screenshot

LHP Blog

11 min read

What are the key considerations for SOTIF- related software development?

What are the key considerations for SOTIF- related software development? In this 6th article in our SOTIF series, we...
11 min read

What is the importance of high-quality SOTIF functionality?

What is the importance of high-quality SOTIF functionality?   In the 3rd blog in this series, “The SOTIF Scenarios”, we...
8 min read

How to Get Your Organization Started with Master Data

How to Get Your Organization Started with Master Data   Introduction Master data has a critical role to play for your...
9 min read

How to Build Master Data Systems: Architecture, Trade-offs, and Constraints

How to Build Master Data Systems: Architecture, Trade-offs, and Constraints   Introduction Master data has a critical...
9 min read

How Does SOTIF Address Safety Design Vulnerabilities?

How Does SOTIF Address Safety Design Vulnerabilities?   How does SOTIF impact vulnerabilities? Safety Of The Intended...
9 min read

What Critical Role does Master Data Have in Engineering and Functional Safety?

What Critical Role does Master Data Have in Engineering and Functional Safety?   Introduction Master data has a...
8 min read

LHP Link: How does our Bi-directional Traceability Solution Add Value

LHP Link: How does our Bi-directional Traceability Solution Add Value?   Introduction With the growing trend in...
8 min read

What is FMEDA?

What is FMEDA? Today’s modern products are incredibly complex and becoming more so by the day. At the same time, a...
6 min read

What Are Automotive Cybersecurity Contingency Plans?

What Are Automotive Cybersecurity Contingency Plans?   Interruptions from natural disasters Hackers are not the only...
7 min read

How Do Data Driven Insights Inform Data Optimization?

How Do Data Driven Insights Inform Data Optimization?   Introduction Data can be an organization’s most valuable asset...
9 min read

How is Automotive Cybersecurity Controlled?

How is Automotive Cybersecurity Controlled?   Increased complexity The highly technical automotive realm of today,...
6 min read

What are the Cybersecurity Challenges for Connected and Autonomous Vehicles?

What are the cybersecurity challenges for Connected and Autonomous Vehicles?   Introduction The cybersecurity...
Content not found