Blog

在这里,您可以查阅来自鉴释研发专家以及特邀作者的观点和话题讨论。如过您想收到我们的最新消息,请订阅我们的邮件

seL4 Summit 2022 Recap

2022-11-01 | By Yuning Liang

As seL4 moves onto automotive applications, having industry standards will be a big step forward for mass adoption. Iso 26262 ASIL-D is well known...

read the story

ROMA Pre-order

2022-06-28 | By Deepcomputing

Introducing ROMA - the world’s first RISC-V laptop. With cutting-edge features, ROMA lets you directly expand and explore the native RISC-V development...

read the story

OWASP #5 Broken Access Control

2021-10-19 | By Jason Lu

In the OWASP Top Ten list, the number 5 vulnerability is Broken Access Control. This is concerned with how web applications grant systems access to...

read the story

Empowering Customers the Xcalibyte Way – An Interview with Gavin Bu

2021-10-14 | By Gavin Bu

From smart-locks at homes to self-driving vehicles on the road, new technologies such as artificial intelligence, blockchain, and 5G continue to promote the...

read the story

The Customer First Philosophy!

2021-09-14 | By Yanwen Lu

Our Product Manager, Yanwen, shares her insights on how to prioritize customer satisfaction by actively maintaining communication with customers, and deliver static code analysis tools...

read the story

What is the Connection Between CERT & CWE?

2021-08-26 | By Tan Rahman

Up to 90% of software security problems are caused by defects in source code. Coding standards are critical to eliminate vulnerabilities. Our latest blog post...

read the story

OWASP #4 XML EXTERNAL ENTITIES (XXE)

2021-08-09 | By Jason Lu

The safest way to prevent XXE is to always disable External Entities completely. Disabling these also makes the parser secure against denial of services (DOS...

read the story

Introduction to Compiler Technology

2021-07-16 | By Jianxin Lai

Most technologists agree that Moore’s Law, the two-fold increase of the number of transistors placed upon a chip each year, has come to...

read the story

OWASP #3 Sensitive Data Exposure

2021-06-09 | By Jane Yang

The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...

read the story

Embedded Programming and IoT – Memory Management Criticality!

2021-05-18 | By Tan Rahman & Jane Yang

In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...

read the story

通过使用我们的网站,表明您已经阅读并理解我们的Cookie政策及隐私政策