Skip to content
Services
Consulting
Architecture & technology roadmap
Redesign & refactoring
Performances, optimizations, profiling
CI/CD
Security workshops
Test strategy
Development
Embedded software
Firmware
IoT connectivity
Qt
Embedded system applications
Maintenance & security
CVE scanner
Long term support
Risk assessment & security mechanisms
ON-DEMAND RESOURCES
Consulting
Software development services overview
Software security & maintenance services
On-demand engineering resources
Expertise
Technical Expertise
Methods & Processes
Spotlight on
Edge AI
BSP development
Zephyr RTOS
LEARN
Embedded Software
Applications & GUI
IoT Platform
Embedded software
Industry
Medical
Industrial Machinery
Off-Highway Vehicles
Energy
Home appliances
Case Studies
Company
About us
Code of Conduct
Join us
Partners
Resources
Blog
Guides & eBooks
Webinars
Newsletter
About us
Join us
Partner
English
Français
Deutsch
Contact us
Resources
Tech Talks
Practical, expert-led webinars to help you master embedded, connectivity, and cloud technologies.
About us
Guides & eBooks
NEWSLETTER
Yocto in the real worlds: lessons from Industrial, Consumer and Off-Highway deployments
Embedded Software
<span class="wtk-tag-list__delimiter"></span>
Yocto
AI POWERED MEDICAL DEVICES
Medical Devices
The Cyber Resilience Act – Avoid Penalties and Enhance Security
Cybersecurity
How to Build a Long-Lasting Yocto Platform on i.MX8
Embedded Development
<span class="wtk-tag-list__delimiter"></span>
Yocto
Managing and Maintaining a Yocto Distribution with Secure Updates
Embedded Development
<span class="wtk-tag-list__delimiter"></span>
Yocto
Understanding Yocto Variables and Overrides
Embedded Development
<span class="wtk-tag-list__delimiter"></span>
Yocto
Page
1
Page
2
Newsletters
Signup