
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
1 - 1,000 - Monthly Reach
Unique listeners across all episodes (30 days)
1 - 5,000 - Active Followers
Loyal subscribers who consistently listen
1 - 500
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
Recent episodes
#021: Hardware at Software Speed: How BootLoop Is Bringing AI to the Bench for Firmware Teams
Mar 25, 2026
Unknown duration
#020: The Hidden Architecture of Autonomy: How Skydio Drones Think, See, and Connect
Jan 29, 2026
Unknown duration
#019: END-OF-YEAR CELEBRATION: Moments You Loved, Stories You Missed, and 2026 Predictions You Need
Dec 11, 2025
Unknown duration
The Hidden Complexity of Sleep Tech: Power, Comfort, and 8 Hours of Reliability
Nov 26, 2025
Unknown duration
#017: Building and Scaling a Startup in the Ultra-Competitive Health Wearables Market
Oct 29, 2025
Unknown duration
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Description | Length | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 3/25/26 | #021: Hardware at Software Speed: How BootLoop Is Bringing AI to the Bench for Firmware Teams | Summary:In today's Coredump Session, we sit down with Noah Pasek-Nelson and Chris Markus, the co-founders of BootLoop: an AI-powered platform purpose-built for firmware teams. The conversation gets into the real mechanics of how AI actually fits into embedded development workflows, from hardware bring-up and driver generation to hardware-in-the-loop testing and field debugging. Noah and Chris bring hard-won perspective from SpaceX, MIT, and FDA-regulated medical devices, and they don't shy away from the messy questions— hallucination, autonomy, trust, and what it actually takes to close the loop when your runtime is physical hardware.Key Takeaways:BootLoop is an AI platform built for the entire firmware lifecycle, from hardware bring-up through field debugging, not just code generation.The two core pillars are hardware understanding (ingesting schematics, data sheets, netlists) and hardware interaction (oscilloscopes, logic analyzers, GDB).Firmware engineers only spend about 20% of their time writing code. The rest is testing, debugging, and validation, which is where BootLoop focuses.Agents do their best work in tight feedback loops. BootLoop builds, flashes, and tests on device automatically so the agent can iterate without human intervention.Hardware understanding eliminates hallucination by grounding the model in your specific chips, register maps, and pin configurations rather than public code averages.Power optimization is a standout use case: feed in the data sheet, connect a power meter, set a target, and come back to optimized code.BootLoop supports C, C++, Rust, Zephyr, bare metal, and embedded Linux. HDL and FPGA support is coming.Sentinel, their field debugging product, automatically kicks off root cause analysis the moment a bug comes in from the field, before an engineer even sits down.Pricing is a flat fee with unlimited usage, intentionally aligned so the incentive is correct code, not more code.New chips are supported as fast as you can upload the documentation. There is no supported chips list.Chapters:00:00 Intro: AI at the Bench for Firmware Teams02:23 What Is BootLoop? Meet the Founders05:18 What Actually Changes Day-to-Day for Firmware Engineers07:13 The Hallucination Problem and How to Solve It in Hardware09:51 From Data Sheet to Flashed Device: A Live Workflow Demo11:20 Oscilloscopes, GDB, and Natural Language: Hardware Interaction Explained13:34 How Much Babysitting Does an AI Agent Actually Need?45:59 Greenfield vs. Brownfield: Where BootLoop Fits Best47:33 Audience Q&A: Business Model, Security, and Supported Chips57:35 Debugging in the Field: Sentinel, MCP, and Root Cause Analysis1:00:04 Closing Thoughts and How to Get a DemoJoin the Interrupt Slack Watch this episode on YouTube [ADD Playlist YT Link from here)Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 1/29/26 | #020: The Hidden Architecture of Autonomy: How Skydio Drones Think, See, and Connect | Spotify DetailsIn today's Coredump Session, François Baldassari and Chris Coleman sit down with Ross Yeager, VP of Device Platform Software at Skydio, to explore how autonomy is reshaping modern robotics and what it takes to build drones that can truly think for themselves. Ross shares his journey from Boosted Boards to Skydio, unpacking how the company pioneered fully autonomous flight, built a vertically integrated manufacturing operation in California, and created a foundation that blends cutting-edge software and hardware. It’s a conversation about leadership, innovation, and the engineering mindset behind one of the most advanced drone platforms in the world.Key Takeaways:Ross Yeager's journey into embedded engineering began with a passion for electronics and product development.Kickstarter projects provided valuable lessons in scaling production and managing customer expectations.Working at Boosted Boards allowed Ross to experience the challenges of building products from scratch.Safety is a critical concern in drone technology, with high stakes for reliability and performance.Skydio's unique approach involves vertical integration, manufacturing drones in the U.S. for quality control.The embedded engineering landscape has evolved, with new tools and technologies simplifying development.Testing and quality assurance are paramount, with innovative methods to ensure reliability in drone operations.Ross emphasizes the importance of curiosity and problem-solving in engineering roles.Chapters:00:00 Intro & Teasers03:30 Ross's Path to Embedded Engineering07:52 Lessons from Kickstarter and Early Projects12:35 Transitioning to Boosted Boards and Micro-Mobility17:52 