Welcome to our library
If you’re looking for guidance on embedded technology, you’ve come to the right place.
These published resources are the result of many hours of research and development, and available to you for free.
Click on any of the links below to learn more about the documents offered here, and to download them for your own use.
Whitepapers and Presentations
This paper evaluates two different safety development standards and provides a high level comparison between a well-used standard for aviation and a more recent standard for automotive that can be applied to other transportation systems with no available standards.
This presentation walks through common themes in safety-critical standards, as well as specific rules from aviation, automotive, medical, industrial, and even nuclear requirements.
No matter the length and readability of your code, there is always the possibility for bugs. Debug functions allow for easier error identification, however, and this presentation lays out the reasoning behind our preference for the GNU Project Debugger.
For software engineers familiar with working with a typical embedded microprocessor, it may seem daunting to get started with an FPGA. This series explores methods that will allow you to optimize your heterogeneous embedded system’s performance and accelerate your algorithm with FPGAs.
This educational series walks through common themes in IoT development, ways you can build robust new products, as well as how you might improve your existing ones. Once finished, you’ll be moving your IoT project toward a more confident launch.
ARINC 653 is the standard which flight-certified software development must meet. DornerWorks’ Virtuosity® Hypervisor does this by isolating applications to run independently of one another, each in its own virtual container called a “partition,” providing mutually-exclusive access to all necessary systems without affecting the performance of an unrelated partition.
Interrupts are forbidden in ARINC 653 partitioned environments – or so it appears. In this paper we examine that prohibition and explore a means of using interrupts in a system while maintaining deterministic behavior.
A partitioning environment is one of the components of an avionics architecture aligned with the Future Airborne Capability Environment (FACE). In this paper, we explore the design of a hypervisor to provide the partitioning specified in the FACE Technical Standard.
System-on-Chips help embedded system developers achieve size, weight, power, and cost savings through consolidated architecture. However, combining software functions onto a single computing resource creates added safety and security concerns. Here, we assess the suitability of common separation solutions and explain our preference for Xen, an open source Type I hypervisor.
Cybersecurity Resources and Training
Global IP traffic first exceeded one zettabyte in 2016, and in 2020 alone, the world had approximately 44 zettabytes of data.
That is a lot of data and protecting any of it is a colossal task, especially while the sophisticated hackers and nation states searching for valuable data in cyberspace will hesitate at nothing to gain access to it.
At DornerWorks, we take these threats very seriously. We undergo Penetration tests to ensure our network is secure, and work with industry partners to ensure we follow best practices.
Our Compliance Standards include:
- ISO 13485
- ITAR registered
- NIST 800-171
- CMMC Level 3
The integrity of our customers data is vital to us, and we’ve put together the following resources to help you implement stronger cybersecurity into your products and organization:
Security Highlight podcast
Subscribe to our podcast feed or find episodes below.
- How to Keep Medical Software Secure from Intrusion and Data Breaches
- How seL4 can Protect Against Massive Data Breaches
- How Microchip’s Authentication Chip Makes IoT Devices More Secure
- Enable the Security Potential and Versatility of seL4 in Medical Device Development
- Practical Cryptography for the Internet of Things
- An Introduction To Building Secure Systems with the seL4 Microkernel
- Over-The-Air Updates Will Help You Reduce Risk and Win Customers for Life
- 3 Areas You Need to Be Familiar with to Understand MQTT Security Fundamentals
- The Top 3 Ways to Build a Secure IoT Device
Medical device security resources
- Postmarket Management of Cybersecurity in Medical Devices
- All Cybersecurity Guidances (2005, 2014, 2016, 2018)
- MedTech moving from the facility to the home
- Increasing incidence of attacks on hospitals
- Hospitals on heightened alert
- AHA Advisory
- 2019 lawsuit alleging death of a baby
- FDA Warning URGENT/11
- Software Bill of Materials (SBOM)