<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Programming &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/category/programming/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 05 Feb 2018 21:59:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Programming &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Does President Trump Want an Offline LINUX Repository?</title>
		<link>https://telegrid.com/offline-linux-repository?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=offline-linux-repository</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Mon, 15 May 2017 12:11:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[LINUX repository]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1096</guid>

					<description><![CDATA[<p>On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On May 11<sup>th</sup> President Trump signed a <a href="https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal">Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure</a>.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies.  Known vulnerabilities include using operating systems or hardware beyond the vendor&#8217;s support lifecycle, <strong>declining to implement a vendor&#8217;s security patch, or failing to execute security-specific configuration guidance</strong>.”  It seems the President agrees with something <a href="http://www.telegrid.com">TELEGRID</a> has been recommending for years, an offline LINUX repository for secure networks.</p>
<p>As an embedded software developer I can go on and on about the many benefits of LINUX.  I can easily list hundreds of benefits.  What I believe is the greatest though is the LINUX repository.</p>
<p>The LINUX repository is an online archive of open source and proprietary software packages that programmers use for development or maintenance.  There is a repository for every LINUX distribution with compiled packages for a multitude of hardware configurations.  Software developers can create upgrades or security patches and upload them to the LINUX repository where they can be easily downloaded by users.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Unfortunately, new security risks are forcing system administrators to limit connectivity between secure networks and the internet.   You can’t be hacked if a hacker can’t get in. While a closed network is ideal for security, it is a big problem for software maintenance.</p>
<p>Since the LINUX repository is online, the software upgrades are inaccessible on a secure network.  For years defense contractors, like <a href="http://www.telegrid.com">TELEGRID</a>, have had to go to great lengths to deploy software upgrades on secure networks.  This leads to delays in the deployment of security patches and seemingly endless upgrade cycles.</p>
<p>To resolve these issues we recommend replicating the LINUX repository inside secure networks with an offline LINUX repository.  But how do we update the LINUX repository if it is offline? One solution is to deploy a cross domain solution that straddles the secure and unsecure networks.  Another solution is compressing repository updates and sending them to a system administrator who can upload them into the offline LINUX repository.</p>
<p>While secure networks are important we must not forget that the main goal is functional, bug-free and secure code.  An offline LINUX repository will make it easier to maintain code on secure networks and apply needed security patches.  It seems the President agrees.</p>
<p>&nbsp;</p>
<p>Beth Flippo is Vice President of Embedded Software at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cam Newton, Blizzards, and Cybersecurity</title>
		<link>https://telegrid.com/cam-newton-blizzards-and-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cam-newton-blizzards-and-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 25 Jan 2016 21:20:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=281</guid>

					<description><![CDATA[<p>What can Cam Newton teach us about embedded software cybersecurity?  His answer to a reporter's question following Carolina's win over the Arizona Cardinals tells us everything we need to know.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cam-newton-blizzards-and-cybersecurity">Cam Newton, Blizzards, and Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As ticker tape rained down on Bank of America field the Carolina Panthers gathered to celebrate their NFC Championship win. At the center of the crowd stood Cam Newton, the quarterback and leader of the team. Surrounded by reporters Cam was asked about his preparation for the Super Bowl. Curiously Cam replied that he did not know who they would be playing but that he would be ready. He did not know who they would be playing in the Super Bowl?!? The Denver Broncos had won the AFC championship three hours earlier. In those three hours Cam did not bother to look at the scoreboard or ask a teammate who his next opponent would be?  Even with his team leading by over 30 points in the 4th quarter he didn&#8217;t stop to ask who is next?</p>
<p>My guess is that Cam was so focused on beating the Arizona Cardinals that he did not want to think about the Super Bowl. How often in sports do we see the dominant team lose because they “looked past” the current opponent? How often do they disregard the easier team only to suffer an upset? Maybe Cam Newton made a conscious decision not to look past Arizona and get distracted from the job of winning the NFC Championship. Perhaps he would have gotten overwhelmed if he thought about all of the games between him and a Super Bowl.  Maybe he knew that the only way for him to accomplish his goal was to take it “one game at a time.”</p>
<p>This lesson is obvious to all of us Northeasterners who just emerged from our igloos on Sunday after Winter Storm Jonas. Looking out at the multiple feet of snow we knew that the only way we were ever going to clear our driveways was to take it one shovel at a time (or one phone call to the plow guy – not judging). If we started worrying about the hours we were going to spend, or the potential chiropractor bills, we never would have survived.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>So what can Cam Newton teach us about embedded software cybersecurity? Just like winning the Super Bowl developing a secure embedded system is really hard (but not nearly as cool). If we stand back and look at the breadth of the problem we can easily get overwhelmed. But, if we break the problem down into pieces we will make it through. Start with a FIPS 140-2 validated encryption engine, then focus on PKI and then build your application on top. Take each step independently and make sure you develop it correctly before you move on to the next step.</p>
<p>This is the reason TELEGRID developed its <a href="http://telegrid.com/embedded-software-security/" rel="nofollow">Embedded Security Framework (ESF)</a>.  The ESF is a structured collection of encryption and authentication modules designed to accelerate the design and development of embedded systems. It is based on TELEGRID’s 30+ years of design, development and production of embedded systems in the field of voice and data encryption, secure unified communications and management of networked encryptors. The ESF helps Government Engineers design STIG compliant embedded systems quickly.</p>
<p>Eric Sharret is the Vice President of TELEGRID Technologies, Inc. <a href="http://www.telegrid.com" rel="nofollow">TELEGRID</a> designs and develops secure embedded systems for the US Military.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/cam-newton-blizzards-and-cybersecurity">Cam Newton, Blizzards, and Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 Commandments of Embedded Software Security</title>
		<link>https://telegrid.com/10-commandments?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-commandments</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 05 Nov 2015 19:20:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://ysbsqa-advanced-a.com/wp331/?page_id=2</guid>