Challenges in Embedded Systems and Hardware Development22:45 Skydio's Unique Approach to Drone Technology30:06 Manufacturing Drones in the U.S.35:01 Embedded Engineering Challenges and Safety Considerations39:29 Testing and Quality Assurance in Drone Development46:47 Future of Skydio and Career Opportunities56:18 Closing Thoughts & ReflectionsJoin the Interrupt Slack Watch this episode on YouTube [ADD Playlist YT Link from here)Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 12/11/25 | #019: END-OF-YEAR CELEBRATION: Moments You Loved, Stories You Missed, and 2026 Predictions You Need | SummaryIn today’s Coredump Session, François and Chris wrap up the year with a special milestone celebration for the 20th episode of the series. They take listeners behind the mic to reflect on how Coredump began, the moments that defined 2025, and the lessons learned along the way. Expect highlights from the year’s most talked-about discussions, bold predictions for what’s ahead in 2026, and the biggest live Q&A yet—where nothing is off the table.Key Takeaways:Why Coredump Sessions started and how the show has evolved over 20 episodesThe biggest engineering lessons guests shared throughout 2025The most surprising device failures and field behaviors teams faced this yearHow firmware teams adapted to fast-changing toolchains and new requirementsThe rise of AI-assisted debugging, testing, and development in embedded workHow security mandates tightened and reshaped device developmentThe recurring theme that real-world conditions rarely match lab assumptionsWhat François and Chris learned from producing the series behind the scenesWhat the hosts expect to define embedded systems development in 2026The expanded live Q&A format and how the community is shaping future episodesChapters:00:00 Teasers01:30 Intro/ Welcome03:35 The Genesis of Core Dump06:54 Favorite Moments and Lessons Learned08:45 Clip Reaction: Nick Sinas's OTA Nightmare in the Snow12:19 Clip Reaction: Lack of Security at Pebble16:45 Clip Reaction: Dan Mangum on AI & Engineering21:50 Clip Reaction: Vatsal at Ultrahuman Talks Always-On Devices25:29 Clip Reaction: Chad from Gabb Talks Security30:12 Looking Ahead: Predictions for 202635:59 The Rise of AI and Edge Computing42:24 Evolving Skills for Firmware Engineers47:01 Security in Embedded Systems49:01 The Future of Testing in Embedded Development53:15 Conclusions & Thank YousJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 11/26/25 | The Hidden Complexity of Sleep Tech: Power, Comfort, and 8 Hours of Reliability | In today’s Coredump Session, François and Chris from Memfault sit down with Charles Taylor, co-founder of Ozlo Sleep, to explore the journey from Bose’s original Sleepbuds to the rebirth of a product designed to help people truly rest. The conversation traces how Ozlo revived this beloved idea, balancing power management, all-night comfort, and reliability in one of the most demanding consumer tech categories. Along the way, Charles shares lessons from bringing a hardware product back to life, testing technology people use in their sleep, and building a community that believes better rest starts with better engineering.Key Takeaways:Charlie's journey from engineering to entrepreneurship was accidental but rewarding.The emotional connection users have with physical products is significant.Sleep tech addresses the problem of noise disruption during sleep.Kickstarter was used not just for funding but to build a community.Firmware updates are crucial for improving user experience and product functionality.Designing sleep earbuds involves unique challenges related to comfort and size.Battery life and efficiency are critical in hardware development.Sensing technology in sleep tech can provide valuable health data.Testing and quality assurance are essential in product development.Navigating FDA regulations is complex but necessary for medical-related devices.Chapters:00:00 Intro and Teasers02:02 Meet Charlie Taylor and the Ozlo Sleep Story06:13 Why Sleepbuds Exist and Why Noise Matters07:07 Rebuilding Bose’s Discontinued Sleepbuds09:15 The Hardest Parts of Hardware: Timelines and Vendors10:39 Kickstarter as Validation and Community Building15:57 Designing for Sleep: Comfort, Power, and Miniaturization23:16 The Ear as the USB to the Body: Sensing and Health Insights26:18 Testing Sleep Tech in the Real World33:34 Firmware as the Real Product and Ozlo’s Update Strategy45:38 Moving Toward Medical: FDA and Software Therapies55:17 Customer Feedback at Scale and Prioritizing What MattersJoin the Interrupt Slack Watch this episode on YouTube [ADD Playlist YT Link from here)Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 10/29/25 | #017: Building and Scaling a Startup in the Ultra-Competitive Health Wearables Market | In today's Coredump Session, François Baldassari and Chris Coleman sit down with Ultrahuman co-founder Vatsal Singhal to unpack what it takes to build and scale a hardware startup in the fiercely competitive health wearable market. From transitioning from software to hardware to building responsibly with AI and machine learning, Vatsal shares what it means to blend deep engineering rigor with a mission to improve human performance. This conversation explores the challenges, surprises, and future of health-tech innovation at the edge.Key TakeawaysHow Ultrahuman transitioned from a software-first mindset to mastering complex hardware development.Lessons learned moving from large-scale software systems to building precision-focused health wearables.Why building hardware for health requires a fundamentally different level of accountability and rigor.The role of machine learning at the edge and how it enables better, faster