top of page


Why Firmware Security is Critical?
The spotlight often shines on software and hardware security. Yet, lurking beneath the surface, lies a critical layer often overlooked, firmware . This low-level software embedded in our devices, from routers and smart thermostats to industrial control systems and medical devices, acts as the vital link between hardware and operating systems. Its security, or lack thereof, can have profound consequences. The proliferation of Internet of Things (IoT) devices has exponentially

Nandita Gadgil
Apr 28, 20252 min read
Â
Â
Â


Android on RiscV Part - II
The Problem statement: Our customer expressed their desire to know if Android (AOSP) was already ported by community to the RiscV platform and if we could provide a detailed summary of the current status of AOSP compilation/build and Qemu emulation progress for RiscV What have we accomplished in Part - I: We launched a Bare Metal instance on AWS Downloaded the AOSP source code Configured and built the binaries for AOSP RiscV What we plan to accomplish in Part - II: Install Cu

Anup Halarnkar
Sep 2, 20242 min read
Â
Â
Â


Android on RiscV Part - I
The Problem statement: Our customer expressed their desire to know if Android (AOSP) was already ported by community to the RiscV platform and if we could provide a detailed summary of the current status of AOSP compilation/build and Qemu emulation progress for RiscV Introduction to AOSP: Android is an open source operating system for mobile devices and an open source project led by Google. Android Open Source Project (AOSP) repository offers the information and source code

Anup Halarnkar
Aug 22, 20242 min read
Â
Â
Â


Root causing a memory corruption on Arm64 VMs
We recently migrated one of our websites to Azure Arm64 VMs. However, as soon as we pushed the infrastructure change in production, we started to observe our server process being restarted infrequently. These restarts may happen within a few seconds sometimes while not occurring for hours at other times. While the redundancy in our setup ensured minimal end-user impact, we wanted to quickly address the issue at hand. Looking at the logs A quick look at the logs showed the fol

Rajeev Gadgil
Dec 2, 20232 min read
Â
Â
Â
bottom of page

