Jamie Ayre with Adacore talks to Rich Nass with Embedded Computing Design about the ``Make with Ada'' challenge that occurred earlier this year. The contest aimed to help the embedded software community improve the quality of their code by encouraging the use of the Ada and SPARK programming languages. The competition ran from May 15 to September 15, 2017. Jamie also discusses a new safety and security product. For more details on Adacore, visit www.adacore.com. For more things that you missed at ARM TechCon 2017, click here.
- Embedded Technologies Expo
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Product Search
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
Home » Security » Adacore discusses "Make with Ada" challenge and new product announcement at #ARM TechCon 2017
Take our reader survey, win a $50 Amazon gift card
It only takes a few minutes and you'll help our team deliver relevant and engaging content.
We also recommend:
AMG Systems Releases Mini Media Converter for Security and Transport Applications
Housed in a mini chassis, AMG’s new Mini media converters are ideal for connecting field-based equipment to Ethernet networks over long distances via fiber.
Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?
Learn how binary scanning is emerging as a critical activity for securing the complex software supply chain that exists in vehicles.
Demystifying the Physically Unclonable Function (PUF)
PUF stands for physically unclonable function. From a technical standpoint, PUF exploits minute differences in silicon that appear from chip to chip to create a binary value.
How to Establish an Effective Data Quality Policy for Your Business
By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.
Microchip AC164160 Secure IoT Sensor Node
This development/evaluation board features Wi-Fi connectivity, an ATmega4808 processor, and an ATECC608A cryptographic co-processor to restrict data to authorized users and systems.
CES 2019: Attendance Slightly Down, Innovation Way, Way Up
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...
Another Record Year for Vulnerabilities … Time to Join the CIA?
No, not that CIA. I mean the security concept known as the CIA Triad that refers to Confidentiality, Integrity and Availability.
OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol
The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).
"Zero Touch" IoT Security Is Key to Continued Growth
By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...
IoT Security (Finally) Delivers ROI
To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...
Securing the IIoT with Flexible Firewalls
Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...
A 4-Step Guide to Security Assurance for IoT Devices
Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.
Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs
Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi
Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
So, How Secure are your Coding Practices? Ask AdaCore
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
IAR Systems leads the way for secure IoT development based on Arm TrustZone and Arm Cortex-M
The leading independent Arm tools provider enables companies to go to market early with robust, secure IoT products
Significance of Certified Ethical Hacker (CEH) Training and Certification
In order to save your company from online hackers, the significance of becoming a Certified Ethical Hacker (CEH) is gaining momentum around the world.
Software Development Life Cycle Stages When Getting Started on a New Idea
When you work in the software industry, you're likely aware of how open, flexible and innovative the market is.
2018 Top Embedded Innovator – Allison Clift Jennings, CEO, Filament