In this post, we meet the BeaglePlay! The latest SBC from Beagleboard.org. With everything that you would expect from an SBC and some innovative additions, you will definitely want to own one right away!
This is part 4 in a series about OP-TEE, the trusted part of a secure linux implementation. In this part, we see how to write and build our first trusted application based on a simple example.
This is the part 2 in the series of posts about OP-TEE. In this post, we talk about the various components of the OP-TEE project, what their roles are and finally touch up on Global Platform.
Looking for a great introduction to the PKCS#11 standard? Look no further! This post talks about PKCS#11, Cryptoki and demonstrates practically how to use PKCS#11 tokens to achieve mutual TLS authentication.
Embedded systems are tough. Implementing security the right way is even tougher for such systems. Let us look at how a hardware security chip can help address the challenges in connected IoT nodes.
In the tenth part of this series on Yocto, we talk about SDKs! How to build them, install them and finally use them to build your next awesome application!
In the last four posts, we have talked about creating a new Yocto layer, and creating custom recipes. Let us bring all of that together by building our first custom image! Read on...
In the last post, we talked about writing a basic bitbake recipe. Often in the real world, we use tarballs for storing their source tree. Read on to know how to write bitbake recipes that use tarballs!
In the last post, we saw the first step towards creating a custom image i.e. creating a new layer. We did that so that it could house our custom recipes. Do you want to know how to make your own bitbake recipes? Read on...
In this detailed post, we will see how to build a basic Yocto image for the world's favourite computer - Raspberry Pi!