insights while managing battery and compute tradeoffs.How responsible use of AI in health applications shapes product design and user trust.The importance of rapid iteration cycles and adopting software methodologies in hardware innovation.Insights into how Ultrahuman’s internal teams use AI not just in engineering, but across all business functions.A look at what’s next for health-tech — and where innovation is heading in wearables and bio-sensing.Chapters:00:00 Intro & Teasers03:43 From Software to Hardware: The Leap of Faith07:49 The Harsh Realities of Hardware10:40 Iterating Fast Without Breaking People15:17 Redefining A/B Testing in Hardware21:40 Why Ultrahuman Built Its Own Factory26:56 Scaling Production Across Continents29:48 Managing Complexity: 20 Hardware Revisions in a Year35:08 Firmware Velocity & Observability with Memfault43:42 Health Tech Meets Regulation47:55 Shared Codebases & Fast Iteration Across Products50:39 Building the Machines That Build the Rings54:34 Responsible AI & The Future of Health Wearables56:35 Closing Reflections & Key TakeawaysJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 9/17/25 | #016: From Startup to Global Brand: Scaling Engineering at reMarkable | In today’s Coredump Session, we sit down with Nico Comier, CTO of reMarkable, to explore the journey from early-stage startup to global brand. Nico shares insights on scaling engineering teams, balancing technical credibility with leadership responsibilities, and what it really takes to bring a hardware product to market. From the pressures of product launches to the importance of customer connection, this conversation dives into the realities of building impactful technology.Key Takeaways:Nico Comier emphasizes the importance of customer impact in engineering roles.reMarkable's journey from startup to global brand involved scaling engineering teams.Cross-functional collaboration is key to successful product launches.Understanding customer needs is crucial for product development.reMarkable focuses on creating tools that help people think better.The Paper Pro Move was developed in response to user feedback.reMarkable values a hacker culture and allows device jailbreaking.Telemetry and customer feedback are vital for product improvement.reMarkable's leadership believes in maintaining technical credibility.Cross-functional teams enhance empathy and collaboration within organizations.Chapters:00:00 Introduction to reMarkable and Nico's Journey04:21 The Path to CTO: Insights and Experiences07:21 Technical Leadership and Staying Relevant10:03 Understanding Customer Needs in Tech Leadership13:00 The Launch of Paper Pro Move: A Major Achievement15:17 Preparing for Product Launch: Challenges and Strategies18:07 Balancing Agile and Waterfall in Product Development21:04 Product Decision-Making: Insights from the Paper Pro Move23:39 Navigating Challenges in Hardware Development26:30 Final Thoughts on Product Launch and Future Directions29:30 The Importance of Hypercare Post-Launch35:44 Scaling a Startup: Lessons Learned39:41 Building Cross-Functional Teams47:13 The Role of Firmware in Product Development50:48 Integrating Accessibility and Customer Feedback57:02 Leadership and Team Dynamics01:00:00 OutroJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 8/20/25 | COREDUMP #015: Developing kid-safe tech at Gabb: what it takes and why it’s so important | In today’s Coredump Session, we explore the rise of kids safe tech with leaders from the GABB team, creators of connected devices designed specifically for children. From designing products that prioritize child safety to integrating AI in ways that support families, this conversation unpacks the complexities of building secure, intuitive technology for the next generation. The team also shares real-world lessons on hardware partnerships, customer trust, and what it takes to innovate responsibly in the IoT space.Key Takeaways:Kids safe tech is an emerging category centered on digital safety for children.IoT connectivity is essential for building trust between parents and kids.Gabb’s mission is rooted in protecting families through intentional technology.Strong partnerships are critical to scaling hardware, firmware, and software development.AI enhances product safety by filtering content and flagging risks in real time.Security and data privacy are foundational to Gabb’s product design philosophy.Product development requires aligning launch timing, market needs, and platform strategy.Managing multiple product lines demands balance between innovation and sustainment.Kids often outpace parents in tech fluency—celebrating young users can inspire product direction.Efficient QA processes are necessary to uphold product quality and customer trust.Customer feedback and word of mouth are vital inputs for roadmap decisions.Data minimization is a core principle when designing for young users.Cross-functional collaboration drives more effective and family-first product development.Chapters:00:00 Episode Teasers & Intro04:46 Understanding Kids Safe Tech10:25 The Role of Partnerships in Product Development14:59 Navigating AI in Product Design20:20 Balancing Needs of Kids and Parents28:14 Ensuring Security in Kids Tech32:31 Celebrating Advocacy and Security Solutions33:45 Navigating Privacy in Child Analytics37:30 Product Development Cycle and Timelines41:31 Balancing Current and Future Product Development45:53 Sustaining Products Amid New Launches48:37 Customer-Centric Approach in Product Maintenance52:42 Firmware Versioning Challenges and StrategiesJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastbox | — | ||||||