					<description><![CDATA[<p>TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security.  This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/10-commandments">10 Commandments of Embedded Software Security</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security.  This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software.  To read the white paper <a href="http://telegrid.com/10-commandments-embedded-software-security/">click here</a></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/10-commandments">10 Commandments of Embedded Software Security</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defense Spending by State &#8211; Report Released</title>
		<link>https://telegrid.com/defense-spending-by-state-report-released?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defense-spending-by-state-report-released</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 29 Sep 2015 14:10:30 +0000</pubDate>
				<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=60</guid>

					<description><![CDATA[<p>The Department of Defense released its report on defense spending by State for 2014.  See how your State and County performed.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/defense-spending-by-state-report-released">Defense Spending by State &#8211; Report Released</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="article-body" dir="ltr">
<p>The Department of Defense released its report on defense spending by State for 2014.  It is no shock that the draw down in Iraq and Afghanistan, as well as Sequestration, have resulted in a major reduction in defense spending.  The value in this report though lies in the incredibly detailed breakdown of defense spending by State and County.  This report is not only valuable to defense contractors, like <a href="http://www.telegrid.com" target="_blank">TELEGRID</a>, but also to ordinary citizens who want to see what this impact will have on their local economy and housing market.  Below are some highlights of the report:</p>
<p>From FY2011 to FY2019 real defense spending is expected to decline by 28%. From FY2013 to FY2021 defense spending will be reduced by $454bn</p>
<p>The 5 states with the largest defense spending as a percentage of GDP were Virginia, Hawaii, Alabama, District of Columbia and Alaska. The state with the lowest defense spending as a percentage of GDP was Oregon.</p>
<p>The 5 states with the largest defense spending (in dollar terms) were Virginia, California, Texas, Maryland, and Florida. The state with the lowest defense spending was Vermont. The 10 states with the highest DoD spending accounted for almost three-fifths of total DoD spending in the nation.</p>
<p>To see how your State and County performed <a href="http://www.defense.gov/News/News-Releases/News-Release-View/Article/620776/dod-releases-fiscal-year-2014-defense-spending-by-state-report" target="_blank">click here</a>.</p>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/defense-spending-by-state-report-released">Defense Spending by State &#8211; Report Released</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government vs. Commercial Cybersecurity</title>
		<link>https://telegrid.com/government-vs-commercial-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-vs-commercial-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 08 Sep 2015 10:13:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<guid isPermaLink="false">http://telegrid.com/embeddedsecurityframework/?p=62</guid>

					<description><![CDATA[<p>In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices.  Since TELEGRID designs embedded software security tools for &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-vs-commercial-cybersecurity">Government vs. Commercial Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="article-body" dir="ltr">
<p>In the past two weeks TELEGRID engineers gave presentations on Embedded Software Security and attended talks on M2M cybersecurity, IPv6 security flaws, and personal cybersecurity best practices.  Since TELEGRID designs embedded software security tools for the US Military all of these talks were aimed at the Government.</p>
<p>As we sat and listened we began to notice a common theme.  According to the presenters, Commercial cybersecurity is head and shoulders above the Government and the only way the Government will defeat this enemy is to learn from the Commercial sector (and pay the consultant giving the talk).  We were therefore quite amused to read in this month&#8217;s issue of Harvard Business Review, the de facto bible of Industry, that HBR believes that the Government is in fact better than the Commercial sector at cybersecurity.</p>
<p>We think the simple takeaway is that cybersecurity is difficult and everyone feels like the other guy is doing it better.  We also think Government engineers should print out this article, hang it on their wall and show it to a consultant the next time they are told they should learn from the Commercial sector.</p>
<p>To read the Harvard Business Review article <a href="https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon" target="_blank" rel="nofollow">Click Here</a>.</p>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-vs-commercial-cybersecurity">Government vs. Commercial Cybersecurity</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
