TECH BLOG

Advanced Software
Engineering
Made Simple

We have dedicated resources for each

Functional Safety in the automotive industry, part 1: The rise of C

Bogdan Andone

In the 1980s electronically controlled ignition and fuel injection systems were the first major embedded systems deployed for the automotive industry, as ignition and injection analog units started to be progressively replaced by the more controllable digital alternatives facilitated by the availability of microcontrollers.  Electronically-controlled ignition and fuel-injection systems were the first major embedded systems deployed in the automotive industry,…
Read More

Bogdan Andone

Best resources to learn and stay up to speed with .NET technologies

Technologies nowadays are evolving at an incredibly fast pace and we, as developers, have to do our best to keep up with the newest trends, features, and languages. This is because generally, the technology updates bring additional efficiency, ease of use, and the overall ability to create better products with less effort. Apart from that, programming proves to be a…
Read More

The benefits of hiring dedicated Agile teams for your software project

Working with dedicated teams is one of the key ingredients to a successful recipe for delivering projects in an Agile manner. The advantages carried by this model are applying to both the client and the company providing the services, but most importantly it has a big positive impact on the project delivery. The dedicated teams model ensures: Exclusivity and full-time…
Read More

Chip Design and ASIC Verification Basics in 2021

In a world dominated by apps and software, little or no attention is given to the actual hardware that allows apps and software to run, also known as ASIC verification. The chip, as the smallest part of any computer or laptop component, is also the most important component of any hardware system. Also known as IC (Integrated Circuits) or ASIC…
Read More

How to easily integrate authentication and encryption using SHE and HSM

Inside this post, you’ll be able to discover the main features of Secure Hardware Extensions (SHE) and understand how to properly use them. You can also get a copy of the specification from autosar.org if you do a document search for „Specification of Secure Hardware Extensions”. SHE is a simple standard that allows for easy integration of short-and-simple authentication and…
Read More

Upgrade your eCommerce Platform Leveraging Agile Transformation

We live in a day and age where agile transformation is a must for any company that wants to grow its reach and expand into new markets. Being agile becomes even more important for businesses that activate in the online commerce industry, especially in highly-competitive niches. This subject was thoroughly discussed in one of our recent webinars. During the event, our solution…
Read More

“The future of customer experience” – Showing the way forward

Tremend’s successful partnership with Salesforce recently brought together the Romanian Salesforce business community, at the Impact Hub in Bucharest, for a comprehensive presentation on the Future of Customer Experience. Over 50 professionals from all areas of business, from Financial Services, High Tech, FMCG, Agriculture, Utilities, Automotive, Cyber Security, and Retail took part in the event. It was an informal gathering, lively…
Read More

AI Ethics, Machine Law and Robophobia

Ever since the word “robot” was invented in 1920 by the Czech SF author Karel Capek, Artificial Intelligence has been associated with numerous dystopian fantasies where machines take over the world in order to destroy mankind. Today’s media is full of such references. For instance, in the Matrix, Terminator, and Black Mirror, robots are perceived as evil machines craving to take…
Read More

Key takeaways and cybersecurity stories from DefCamp ‘19

This year’s DefCamp brought together more than 60 speakers and around 2,000 participants for over two days of everything security. With three speaker tracks, a Capture the Flag competition, and multiple interactive stands that let people hack anything from basic social engineering to car steering systems, the event was a great opportunity to take a deep dive into the latest trends and…
Read More

How to Deploy your Infrastructure in Under 30 Minutes

Deploying and configuring your infrastructure takes time. Installing and configuring the services you need takes time. Deploying your applications takes time. Setting up monitoring and logging it all takes a while as well. But it doesn’t have to. In this article, we’re going to tell you how we got a production-ready environment from 0 to everything working before the coffee…
Read More

Unlock innovation and digital transformation for your business.