<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>The Blog (Technologies )</title><link>https://blog.systerel.fr/</link><description>Posts about technologies developed or used by Systerel.</description><atom:link href="https://blog.systerel.fr/tags/cat_technology.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2026 &lt;a href="mailto:contact@systerel.fr"&gt;Systerel&lt;/a&gt; </copyright><lastBuildDate>Thu, 09 Apr 2026 12:39:54 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Fuzzing tests</title><link>https://blog.systerel.fr/posts/2026-02/fuzzing-tests/</link><dc:creator>Cinthya Kouamou</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="figure "&gt;&lt;a href="https://blog.systerel.fr/images/fuzzing.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/fuzzing.thumbnail.png" class="float-right"&gt;&lt;/a&gt;&lt;p class="caption"&gt;&lt;small&gt;Principle of fuzz testing. (Source: cybermatters.info)&lt;/small&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In the development of industrial software, it is common to manipulate complex binary protocols, 
specific data formats. These components are traditionally validated using unit tests, 
an effective approach to verify expected and well-defined behaviors.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2026-02/fuzzing-tests/"&gt;Read more…&lt;/a&gt; (7 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>s2opc</category><category>tests</category><guid>https://blog.systerel.fr/posts/2026-02/fuzzing-tests/</guid><pubDate>Mon, 16 Feb 2026 11:00:18 GMT</pubDate></item><item><title>Model Checking: Formal Modeling and Verification</title><link>https://blog.systerel.fr/posts/2025-04/model-checking-formal-modeling-and-verification/</link><dc:creator>Nicolas Breton</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/logo_smart-solver.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/logo_smart-solver.thumbnail.png" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Model Checking: Formal Modeling and Verification&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Model Checking&lt;/em&gt; is a &lt;em&gt;Formal Safety Verification&lt;/em&gt; method in which
tools are used to analyze a model of a system in order to verify if it
respects some safety properties. The analysis is performed by exploring
every possible evolution trace of the system&lt;sup id="fnref:1"&gt;&lt;a class="footnote-ref" href="https://blog.systerel.fr/posts/2025-04/model-checking-formal-modeling-and-verification/#fn:1"&gt;1&lt;/a&gt;&lt;/sup&gt;, verifying that the
properties hold on these traces.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2025-04/model-checking-formal-modeling-and-verification/"&gt;Read more…&lt;/a&gt; (5 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>b2bt</category><category>hll</category><category>s3</category><guid>https://blog.systerel.fr/posts/2025-04/model-checking-formal-modeling-and-verification/</guid><pubDate>Thu, 24 Apr 2025 16:18:44 GMT</pubDate></item><item><title>TermiNA</title><link>https://blog.systerel.fr/posts/2024-05/termina/</link><dc:creator>Robert Cholay</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/termina/terminal.jpg" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/termina/terminal.thumbnail.jpg" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Dans le cadre d'un portage Ada que nous avons réalisé pour un de nos
clients, et en accord avec ce dernier, nous avons reconsidéré la façon
dont l'application originelle en mode console gérait les traces et les
logs.&lt;/p&gt;
&lt;p&gt;Le système de traces et de logs souffrait des limitations suivantes :&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2024-05/termina/"&gt;Read more…&lt;/a&gt; (4 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><guid>https://blog.systerel.fr/posts/2024-05/termina/</guid><pubDate>Thu, 23 May 2024 16:06:33 GMT</pubDate></item><item><title>INI-tiation</title><link>https://blog.systerel.fr/posts/2024-04/ini-tiation/</link><dc:creator>Robert Cholay</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/adainit/ini.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/adainit/ini.thumbnail.png" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Configurer un logiciel peut se faire de différentes façons. La première