| 8/5/25 | #014: Why Your IoT Project Still Hasn’t Taken Off — And How to Fix It | In today’s Coredump Session, the team takes a hard look at why some IoT projects stall before they ever hit scale. From organizational missteps to product-market fit challenges, they explore the hidden forces that derail even technically sound products. You’ll hear candid insights on why being “connected” isn’t enough—and what it really takes to succeed in IoT today.Key TakeawaysThe biggest blockers for IoT teams aren’t always technical—they’re organizational, strategic, and systemic.Shipping a connected device doesn't guarantee product-market fit, especially if it's missing the right workflows or visibility.Engineers often build what's technically possible instead of what's valuable for the business.Collecting data from devices is table stakes—but what matters is how you use that data to drive action.Many teams lack a clear owner for post-deployment success, leading to blind spots in field performance.“Observability” should go beyond crash logs and include signals that help prioritize engineering work.Product-market fit isn’t static—it has to be reevaluated and maintained across the device lifecycle.Chapters:00:00 Introduction to IoT Challenges01:54 Afzal’s Journey in IoT & Early Expectations04:11 The 500K SIM Card Mirage08:10 Why IoT Projects Stall: Internal Resistance & Misaligned Incentives14:25 Rethinking the “IoT” Label: Lessons from Pebble17:28 When Good Tech Still Fails: The Organizational Blindspot20:43 Field Reality Check: Why Real-World Feedback is Critical26:00 Who Owns It? Accountability After Launch29:07 Designing for Fault Tolerance in Connected Devices32:52 Fragmentation in IoT: Meeting Diverse Customer Needs37:27 Niche Focus as a Winning Strategy39:57 What IoT Can Learn from AI’s Go-to-Market Playbook44:42 Drivers for Success in the IoT Space47:14 The Future of IoT: Regulation, Trust & E-Waste50:32 Final Reflections on Long-Term Ownership & Customer ImpactJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 7/23/25 | #013: Prepping Your AI Model for the Wild: Building Edge AI Models That Work in the Real World | In today's Coredump Session, we dive into the fascinating world of building Edge AI models that truly work in real-world environments. Joined by David Tischler, Developer Program Manager, and Alessandro Grande, Head of Product at Edge Impulse (A Qualcomm Company), we unpack what it takes to deploy AI on tiny devices, explore practical applications from wearables to industrial use cases, and discuss why customization, hardware choices, and continuous monitoring are critical for success. Tune in to explore how Edge AI is transforming device development and enabling smarter solutions.Key Takeaways:Edge AI empowers devices to process data locally, significantly reducing latency, bandwidth usage, and improving privacy.The best use cases for Edge AI today often involve video and audio analytics, wearables, and industrial sensor applications.Customization is the key value of AI, making it easy to fine-tune models for specific tasks or customer needs without extensive traditional coding.Effective Edge AI requires thoughtful pre-processing (DSP), not just AI models—this combination significantly improves model performance.Hardware selection is crucial; developers must balance model complexity with device constraints, such as available RAM and compute power.Many AI co-processors marketed for embedded systems today are essentially DSP units rebranded as AI accelerators, and usability matters more than raw performance.Observability and OTA (over-the-air) updates are critical components in Edge AI deployment, enabling continuous monitoring, data-driven refinements, and quick responses to issues in the field.Production readiness in Edge AI involves not only initial deployment but ongoing data collection, model retraining, and continuous improvement cycles.Chapters:00:00 Intro & Teasers: Edge AI's Real-World Promise01:57 Meet Our Guests: David Tischler & Alessandro Grande from Edge Impulse05:19 How Edge AI Took Off: From Hyped to Essential09:21 Beyond Voice Commands: Emerging AI Use Cases12:02 Defining the Edge: Wearables to Factories19:09 AI's Hidden Superpower: Customization and Fine-Tuning26:15 Why AI Belongs at the Edge: Latency, Privacy, and Power28:38 Building the Software Stack: Edge AI for Embedded Engineers34:17 Choosing Your Hardware: Constraints and AI Accelerators45:42 Observability and OTA Updates: Essential for Edge AI52:28 Audience Q&A: Fine-Tuning, TinyML, and the FutureJoin the Interrupt Slack Watch this episode on YouTubeFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 7/8/25 | #012: Plug-and-Play Cellular Connectivity: Nearly Here or Never Happening? | In today's Coredump Session, we delve into the evolving landscape of cellular connectivity, particularly focusing on eSIM technology and its implications for IoT devices. The discussion features insights from industry experts on the challenges and opportunities presented by cellular connectivity, the cost considerations for device makers, and the technological advancements that are shaping the future of connectivity. Key themes include the vision behind Kigen, the role of SIM technology, emerging business models, and best practices for managing device connectivity and profiles. Key TakeawaysCellular connectivity is essential for modern IoT devices.Kigen aims to secure trillions of connected devices.Cost reduction in cellular modules opens new opportunities.Device makers must consider the total cost of ownership.Emerging business models include rental and subscription services.iSIM technology is gaining traction in the market.Device management and profile updates are critical for success.Security by design is a priority for device manufacturers.Interoperability