Software

Our development and support services

If you lack sources or abilities for software program development, the YOCTO TUTOR crew can aid your company. We can help you in your improvement initiatives (the total cycle or simply a section of it) in an high-quality and obvious way. Throughout the cooperation, we goal to make certain everyday improvement of the assignment in phrases of time and budget, including new points to current purposes regularly (for example, 2-6 weeks relying on needs). We use ‘Agile‘ methodologies to enable you to get consequences straight away and Version Control Systems to continuously reveal the development of the work. Outsourcing task development will assist you use interior sources extra successfully and get entry to high-level applied sciences barring extra investment.

Board Support Package

We increase BSPs for Linux embedded running structures with the most famous hardware architectures: PowerPC, ARM, x86, MIPS.
We create custom-made BSPs to shortly put into effect an running machine and take full benefit of the performance of the underlying hardware platform. We can configure the BSP to meet our customers’ specs for precise peripherals, running gadget features, file structures and reminiscence types.
We can additionally create a boot loader to initialize and personalize hardware and machine drivers and we have massive journey in porting open supply boot loaders like U-Boot.

Yocto Project

The Yocto Project™ is an open supply collaboration assignment that presents templates, equipment and strategies to assist you create customized Linux-based structures for embedded merchandise regardless of the hardware architecture. It used to be situated in 2010 as a collaboration among many hardware manufacturers, open-source working structures vendors, and electronics corporations to carry some order to the chaos of embedded Linux development.
As an open supply project, the Yocto Project operates with a hierarchical governance shape primarily based on meritocracy. This permits the undertaking to continue to be unbiased of any one of its member organizations, who take part in a range of approaches and furnish sources to the project.

Qt applications (C++/QML)

Qt is a cross-platform improvement framework enabling your group to installation GUI (graphical consumer interface) supplying frequent APIs throughout all supported platforms. This effects in full-size financial savings in improvement of graphical interfaces. Our proficient builders group can advance Qt functions on Linux embedded structures with C++/QML language.

Software updates (OTA)

Embedded structures are turning into increasingly more complicated and their software program displays their complexity. New aspects and worm fixes require that the software program on an embedded device can be up to date without a doubt reliably. Our engineers can help you discover the proper answer for your problem.

Secure Boot / Chain of Trust

Ensure your gadget is now not walking tampered software program by using verifying its authenticity earlier than execution. Establish software program authenticity all the way from the

  • bootloader to person applications. Our impervious boot offerings help implement:Verified 
  • bootloader (NXP i.MX / QorIQ, Qualcomm Snapdragon, TI Sitara, Atmel SAMA5, Xilinx Zynq and more)
  • Kernel verification (FIT image, SoC unique mechanisms)
  • Root filesystem verification (dm-verity, IMA/EVM, FIT image)
  • Filesystem cryptography, Filesystem-level encryption (dm-crypt)

Device Encryption and Secure Key Storage

You can guard IP and touchy consumer statistics through encrypting data/software.
It is additionally fundamental to defend the key used for encryption the usage of a impervious storage mechanism. Additionally, software program that handles private information must run from inside a hardware/software-isolated environment. We supply options and offerings that span:

  • Anti-cloning (IP and Data Protection)
  • Key Management and invulnerable key storage
  • Data safety the usage of encryption — In use, in motion, and at rest
  • Trusted Platform Module (TPM)
  • Trusted Execution Environment (TEE) the usage of Arm TrustZone and OP-TEE
  • Device identification and authentication