<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Embedded Insights Channels &#187; Risk Management</title>
	<atom:link href="http://www.embeddedinsights.com/channels/topics/risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.embeddedinsights.com/channels</link>
	<description>Shedding Light on the Hidden World of Embedded Systems</description>
	<lastBuildDate>Fri, 14 Jun 2013 17:33:02 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0</generator>
		<item>
		<title>Is embedded security necessary?</title>
		<link>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/</link>
		<comments>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/#comments</comments>
		<pubDate>Wed, 16 Feb 2011 17:26:39 +0000</pubDate>
		<dc:creator>Robert Cravotta</dc:creator>
				<category><![CDATA[Question of the Week]]></category>
		<category><![CDATA[Security & Encryption]]></category>
		<category><![CDATA[Risk Management]]></category>

		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=450</guid>
		<description><![CDATA[Embedded systems that are connected to public networks are potential targets for malicious attacks. Even systems that implement significant precautions can and are compromised. As more embedded systems are attached to networks, who should be responsible for deciding when security is or is not an issue?]]></description>
		<wfw:commentRss>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Can we reliably predict the winners?</title>
		<link>http://www.embeddedinsights.com/channels/2011/02/09/can-we-reliably-predict-the-winners/</link>
		<comments>http://www.embeddedinsights.com/channels/2011/02/09/can-we-reliably-predict-the-winners/#comments</comments>
		<pubDate>Wed, 09 Feb 2011 19:27:34 +0000</pubDate>
		<dc:creator>Robert Cravotta</dc:creator>
				<category><![CDATA[Question of the Week]]></category>
		<category><![CDATA[Risk Management]]></category>

		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=440</guid>
		<description><![CDATA[History is strewn with examples of people and companies snatching failure from the jaws of success. The converse is also true of approaches or technologies that were deemed impossible or impractical by the establishment that became winners that changed how we live our lives. Can we reliably predict winning (and losing) future technologies better than chance?]]></description>
		<wfw:commentRss>http://www.embeddedinsights.com/channels/2011/02/09/can-we-reliably-predict-the-winners/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
