Mitigating the IoT Attack Surface

Mitigating the IoT Attack Surface

By Neil McLellan  Modern day use cases for “IoT-like” applications date back to the earliest days of manned space flight for monitoring astronaut vital signs and shuttle telemetry – mission critical data points transmitted across a dedicated network. Beyond dedicated and specialized networks, technology once leveraging PSTN has now converged on the global IP network. The public internet has evolved…
Helix Device Cloud Showcases its Versatility at IDF 2016

Helix Device Cloud Showcases its Versatility at IDF 2016

    By Amanda Lowe   At the Intel Developer Conference this week, we announced the latest version of our IoT Device Management Platform, Helix Device Cloud. To mark the occasion, several groups created real-life use case demonstrations of Device Cloud in action. The wide range of examples allowed viewers to really relate it to their own IOT development and…
Unlocking The Potential Of SDN And NFV

Unlocking The Potential Of SDN And NFV

By Sohini Bagchi  In the enterprise networking space, the Internet of Things (IoT) is gradually becoming mainstream. According to IT industry body NASSCOM, the global IoT business is expected to touch USD 300 billion by 2020. And according to Grand View Research, the global enterprise networking market is expected to touch USD 64.6 billion in revenue by 2024. With this transformation, it is interesting to note…
Wind River Unveils Latest Version of IoT Device Management Platform

Wind River Unveils Latest Version of IoT Device Management Platform

By Santhosh Nair We are very pleased to introduce the latest version of Wind River® Helix™ Device Cloud, which further solidifies Wind River and Intel® leadership in the Internet of Things (IoT). The latest release of Device Cloud is a result of dedication, collaboration and innovation across multiple organizations within the Intel family, including Wind River, Intel Security Group, and…
Automotive networks can benefit from security layers

Automotive networks can benefit from security layers

By Tim Radzykewycz Last year, at the Black Hat conference in Las Vegas, Charlie Miller and Chris Valasek reported their security research on a Jeep Cherokee.  They were able to remotely break into the system and take control of steering, brakes, and other safety critical systems on the vehicle, as well as systems not normally considered safety critical such as…
From Mars to Earth, Wind River Is Applying Three Decades of Experience to Thwart Vehicle Hacking

From Mars to Earth, Wind River Is Applying Three Decades of Experience to Thwart Vehicle Hacking

By Marques McCammon Imagine you’re driving a two-ton SUV that’s traveling 70 miles-per-hour on the highway when suddenly, beyond your control, the air-conditioner fan starts blasting, the radio blares, windshield wipers whoosh back-and-forth and then the engine shuts down just as you approach a steep incline. That’s what happened last summer to Wired's Andy Greenberg when cyber security researchers remotely commandeered…
The Role of System Updates in IoT

The Role of System Updates in IoT

By Tim Radzykewycz In the brave new world that the Internet of things (IoT) is shaping, operational technology (OT) and information technology (IT) are quickly converging. Up until now, IT was seen as defining a restricted range of technologies pertaining to information processing, mainly generating and communicating data. OT was the domain of machinery, mainly physical equipment that was doing…
Disruptive Evolution

Disruptive Evolution

By Mychal McCabe A couple of weekends ago I took my mountain bike to a nearby park. Along the way, I noticed a larger than usual number of people young and old walking with their phones held out in front of them, smiling and focused on their screens. People playing Pokémon Go. Hype surrounding the augmented reality game has mounted…
Accelerate the deployment of reliable, cost-effective and flexible virtual CPE

Accelerate the deployment of reliable, cost-effective and flexible virtual CPE

By Jeff Gowan If you’re working on the deployment of virtual CPE solutions, you’ll want to check out the recently-published white paper  “Wind River and Intel Join Forces on Reference Design for Virtual Business Customer Premises Equipment.” The paper describes the reference platform developed by Wind River in collaboration with members of the Intel Network Builders and Wind River Titanium Cloud…
Demonstration of Precision Time Protocol in VxWorks

Demonstration of Precision Time Protocol in VxWorks

By Ka Kay Achacoso   An industrial system can consist of hundreds of sensors, motors, and controllers. When the physical infrastructure connecting them together is an Ethernet network, it takes special handling to make sure that sensor data and control commands reach their destinations in the network within a hard time limit, often within one or two microseconds. Failure for…