Product development can be challenging. To simplify the process of selecting a product development partner, this blog post delves into the importance of partnership, highlighting the success of our agile reporting and quality assurance processes.
This blog post guides you through the earliest stages of our product engineering process, from the initial call to the ROM estimate to the development of a scope of work, highlighting the critical importance of communicating early and often.
This blog post guides decision-makers along the path to selecting the right product development partner for their project. From engineering capabilities and the development process to cost, IP and much more, our experts highlight the top tips to consider.
I’m super excited to announce that Mark Carrington will be joining Cardinal Peak as president at the beginning of the year. Mark is a seasoned Silicon Valley executive who comes to Cardinal Peak with a wealth of relevant experience in finding solutions for customers and building successful world-class teams. I’m looking forward to working with… View Article
For the last couple of weeks I’ve been meaning to blog about a book I recently read, but I have been so inundated by my to-do list that I couldn’t find the time — or, more accurately, the discipline — to sit down and apply myself to writing this post. That’s ironic: The book in… View Article
The tech industry is constantly changing. New languages come in and out of style, and new WYSIWYG editors make GUI design easier than ever. Unlike app development and IoT, the embedded world has been largely isolated from these changes until now. Code for embedded devices is still written in C or occasionally C++, and the… View Article
This past week, Cardinal Peak director of server and web software engineering, Matt Osminer was featured in an in-depth, two-part expert interview on the Synscort blog. Matt discusses Big Data and many of the solutions we employ at Cardinal Peak. He also talks about dev ops, when to outsource, and improving ROI in data management…. View Article
A couple weeks ago, Kevin Gross posted about the myth of a hacker-proof IoT. His post gave a great high-level overview of ways to make the IoT as secure as possible, and it got me thinking about some more in-depth methods for attempting to attain the security we crave in the IoT industry, especially where… View Article