
Sign up to save your podcasts
Or


Send us a text
On this episode of Embedded Insiders, we’re joined by Paul Butcher, Senior Software Engineer at AdaCore, to discuss how AI can make fuzz testing even more robust through the integration of techniques like symbolic execution and input-to-state correspondence that optimize test data sets against scenarios a system might encounter in the real world.
Next, Brandon heads back into the Industrial Metaverse with part 2 of a Blueprints series – created in partnership with Bosch, Cloud Blue, the MathWorks, NVIDIA, and Siemens – which reveals how the combination of cyber-physical systems, model-based systems engineering, and digital twins can provide a path to solving some of the world’s most complex problems.
But first, Brandon and Rich express their hesitations about the European Commission’s proposed Cyber Resilience Act, which requires manufacturers to protect their IoT and IIoT device from unauthorized access at all stages of the product lifecycle.
How Hacks HappenHacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...
Listen on: Apple Podcasts Spotify
For more information, visit embeddedcomputing.com
By Embedded Computing Design4.2
1111 ratings
Send us a text
On this episode of Embedded Insiders, we’re joined by Paul Butcher, Senior Software Engineer at AdaCore, to discuss how AI can make fuzz testing even more robust through the integration of techniques like symbolic execution and input-to-state correspondence that optimize test data sets against scenarios a system might encounter in the real world.
Next, Brandon heads back into the Industrial Metaverse with part 2 of a Blueprints series – created in partnership with Bosch, Cloud Blue, the MathWorks, NVIDIA, and Siemens – which reveals how the combination of cyber-physical systems, model-based systems engineering, and digital twins can provide a path to solving some of the world’s most complex problems.
But first, Brandon and Rich express their hesitations about the European Commission’s proposed Cyber Resilience Act, which requires manufacturers to protect their IoT and IIoT device from unauthorized access at all stages of the product lifecycle.
How Hacks HappenHacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...
Listen on: Apple Podcasts Spotify
For more information, visit embeddedcomputing.com

32,006 Listeners

271 Listeners

383 Listeners

289 Listeners

1,646 Listeners

626 Listeners

585 Listeners

231 Listeners

190 Listeners

214 Listeners

289 Listeners

64 Listeners

348 Listeners

10,785 Listeners

64 Listeners