systems, focusing on the lack of end-to-end solutions, copy-and-paste programming, and outdated systems. It highlights the need for microservices to simplify OTA ...
The text discusses the issues with the Qt license agreement, highlighting the pitfalls and ambiguities. It advises customers to thoroughly read and evaluate the agreement before signing. It also suggests potential changes to the a...
The text discusses the Crowdstrike update disaster, which caused a massive outage on Windows computers, affecting millions of devices and costing billions of dollars. It highlights the failures of Crowdstrike, Microsoft, and their...
The Embedded Online Conference 2024 took place last month, and the videos and live Q&A sessions are now available for $295. The author summarizes the talks by Jacob Beningo, Steve Branam, and Kate Stewart. The author also contribu...
The text is a round-up of Embedded World 2024 by Burkhard Stubert. It discusses the challenges of OTA updates, the need for secure boot, and the impact of the EU Cyber Resilience Act. It also mentions companies offering OTA update...
The text is a round-up of the Yocto Project Summit 2023.11. It includes information about OTA updates, building Qt applications as part of the Yocto build, setting up a CI pipeline with a self-hosted GitHub Actions Runner, using V...
The text discusses the server side of over-the-air updates for embedded Linux systems. It covers topics such as full, delta, and partial updates, the process of rolling out updates to devices, the importance of staged rollouts, an...
The text discusses the importance of over-the-air (OTA) updates for devices, particularly focusing on the client side. It highlights the challenges faced by VW in updating their cars and the consequences of manual updates. The tex...
The text discusses the implications of using Qt or any other library under LGPL-3.0 for B2C and B2B products. It explains the rights of the owner to install a modified version of the software and the responsibilities of the manufa...
The EU Cyber Resilience Act (CRA) is introduced to address the increasing cyberattacks on hardware and software products. The act defines two main objectives: Manufacturer Perspective and User Perspective. It applies to products w...
McKinsey adds five metrics to the DORA and SPACE metrics to measure the productivity and performance of organisations, teams and developers. The metrics include inner/outer loop time spent, developer velocity index benchmark, cont...