between eSIM products is improving.Chapters00:00 Intro & Teasers03:54 The Vision Behind Kigen06:36 Challenges and Opportunities in Connectivity09:09 Cost Considerations in Cellular Technology12:01 Innovative Business Models for Device Makers14:46 Understanding SIM Technology17:22 The Future of iSIM and SoftSIM20:19 Global Considerations for Cellular Products30:25 Navigating IoT Network Choices33:41 Choosing the Right Cellular Technology36:56 Understanding eSIM and Network Management42:05 Optimizing Device Connectivity and Provisioning47:43 Key Considerations for New Device Makers54:42 OutroJoin the Interrupt Slack Watch this episode on YouTubeFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 7/1/25 | #011: Memfault Joins Nordic Semiconductor: What This Means for the Future of Connected Product Development | In today's Coredump Session, François and Chris share a major milestone in Memfault’s journey: Memfault is joining forces with Nordic Semiconductor. They’re joined by Kjetil Holstad from Nordic to explore Nordic’s history, how the acquisition came to be, and the exciting future they envision together. Along the way, they dive into the evolution of Bluetooth, the challenges of building complex embedded systems, and why developer experience is at the heart of it all.Key Takeaways:Nordic Semiconductor’s journey from design services to global Bluetooth leadership hinged on bold bets and developer-centric decisions.The inclusion of Bluetooth Low Energy in the iPhone was a pivotal moment that accelerated Nordic’s growth.Building robust embedded systems today requires deep attention to software complexity, which has significantly increased over time.Decisions that prioritize developer experience—like open documentation and accessible SDKs—have been instrumental to Nordic’s success.Memfault’s partnership with Nordic was driven by a shared vision to make embedded observability easy, accessible, and deeply integrated.Memfault’s pre-integration with Nordic’s SDKs and their collaborative engineering work have helped reduce barriers for developers.The vision for a “chip-to-cloud” platform is about delivering seamless device management, monitoring, and OTA updates with a scalable, unified solution.Both Memfault and Nordic are committed to supporting non-Nordic hardware, focusing on building solutions that serve the broader embedded ecosystem.Chapters:00:00 Episode Teasers & Intro02:59 The Origin Story of Nordic Semiconductor06:11 The Evolution of Bluetooth Technology at Nordic09:40 Bold Decisions and Learning from the Market14:24 Nordic's Commitment to Developers and Software17:32 The Shift Towards Software in IoT20:04 Embracing Complexity: The Future of Nordic's SDKs20:55 Understanding Trust Zone and Embedded Systems21:46 The Importance of Strategic Partnerships22:30 Building Relationships in the Tech Industry25:09 The Value of Collaboration and Integration27:38 Enhancing Developer Experience through Integration32:24 Announcing the Partnership and Future Vision33:07 Creating a Chip to Cloud Platform36:05 Supporting Non-Nordic Devices and Ecosystem Expansion39:10 Reactions to the Acquisition Announcement44:58 Q&AJoin the Interrupt Slack Watch this episode on YouTubeFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 6/11/25 | #010: From Pebble to Intel: can hardware startups beat the big players? | In today's Coredump Session, we explore the wild early days of Pebble and what it takes to scale a hardware startup against industry giants. From scrappy hackathons to 100+ person engineering teams, Kean Wong, former VP of Software at Pebble and now CTO at Igor, joins Memfault’s François and Chris to unpack how startups can outpace Big Tech by staying nimble, hiring wisely, and embracing constant change.Key Takeaways:Early-stage hardware startups benefit from direct engagement with developer communities for recruiting.Transparency and shared business context can create stronger, more motivated engineering teams.Scaling a hardware company requires embracing organizational change—not resisting it.“Trial by fire” can be an effective onboarding path for technical leaders in fast-moving environments.Engineering leadership should balance short-term firefighting with long-term vision setting.Hackathons and passion projects can be powerful hiring channels in embedded tech.Growth requires thoughtful infrastructure investments—even when it's tempting to keep things scrappy.A good leader earns respect by doing the hard work, not just delegating it.Chapters:00:00 Welcome and Introduction to Today’s Topic06:00 Lessons from Scaling Teams at Pebble12:00 Chaos, Structure, and Growing as a Startup18:00 Building Process Without Killing Agility24:00 Hiring Smart in Fast-Growth Environments30:00 From Product Complexity to Organizational Change36:00 Staying Productive Through Engineering Transitions42:00 Applying Startup Lessons in Larger Organizations48:00 What Kean’s Building Now at Eagor54:00 Live Q&A and Closing ThoughtsJoin the Interrupt Slack Watch this episode on YouTube Follow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 5/27/25 | #009: Zephyr’s Meteoric Rise and What It Means for the Future of Embedded | In today’s Coredump Session, we dive into the origins and evolution of Zephyr RTOS with Kate Stewart, VP of Dependable Embedded Systems at the Linux Foundation. From Intel’s early ambitions to a thriving global community, Kate unpacks how Zephyr grew into a leading open-source RTOS and what makes it uniquely resilient and developer-friendly. This conversation also explores the technical shifts shaping embedded development and how governance, safety, and collaboration continue to steer Zephyr’s trajectory.Speakers:Kate Stewart: Vice President