The 90 Percent Trap

Surviving the Best Day of our Careers

by Kevin Morris

The VP was obviously impressed. In fact, “blown away” wouldn’t have been overstating it. The demo had gone perfectly, and even when he’d asked questions that took us off script, we were able to show what he wanted to see. His excitement was palpable. I knew before he walked out the door that we’d get what we wanted.

Funding.

Our little team, made up of some of the most talented software engineers I’d ever met, had been working 12-14 hours per day for the past two weeks to get this demo ready. In reality, a lot of it was smoke and mirrors. We’d cobbled together TCL scripts to fill in holes in our system where development hadn’t even been started yet. There were some places where the “values” that showed in the GUI were hard-coded. But, behind the scenes, the engine was actually running and doing its job. Databases were being written and read. Actual output files were being generated. It was REAL.

Or, probably, at least 90% real.  Read More


latest news

March 21, 2017

AdaCore Releases GNAT Pro 17 Development Environment for SYSGO’s PikeOS RTOS

SmartBear Launches SwaggerHub Integration with IBM Cloud for Direct API Deployment

AdaCore Publishes Handbook on DO-178C/ED-12C Guidance

March 17, 2017

Green Hills Software and Imagination Announce INTEGRITY RTOS Support for MIPS I6400 CPU

March 16, 2017

Green Hills Software and Imagination Announce INTEGRITY RTOS Support for MIPS I6400 CPU

Vector Software Adds Configuration-Based Test Cases to its VectorCAST Test Automation Platform

March 15, 2017

Greenwave Systems Unveils Edge Analytics Integration for VxWorks

VectorCAST/Analytics Offers Development Teams Real-Time Access to Actionable Code Quality Metrics

March 14, 2017

Express Logic Introduces First Industrial-Grade IoT Device-to-Cloud Connectivity Platform

Renesas Expands Renesas Synergy™ Platform and Reaches Unprecedented Software Quality Levels

Wind River Transforms Future of Industrial IoT with Breakthrough Software Platform for Control Systems

March 13, 2017

Mentor Graphics Achieves ISO 26262 Certification for Questa Product Line Tool Qualification Report

LDRA Collaboration with Green Hills Software Provides Comprehensive Solution for Verification of High-Assurance Embedded Systems

Synopsys' IC Compiler II Completed Certification for TSMC's 7-nm Process Technology

UbiquiOS Enables TLS Security for IoT Devices With Low Cost Embedded Wireless Stack

Software News Archive

World Doesn’t End, Part II

Microsoft’s Experiments with ARM Don’t Signal the End of Intel Servers

by Jim Turley

Our Bots, Ourselves

Does Responsibility for Bots Lie with the Programmer or the User?

by Jim Turley

The Future is Verified

Looking Forward to DVCon 2017 with Dennis Brophy

by Amelia Dalton

Security: Hard and Soft

Next Up: A Tortoise That Checks Your Chip for Flaws

by Jim Turley

Calling All Cores!

Standards, Tools, and Solving the Multi-Core Heterogeneous Computing Software Conundrum

by Amelia Dalton

Software Article Archive

 

Editors' Blog

Safety and Security Conference

posted by Dick Selwood

With the growth of the IoT there is increased interest in the overlapping areas of safety and security. There is already a lot of knowledge on these issues and this has been shared by the IET's International System Safety and Cyber Security Conference. The eleventh version of this conference is running from 11—13 October 2016 in London. (14-Sep)

Use Ada and win money

posted by Dick Selwood

Got An idea for an embedded project that will be running on an ARM Cortex M or R? Then – if you get your skates on - there is still time to take part in AdaCore's Make with Ada competition and as well as getting your project completed you could be in for a share of $88,000 prize money. (29-Aug)

Securing the core

posted by Dick Selwood

A Franco-German announcement brings improved security to SoCs for the IoT (17-Nov)

Through-The-Looking-Glass Security

posted by Bryon Moyer

While most security operations are intended to take place far from the light of day, that’s not always possible. If you know people can see what you’re computing, then obfuscation can help hide what you’re actually doing. Microsemi has helped explain how that obfuscation works. (16-Nov)

Toyota Unintended Acceleration

posted by Dick Selwood

What really happened with Toyota? (11-Nov)

Software Editors' Blog Archive

 

forum

Ongoing Sensor Work

Posted on 03/23/17 at 12:13 PM by bmoyer

bmoyer
What do you think about the improvements being made to these sensors?

Is Exactly-Once Delivery Possible with MQTT?

Posted on 03/20/17 at 11:42 AM by dborisov

Thank you for great article! It really helps to understand QoS levels nuances!

Could you please describe does MQTT somehow specify what should happen if PUBCOMP missed in case of QoS 2?

I mean if receiver has sent PUBCOMP but ACK tcp packet missed a…

An Old Cantilever Is New Again

Posted on 03/20/17 at 11:09 AM by bmoyer

bmoyer
What do you think of Menlo Micro's approach to RF and power (and other) switches?

Radio FPGA!

Posted on 03/20/17 at 4:01 AM by steverino

I would be curious as to whether Xilinx has made arrangements with third party vendors to have chip antennas ready to go with these parts.

Software Forum Archive

subscribe to our software development newsletter



Software On Demand Archive


Login Required

In order to view this resource, you must log in to our site. Please sign in now.

If you don't already have an acount with us, registering is free and quick. Register now.

Sign In    Register