AdaCore’s cover photo
AdaCore

AdaCore

Software Development

Paris, France 15,347 followers

Tools for High-Integrity Development in Ada/SPARK, C/C++, and Rust

About us

AdaCore's mission is to help people build software that matters. In the modern world there is an ever increasing amount of activities that require the integration of software. Have you driven your car today? Flown on a plane? Endeavored to move from Point A to Point B anywhere for work or play? Millions upon millions of lines of code were required in order for you to do so. We endeavor to make sure that code is safe and secure. Founded in 1994, AdaCore is the leading provider of commercial software solutions for Ada, a state-of-the-art programming language designed for large, long-lived applications where safety, security, and reliability are critical. With offices in Paris, New York and Boston, what started as a side project between a few NYU professors and their students has become the Aerospace and Defense industry's standard. For more information visit our website at www.adacore.com or click on our job offerings on this page.

Website
http://www.adacore.com
Industry
Software Development
Company size
51-200 employees
Headquarters
Paris, France
Type
Privately Held
Founded
1994
Specialties
Software tools and expertise for safety-critical, security-critical, and and high-reliability applications.

Locations

Employees at AdaCore

Updates

  • Most embedded software teams are stuck in a loop they didn't choose: write code, wait for hardware, flash firmware, debug, repeat. Sometimes across weeks. What would it take for embedded development to feel as fast and confident as modern web development? The answer involves engineering discipline, smart infrastructure, and a deliberate shift in how your team thinks about feedback. Read the blog 👉 https://bit.ly/4spl2Z9

  • In industries like aerospace, automotive, and defense, security is not just a feature; it is a requirement. There is one gap in defense in depth that many projects do not cover sufficiently: the "unknown unknowns" - rare corner cases that slip even the most rigorous high-integrity software processes. These cases become harder to find as the amount of software increases. This is where fuzz testing (or fuzzing) comes into play. Read the blog 👉 https://bit.ly/4mfBp9e

  • Are you an Ada programmer looking for employment in the area of Maastricht, The Netherlands? Reach out to Emma Claus 🚀 at EUROCITY. More information in the attached post ⬇️

    🚀 I’m once again looking for talented Ada Developers! 🚀 Recruiting for Ada roles has become one of the parts of my work that I genuinely enjoy the most! It’s a niche skill set, a unique community, and always such a pleasure to connect with passionate engineers who love working with this technology. This time, I’m hiring Ada Developers for an exciting opportunity in Maastricht (50% remote) for one of Eurocity's long‑term clients. If you (or someone in your network) might be interested, I’d love to hear from you directly. 👉 Feel free to reach out to me via DM. 👉 And if you could share this post within your network, I’d be incredibly grateful! Thank you to my wonderful community for spreading the word, your support always makes the difference. 💙

    • No alternative text description for this image
  • Join AdaCore at Booth 221 at the Army Aviation Warfighting Summit to discuss high-integrity software development in Ada/SPARK, C/C++ and Rust 📅 April 15–17, 2026 Connect with our team to discuss your current challenges and see how our technologies support safety- and security-critical systems. Learn more 👉 https://bit.ly/47Dx1ed

    • No alternative text description for this image
  • The sentiment in this blog post is the typical experience of new people stepping into #Ada and #SPARK: they appreciate the power of an elegant language that guides you to build safe software. Thanks for sharing Abhishek Dinesan!

    While in the midst of my "usual nerding", I stumbled upon Ada, a language designed for environments where failure isn't an option. What fascinated me wasn't just the verbose syntax, but the philosophy: you define the constraints of your system and it's variables so strictly that the code itself becomes verifiable. Exploring its variant, SPARK, felt like unlocking a superpower the gave you the ability to perform formal verification to essentially eliminate things like array bounds, integer overflows, uninitialized variables etc. Then, the "observation bias" kicked in. As soon as I started learning Ada, I started to notice job postings for Ada, specifically from the aerospace sector. It felt like the universe (or a very smart algorithm) was giving me a sign. I decided to go deeper. I didn't just want to write code, I wanted to control a satellite. I started by writing a PD Controller loop in Ada to handle satellite attitude control. In process I realized that it is difficult to check if your system is actually working just by looking at lines of raw numbers. Most people would generate some graphs at this point but I wanted something cooler. I decided to build a minimal simulator to test my program. The first challenge was Physics. I skipped the "easy" route of using the built-in physics engine and implemented my own using Euler’s equations for rigid-body dynamics. Next was the orbit of the satellite. I added a 2-body solver (Kepler's equations) to simulate the satellite’s path around the planet, controlled using classical orbital elements. Finally for the visuals I used the Godot game engine to bring the math to life. The system is fully functional. It can load any binary that reads/writes stdio in a specific format (read the readme file) to control the satellite in real-time. This project was incredibly fun and taught me a lot about the fundamental physics and the Ada language. There’s something incredibly satisfying about going down one rabbit hole and coming out the other with something cool like a separate Ada program controlling and stabilizing a spacecraft in a virtual world that you built. 🚀 If you wish to play around with it, you can find the project at: https://lnkd.in/ew8GpKaA #Ada #SPARK #AdaProgramming #SPARKProgramming #SoftwareEngineering #EmbeddedSoftware #Avionics #GNC #AOCS #Aerospace #GodotEngine #PhysicsSimulation #EmbeddedSystems #IPC #Euler #Kepler #OrbitalMechanics #Orbit #Rigidbody #RigidbodySimulation #RigidbodySimulations Satellite 3D model credits to Andrey Borisov: https://lnkd.in/ePjFATgj

  • The development of safety-critical C codebases is both costly and time-intensive, particularly given the ongoing risk of unintended memory errors. Ada SPARK can provide a better path to develop and extend these code bases. Agentic AI can enable teams to re-use existing code bases and carefully decide which parts to translate into Ada SPARK, avoiding problems caused by memory errors, with goal of developing safety critical software faster. Read the blog 👉 https://bit.ly/3PHStbJ

  • AdaCore supports practical engineering projects that help students apply technical concepts to real-world problems. As part of this effort, AdaCore sponsored Evolutek, a student-run robotics club founded in 1997 and backed by the IONIS Group. Last year, the Evolutek team entered the field of aerospace engineering by building its first compact satellite (CanSat), Evolusat MK1. Learn about the team's work 👉 https://bit.ly/4bFw9a4

    • No alternative text description for this image
  • At Embedded World, ipXchange spoke with Jose Ruiz about AdaCore’s latest tools for high-integrity software development. Watch the video to explore our live demos on SPARK, Rust, and CodeSonar. ⬇️

  • We’re sharing our journey of building a dedicated crate that provides support for the AMD Zynq UltraScale+ MPSoC. In this blog, we cover how we orchestrated the boot process across Exception Levels, implemented exception handling, initialised UART, and integrated Newlib to provide limited std support. Read the blog 👉 https://bit.ly/47d2WC1

    • No alternative text description for this image
  • View organization page for AdaCore

    15,347 followers

    Hardware-Driven Security: Can CHERI Fix the "Blind Spots" of Software Testing? This work combines fuzz testing with CHERI hardware. Unlike heuristic-based sanitizers, CHERI uses hardware-enforced capabilities - pointers with defined bounds, permissions, and tags - to ensure deterministic memory protection. The results show improved detection of memory issues across both legacy and memory-safe code, supporting a shift towards a more proactive, verification-driven approach to software security. Read the blog 👉https://bit.ly/4lAJlBz

Similar pages

Browse jobs