of Dependable Embedded Systems, The Linux FoundationFrançois Baldassari: CEO & Founder, MemfaultThomas Sarlandie: Field CTO, MemfaultKey Takeaways:Zephyr was born from Intel’s desire for a scalable, secure, and open RTOS, evolving from Wind River roots.Early adoption of Linux-inspired practices, like Kconfig and "signed-off-by" contributions, lowered friction and encouraged community participation.The project’s governance model, emphasizing multi-vendor participation and elected leadership, prevents corporate capture and boosts resilience.Zephyr’s pragmatic reuse of tools like MCUboot accelerated development and expanded capabilities.Long-term support (LTS) releases—now extended to five years—make Zephyr production-friendly and aligned with regulatory demands like the CRA.Innovations like the Twister test framework and open testing infrastructure set Zephyr apart for visibility and maintainability.Zephyr thrives as complexity in embedded systems increases, filling the gap left by simpler RTOSes ill-suited for modern MCU workloads.Not every project is a fit for Zephyr—especially ultra-low-end 8-bit systems—but it excels in growing, connected device classes.Chapters:00:00 Introduction and Guest Introduction04:12 Building Zephyr: Intel’s Open RTOS Bet06:39 Governance That Guards Against Capture08:10 Borrowing From Linux, Avoiding Its Baggage09:41 What Makes Zephyr Different13:55 Zephyr in Production: LTS and Real-World Adoption16:15 Scaling with Twister and QEMU18:15 Taming Complexity Without Losing Performance35:45 SBOMs and the Future of Compliance38:20 A Head Start on Security Standards43:02 Inside Zephyr's Safety Certification Journey46:44 Real-World Use Cases and Industry Uptake50:25 What's Next for Zephyr and the RTOS Landscape53:12 Final Reflections and Closing ThoughtsJoin the Interrupt SlackWatch this episode on YouTube Suggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 5/13/25 | #008: Navigating the Changing IoT Security Landscape: A Survival Guide for Product Leaders | In today's Coredump Session, we dive into the evolving landscape of IoT security regulations with Giovanni Alberto Falcione, CTO at Exine. From the impact of the EU's CRA to the complexities of OTA updates, Giovanni, François, and Thomas unpack what these new requirements mean for product engineers and how to navigate the increasingly stringent security landscape.Speakers:François Baldassari: CEO & Founder, MemfaultThomas Sarlandie: Field CTO, MemfaultGiovanni Alberto Falcione: CTO, ExeinKey Takeaways:The EU's Cyber Resilience Act (CRA) mandates stringent security measures for all connected devices marketed after December 2027, with a particular focus on runtime security monitoring.OTA updates are essential for mitigating vulnerabilities in the field but can also introduce challenges in regulatory compliance.Giovanni highlights that less than 1% of IoT device manufacturers actively monitor cybersecurity state awareness, a critical area of compliance under CRA.Implementing a Software Bill of Materials (SBOM) and tracking Common Vulnerabilities and Exposures (CVEs) are low-hanging fruit for product teams to start bolstering security.eBPF technology offers powerful, low-impact monitoring capabilities that can detect unauthorized activities at the syscall level without kernel-level intervention.Companies need to plan for at least five years of security updates under CRA, with potential for longer support based on device lifecycles.Even seemingly innocuous devices, like coffee makers, can pose significant cybersecurity risks as entry points for broader attacks.Giovanni emphasizes that while regulation can stifle innovation, it also raises the bar for security practices across the board.Chapters:00:00 Introduction and Guest Introduction02:30 The Unseen Costs of Cybersecurity Regulation04:40 OTA Updates: Security Savior or Hidden Risk07:21 CRA vs. Other Regulations: What Matters Most10:30 The Rise of Runtime Security Monitoring12:23 Why Manufacturers Are Freaking Out About CRA15:09 The Hidden Cost of Legacy Firmware17:30 Inside the Automotive Cybersecurity Playbook21:22 eBPF: The Next Frontier in IoT Security55:38 Coffee Machines, Coffee Attacks, and Unexpected Entry PointsJoin the Interrupt SlackWatch this episode on YouTubeSuggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 3/19/25 | #005: The Current Realities of Cellular IoT | In today’s Coredump Session, we zoom in on the rapidly evolving world of cellular IoT—what’s working, what’s changing, and what developers should know. With expert insight from Fabien Korheim of ONES, the conversation breaks down MVNOs vs MNOs, dives into certification hurdles, explores connectivity trade-offs like NB-IoT vs LTE-M, and unpacks why cellular is quietly powering more devices than you think. Whether you're building metering devices or baby monitors, this one hits the full stack—from tech to business models.Key Takeaways:MVNOs simplify global IoT deployments by abstracting regional carrier relationships and reducing SKU complexity.LTE-M is currently the safest bet for low-power cellular applications, with 5G RedCap positioned as a future alternative.Certification processes are lighter with MVNOs, especially when using pre-approved modules.Cellular IoT is ideal where Wi-Fi isn’t guaranteed, like basements, forests, and mobile tracking.Consumer IoT has huge untapped potential—cellular can dramatically improve usability and reduce returns.Battery life and data costs are major design considerations, especially when scaling fleets globally.Multiradio devices and smart fallback strategies (e.g. BLE/Wi-Fi + Cellular) are becoming more common.Debugging tools and observability platforms are essential for maintaining