Content

Meet the Codethings: Ben Dooks talks about Linux kernel and RISC-V Thumbnail

Ben Dooks is our Senior Engineer and Open Source Consultant with more than 15 years’ experience contributing to Linux Kernel. Dooks joined Codethink 8 years ago, and since then he's been involved in a range of projects involving the Linux kernel, such as the MEG project, amongst others.

2021 Open Source Events Thumbnail

Conferences and events are a valuable way to grow an open source project. They're a space for software engineers, team leaders, architects and open source enthusiasts to discuss ideas, share points of views, identify solutions and introduce new software developments.

Xmas Cartoon

We got this open source cartoon as an Xmas gift... hope you like it

FOSDEM Dev Room Safety and Open Source Software Thumbnail

FOSDEM is coming, 6th and 7th of February 2021! In addition to attending the virtual event, this time Codethink engineers will be curating the Safety and Open Source Software Dev Room.

Bazel BuildStream Thumbnail

Bazel and BuildStream are tools which are commonly used to organize and delegate the building of software. There are a few key differences between them but largely they are concerned with the same development problems.

Advent of Code

It's that happy time of the year again! And we are not only talking about hearing "All I Want For Christmas Is You" every time you go to the supermarket. We are talking about Advent of Code.

Interrogizer header

In our previous blog post we introduced the Interrogizer project. Interrogizer is a logic analyser, which means it samples binary signals and sends the samples to a host computer as fast as possible.

pcb image

Interrogizer is an Open Source project, aimed at providing developers with an affordable and easily producible tool to aid troubleshooting by enabling measurement of digital signals. Started from a desire to share hardware knowledge around Codethink, the device uses a small microcontroller placed on a simple PCB that can be easily and cheaply produced; allowing for iterations of the product as development progresses.

fingerprint

In an evermore software-intensive world, the security of software systems has become a critical part of product design and implementation. One way in which attackers exploit software systems is by crafting malicious inputs. The defence to such attacks is a combination of defensive programming techniques including input validation.

Topplot

In this post I'm going to talk about the recent tranche of work I've put into a tool I wrote called topplot, which plots graphs from the data produced by the system utility top.

Older Content

Get in touch to find out how Codethink can help you

sales@codethink.co.uk +44 161 660 9930

Contact us