est, par exemple, d'utiliser des options sur la ligne de commande. Cela
se fait au travers du paquetage &lt;code&gt;Ada.Command_Line&lt;/code&gt; ou encore plus
simplement au travers du paquetage &lt;code&gt;GNAT.Command_Line&lt;/code&gt; qui permet de
définir et de traiter simplement les options d'une ligne de commande.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2024-04/ini-tiation/"&gt;Read more…&lt;/a&gt; (3 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><guid>https://blog.systerel.fr/posts/2024-04/ini-tiation/</guid><pubDate>Wed, 10 Apr 2024 12:36:44 GMT</pubDate></item><item><title>Comment voir la matrice ?</title><link>https://blog.systerel.fr/posts/2024-01/comment-voir-la-matrice/</link><dc:creator>Robert Cholay</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="figure float-right"&gt;&lt;a href="https://blog.systerel.fr/images/matrix/matrix.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/matrix/matrix.thumbnail.png"&gt;&lt;/a&gt;
&lt;p class="caption"&gt;&lt;a href="https://rosettacode.org/wiki/Matrix_digital_rain"&gt;https://rosettacode.org/wiki/Matrix_digital_rain&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;L'objet de cet article est de montrer au travers d'un exemple complet
quelques évolutions apportées par le langage Ada₂₀₂₂. Nous allons
faire ici un bref focus sur :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;La généralisation de l'attribut &lt;code&gt;'Image&lt;/code&gt;,&lt;/li&gt;
&lt;li&gt;Les nouveaux types d'agrégats pour les tableaux,&lt;/li&gt;
&lt;li&gt;Une utilisation des « Bigs Numbers ».&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2024-01/comment-voir-la-matrice/"&gt;Read more…&lt;/a&gt; (5 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><guid>https://blog.systerel.fr/posts/2024-01/comment-voir-la-matrice/</guid><pubDate>Mon, 08 Jan 2024 09:54:36 GMT</pubDate></item><item><title>Portons-nous bien</title><link>https://blog.systerel.fr/posts/2023-11/portons-nous-bien/</link><dc:creator>Robert Cholay</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/galets.jpg" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/galets.thumbnail.jpg" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Problématique&lt;/h2&gt;
&lt;p&gt;Dans le cadre de certains portages Ada, on peut souhaiter continuer à
faire vivre un temps le code &lt;em&gt;legacy&lt;/em&gt; tout en commençant à utiliser le
code porté.&lt;/p&gt;
&lt;p&gt;Si, à l'issue du portage, on découvre un problème ou une évolution dans
le code &lt;em&gt;legacy&lt;/em&gt;, on devra alors reporter les modifications induites
dans le code porté. On peut aussi avoir la situation inverse. En
d'autres termes, les codes devront coexister.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2023-11/portons-nous-bien/"&gt;Read more…&lt;/a&gt; (3 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><guid>https://blog.systerel.fr/posts/2023-11/portons-nous-bien/</guid><pubDate>Mon, 13 Nov 2023 13:57:02 GMT</pubDate></item><item><title>Securing IIoT communications using OPC UA PubSub and Trusted Platform Modules</title><link>https://blog.systerel.fr/posts/2023-01/securing-iiot-communications-using-opc-ua-pubsub-and-trusted-platform-modules/</link><dc:creator>Olivier Gilles, Daniel Gracia-Perez, Pierre-Antoine Brameret, Vincent Lacroix</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/opcua_pubsub_tpm/lock.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/opcua_pubsub_tpm/lock.thumbnail.png" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the Industry 4.0 context, data are a valuable asset that must be protected.