reliability across networks, devices, and regions.Chapters:00:00 Episode Teasers & Intro02:34 MVNO vs MNO: What’s the Difference?06:28 Certifications, SIMs & Simplifying Deployment12:31 NB-IoT, LTE-M, LoRaWAN & Satellite—Explained23:43 5G for IoT: Hype or Here?27:14 Top Use Cases: Meters, Trackers & Wildlife33:28 The Big Opportunity: Cellular in Consumer Devices36:33 Business Models: Who Pays for Cellular?37:49 Getting Started: Kits, SIMs & Copy-Paste Firmware41:59 Common Mistakes & What to Watch in the Field47:15 What to Measure: Observability That Scales49:13 Q&A: Prioritization, Firmware Updates, RedCap & MoreJoin the Interrupt SlackWatch this episode on YouTube Suggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 2/25/25 | #004: The Future of Edge AI and What it Means for Device Makers | In today’s Coredump Session, we dive into the fast-evolving world of Edge AI and its real implications for device makers. From robots that detect humans to welding machines that hear errors, we explore the rise of intelligent features at the hardware level. The conversation spans practical tools, common developer traps, and why on-device AI might be the most underrated revolution in embedded systems today.Key Takeaways:Edge AI means real-time inference on embedded devices, not just “AI at the edge of the network.”Privacy, latency, and power efficiency are core reasons to use Edge AI over cloud processing.Hardware accelerators like the Cortex-M55 + U55 combo have unlocked GPU-like performance in microcontrollers.Battery-powered AI devices are not only possible—they're already shipping.Data collection and labeling are major bottlenecks, especially in real-world form factors.Start projects with data acquisition firmware and plan ahead for memory, power, and future use cases.Edge AI applications are expanding in healthcare, wearables, and consumer robotics.Business models are shifting, with AI driving recurring revenue and service-based offerings for hardware products.Chapters:00:00 Episode Teasers & Intro02:57 What Is Edge AI Anyway?06:42 Tiny Models, Tiny Devices, Big Impact10:15 The Hardware Leap: From M4 to M55 + U5515:21 Real-World Use Cases: From ECGs to Welding Bots17:47 Spec’ing Your Hardware for AI24:15 Firmware + Inference Frameworks: How It Actually Works26:07 Why Data Is the Hard Part34:21 Where Edge AI Will—and Won’t—Take Off First37:40 Hybrid Edge + Cloud Models40:38 Business Model Shifts: AI as a Service44:20 Live Q&A: Compatibility, Labeling, On-Device Training56:48 Final Advice: Think of AI as Part of the ProductJoin the Interrupt SlackWatch this episode on YouTubeSuggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 2/11/25 | #003: Pebble's Code is Free: Three Former Pebble Engineers Discuss Why It's Important (PART 1/2) | REGISTER FOR PART 2 OF THE PEBBLE CONVERSATION ON APRIL 15THIn this episode of Coredump, three former Pebble engineers reunite to dive deep into the technical quirks, philosophies, and brilliant hacks behind Pebble OS. From crashing on purpose to building a single codebase that powered every watch, they share war stories, bugs, and what made Pebble’s firmware both rare and remarkable. If you love embedded systems, software-forward thinking, or startup grit— this one’s for you.Key topics:Pebble intentionally crashed devices to collect core dumps and improve reliability.All Pebble devices ran on a single codebase, which simplified development and updates.The open-sourcing of Pebble OS is a rare opportunity to study real, commercial firmware.A platform mindset—supporting all devices and apps consistently—shaped major engineering decisions.Pebble’s app sandbox isolated bad code without crashing the OS, improving developer experience.The team built a custom NOR flash file system to overcome constraints in size and endurance.Core dumps and analytics were essential for tracking bugs, deadlocks, and field issues.Collaborations between hardware and firmware engineers led to better debugging tools and smoother development.Chapters:00:00 Episode Teasers & Intro01:10 Meet the Team: Pebble Engineers Reunite01:13 Meet the Hosts + Why Pebble Still Matters03:47 Why Open-Sourcing Pebble OS Is a Big Deal06:20 The Startup Firmware Mentality08:44 One OS, All Devices: Pebble’s Platform Bet12:30 App Compatibility and the KEMU Emulator14:51 Sandboxing, Syscalls, and Crashing with Grace20:25 Pebble File System: Built from Scratch (and Why)23:32 From Dumb to Smart: The Iterative Codebase Ethos26:09 Core Dumps: Crashing Is a Feature30:45 How Firmware Shaped Hardware Decisions33:56 Rust, Easter Eggs, and Favorite Bugs36:09 Wear-Level Failures, Security Exploits & Font Hacks39:42 Why We Chose WAF (and Regret Nothing?)42:41 What We’d Do Differently Next Time47:00 Final Q&A: Open Hardware, Protocols, and Part Two?Join the Interrupt Slack Watch this episode on YouTubeSuggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 12/18/24 | #002: The secrets to building secure & scalable OTA infrastructure with Nick Sinas | In today’s Coredump Session, the team dives deep into the world of over-the-air (OTA) updates—why they matter, how they break, and what it takes to get them right. From horror stories involving IR updates in a snowstorm to best practices for deploying secure firmware across medical devices, this conversation covers the full stack of OTA: device, cloud, process, and people. It's equal parts cautionary tale and technical masterclass.Key Takeaways:OTA is essential for modern hardware—without it, even small bugs can require massive field operations.Good OTA starts early, ideally at the product design and architecture phase.Bootloaders, memory maps, and security keys must be carefully planned to avoid long-term issues.Staged rollouts and cohorts help mitigate fleet-wide disasters.Signing keys and root certificates should be treated like firmware—versioned, updatable, and secure.Real-world constraints (medical, smart home, etc.) make OTA more complex—but not optional.Testing both the update and the update mechanism itself is critical before going live.When OTA fails, fallback plans (like dual banks or A/B slots) can be the difference between a patch and a catastrophe.Chapters:00:00 Episode Teasers & Intro03:29 Meet the Guests + OTA Gut Reactions05:33 Why OTA Is Non-Negotiable03:29 The OTA Wake-Up Call: Why You Need It09:31 Building OTA into Hardware from Day One16:49 Cloud-Side OTA: Cohorts, Load, and Timing21:53 OTA in Regulated Industries30:10 When OTA Breaks Itself34:44 Minimizing OTA Risk: The Defensive Playbook41:18 OTA and the Matter Standard47:17 Networking Stacks, Constraints, and Reliability51:11 Security, Scale, and the OTA FutureJoin the Interrupt SlackWatch this episode on YouTube Suggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 11/27/24 | #001: The future of Bluetooth connectivity with Blecon Founder, Simon Ford | In today’s Coredump Session, we unpack the full story of Bluetooth—from its PDA-era beginnings to its rising role in cloud-connected devices. With insights from Memfault’s Chris Coleman and François Baldassari, along with Blecon’s Simon Ford, this wide-ranging conversation explores how Bluetooth Low Energy has evolved, where it thrives (and doesn’t), and why it’s often the right tool, even if it’s not a perfect one. Expect history, hot takes, and practical guidance for building better Bluetooth-powered products.Key Takeaways:Bluetooth Low Energy (BLE) and Bluetooth Classic are fundamentally different—and BLE was never just a “lite” version.BLE's strength lies in its low power consumption and quick connection setup, making it ideal for peripheral devices that sleep most of the time.Use cases like audio, asset tracking, and cloud sync continue to shape BLE’s evolution, and new specs like LE Audio and PAwR are expanding its reach.Bluetooth wins not because it’s perfect—but because it’s practical: globally adopted, low-cost, and well-supported.Debugging Bluetooth at scale requires collecting connection parameters, analyzing retries, and understanding phone ecosystem quirks.BLE Mesh adoption has been underwhelming, with real-world complexity often outweighing its theoretical benefits.Expect to see BLE turn up in more places, including MEMS sensors and energy-harvesting devices, not just consumer gadgets.Designers should understand trade-offs in connection intervals, latency, and power draw when choosing Bluetooth for cloud or local connectivity.Chapters:00:00 Episode Teasers & Intro01:10 Meet the Guests: Bluetooth Roots at Pebble, Fitbit, and Blecon06:51 BLE’s Breakthrough: The iPhone 4S Moment10:22 BLE vs Classic: Why It Took Off14:39 Specs That Shifted Everything: Packet Length, Coded PHY & LE Audio21:41 Is BLE Still Interoperable? And Does It Matter?28:22 The BLE Cloud Puzzle: Gateways, Phones & Golden Gate38:40 BLE’s Sweet Spot: Power, Latency & When It Just Works47:12 Operating BLE Devices in the Wild: What to Track & Why57:40 Mesh Ambitions vs RealityJoin the Interrupt SlackWatch this episode on YouTubeSuggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
| 9/17/24 | #000: How New IoT Security Regulations Will Shape the Industry's Future | In today's Coredump Session, Memfault’s François Baldassari and Chris Coleman unpack the sweeping impact of new IoT security regulations like the CRA and the Cyber Trust Mark. From shocking real-world exploits to smart compliance strategies, they explore what these changes mean for hardware teams and the future of connected devices. If you ship firmware or build IoT products, this one’s essential listening.Key takeaways:IoT security is no longer optional—new regulations like the CRA and Cyber Trust Mark make it mandatory.Most connected devices today are still dangerously undersecured, with outdated stacks and poor OTA support.Open source platforms like Zephyr can make compliance easier by pooling security resources across companies.OTA (over-the-air) updates are now a requirement in both US and EU regulations.The CRA introduces SBOM (Software Bill of Materials) requirements to track vulnerabilities in dependencies.Observability, encryption, and secure boot need to be built in from the start—not as last-minute add-ons.Compliance will vary based on device criticality, but self-certification will be the norm for most companies.Ignoring security costs more in the long run—both in reputation and risk.Chapters:00:00 Episode Teasers & Intro01:03 Meet the Hosts: François and Chris from Memfault03:40 Why IoT Security Is Still So Behind07:15 Vulnerabilities, Legacy Chips, and Who’s to Blame10:12 Wireless Protocols: Still a Huge Attack Surface13:28 If You Ship Without OTA, You're Asking for Trouble20:50 Introducing the CRA and Cyber Trust Mark23:38 What the CRA Actually Requires31:45 Reconciling Security Monitoring with GDPR34:07 Cyber Trust Mark vs CRA: US vs EU Approaches41:05 What You Can Do Today to Prepare46:33 How Long Do You Have to Support a Device?52:19 Attack Surfaces: Even a Projector Isn't Safe56:06 Lifecycle Support and Product Lifespan Realities58:51 Observability in Low-Resource Devices1:00:34 Connected Architectures & Multichip Compliance1:01:43 IoT Devices with Limited Bandwidth & OTA ConstraintsJoin the Interrupt Slack Watch this episode on YouTubeSuggest a GuestFollow MemfaultLinkedInBlueskyTwitterOther ways to listen:Apple PodcastsiHeartRadioAmazon MusicGoodPodsCastboxVisit our website | — | ||||||
Showing 20 of 20
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.