OPC UA PubSub enables secure and interoperable solutions, but authentication
of &lt;abbr title="Industrial Internet of Things"&gt;IIoT&lt;/abbr&gt; devices remains a sensitive issue. This article presents a novel approach based
on open source software, using a Trusted Platform Module to protect secrets on
devices, and evaluate the security level on a predictive maintenance use case.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2023-01/securing-iiot-communications-using-opc-ua-pubsub-and-trusted-platform-modules/"&gt;Read more…&lt;/a&gt; (47 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>opcua</category><category>s2opc</category><guid>https://blog.systerel.fr/posts/2023-01/securing-iiot-communications-using-opc-ua-pubsub-and-trusted-platform-modules/</guid><pubDate>Thu, 05 Jan 2023 11:23:15 GMT</pubDate></item><item><title>Generating and verifying configuration data with OVADO²®</title><link>https://blog.systerel.fr/posts/2023-01/generating-and-verifying-configuration-data-with-ovado/</link><dc:creator>Frédéric Badeau, Joris Lamare</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;a href="https://blog.systerel.fr/images/rssr22/ovado.png" class="image-reference"&gt;&lt;img src="https://blog.systerel.fr/images/rssr22/ovado.thumbnail.png" class="float-right"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The OVADO²®&lt;sup id="fnref:1"&gt;&lt;a class="footnote-ref" href="https://blog.systerel.fr/posts/2023-01/generating-and-verifying-configuration-data-with-ovado/#fn:1"&gt;1&lt;/a&gt;&lt;/sup&gt; tool has been used for more than a decade to formally
check whether system configuration data comply with their rules in the
context of railway systems&lt;sup id="fnref:2"&gt;&lt;a class="footnote-ref" href="https://blog.systerel.fr/posts/2023-01/generating-and-verifying-configuration-data-with-ovado/#fn:2"&gt;2&lt;/a&gt;&lt;/sup&gt;. OVADO²® is currently deployed in &lt;abbr title="Safety Integrity Level 4"&gt;SIL4&lt;/abbr&gt;
processes compliant with the safety requirements of the &lt;a href="https://en.wikipedia.org/wiki/IEC_61508"&gt;CENELEC
EN 50128&lt;/a&gt;
standard. In these processes, it is considered a
T2-class tool since it only helps to verify the system. This article
describes how the OVADO²® tool has been used, for the first time, by
Systerel to formally generate equipment configuration data derived from
the system configuration data.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2023-01/generating-and-verifying-configuration-data-with-ovado/"&gt;Read more…&lt;/a&gt; (8 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>formal</category><category>ovado</category><category>validation</category><guid>https://blog.systerel.fr/posts/2023-01/generating-and-verifying-configuration-data-with-ovado/</guid><pubDate>Tue, 03 Jan 2023 15:18:38 GMT</pubDate></item><item><title>Back-to-back Testing</title><link>https://blog.systerel.fr/posts/2022-11/back-to-back-testing/</link><dc:creator>Anaïs Guignard, Julien Niguez, Nicolas Breton, Vincent Pouzol</dc:creator><description>&lt;div&gt;&lt;img alt="Back-to-back zebras" class="float-right" src="https://blog.systerel.fr/images/b2bt/zebrasbacktoback.png" style="width: 240px;"&gt;
&lt;p&gt;Back-to-back testing (B2BT) techniques are used to verify that
two products of a software development process are
equivalent. By running the two products "back to back"
on a set of test cases, it is verified that they produce
the same output. If the scenarios are chosen carefully
and the two runs produce the same results, it can be
inferred that the two products are equivalent with some
level of confidence.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2022-11/back-to-back-testing/"&gt;Read more…&lt;/a&gt; (24 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>b2bt</category><category>formel</category><category>s3</category><category>validation</category><category>vérification</category><guid>https://blog.systerel.fr/posts/2022-11/back-to-back-testing/</guid><pubDate>Tue, 08 Nov 2022 10:21:44 GMT</pubDate></item><item><title>Use of B method for dynamic structures in S2OPC</title><link>https://blog.systerel.fr/posts/2021-06/b-method-for-dynamic-structures-in-s2opc/</link><dc:creator>Frédéric Badeau, Vincent Lacroix, Vincent Monfort, Laurent Voisin</dc:creator><description>&lt;div&gt;&lt;p&gt;The software B method has so far been mainly used in the industrial
world to develop safety critical software with very basic memory
management limited to arrays of fixed size defined at compilation time.&lt;/p&gt;
&lt;p&gt;We present here an alternative approach for modelling software based on
a more classic memory management with dynamically allocated complex data
structures accessed through pointers.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://blog.systerel.fr/posts/2021-06/b-method-for-dynamic-structures-in-s2opc/"&gt;Read more…&lt;/a&gt; (7 min remaining to read)&lt;/p&gt;&lt;/div&gt;</description><category>b</category><category>s2opc</category><guid>https://blog.systerel.fr/posts/2021-06/b-method-for-dynamic-structures-in-s2opc/</guid><pubDate>Tue, 22 Jun 2021 09:57:44 GMT</pubDate></item></channel></rss>