OpenCV on VxWorks enables intelligence at the edge

OpenCV on VxWorks enables intelligence at the edge

By Ka Kay Achacoso When a wind turbine collects sensor data about its surrounding environment, or an off-shore oil rig logs its readings into its records, the data can be analyzed for decision-making factors: Are the sudden changes in engine noise an indication of wear?  Are there any flying objects headed towards danger zones? Are the engine settings optimal for…
Edge Computing Enabling the Future

Edge Computing Enabling the Future

By guest contributor Fredrik Sande, Marketing Manager, Raima Most tech discussions today arrive at the same conclusion: the future of big data is edge computing. While discussions around edge computing are not necessarily new, the growth of the Internet of Things (IoT) has clarified how critical establishing the right presence at the edge can be. Market demands are increasing at…
From System Design to Certification: Wind River Helps Rockwell Collins Reduce the Risk of Multi-core Certification

From System Design to Certification: Wind River Helps Rockwell Collins Reduce the Risk of Multi-core Certification

By Paul Parkinson RTCA DO-178C / EUROCAE ED-12C safety certification is a crucial step for safety-critical avionics software programs, but for many program managers and software leads it still poses significant risk, especially when using multi-core processors. This risk is mainly due to the fact that certification authorities have not yet issued formal guidance or policy on multi-core certification. Although…
Zero-Touch Automation Moves Telecom Networks from Automatic to Autonomous

Zero-Touch Automation Moves Telecom Networks from Automatic to Autonomous

By Charlie Ashton Back in 2012, telecom service providers worldwide launched a collaborative initiative to establish open standards for the virtualization of telecom networking functions, which came to be known as Network Functions Virtualization (NFV). Given the fierce competition in this market as well as anti-trust concerns, this was very much the equivalent of Donald Trump sitting down for a…
Secure by Design

Secure by Design

By guest contributor Mark Hermeling, Senior Director of Product Marketing, GrammaTech So, your company has challenged you to design the next generation of embedded device. This is an IoT device for the next great idea that the C-suite is ‘betting the company on’. Only the best counts. This is a defining moment in your career! So you set down to grab the best…
Maintaining Virtualized Networks the Easy Way

Maintaining Virtualized Networks the Easy Way

By Jeff Gowan Network virtualization gives critical infrastructure operators unprecedented flexibility and choice when it comes to selecting software-based networking solutions. The separation of software from purpose-built hardware frees operators from decades of vendor lock-in and reasserts their control over technology roadmaps. Understandably, the roll-your-own approach is enticing for network operators. In the realm of enterprise networks, IT teams have…
Software Considerations and Security Requirements for Medical Devices

Software Considerations and Security Requirements for Medical Devices

By guest contributor Daniela Previtali, Global Marketing Director, Wibu-Systems Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient data, all in an increasingly connected environment. For embedded system developers, in particular, choosing the software best suited for the design of the medical device and its…
Wind River’s Connected Vehicle Solutions and Professional Services Achieve CMMI® Level 3 Rating

Wind River’s Connected Vehicle Solutions and Professional Services Achieve CMMI® Level 3 Rating

By Amit Ronen Wind River is proud to announce that the CMMI® Institute has appraised our Connective Vehicle Solutions and Professional Services at a Capability Maturity Model Integration (CMMI)® Level 3, underscoring our dedication to continuous improvement and producing quality solutions and services that make a difference. CMMI is a globally-recognized set of best practices that enable organizations to improve…
Complete the list: Louisville, Durham, Paris, Portland…

Complete the list: Louisville, Durham, Paris, Portland…

By Charlie Ashton Can you complete this list: Louisville, Durham, Paris, Portland, ….? If so, and if you correctly answered “Sophia Antipolis”, you’re either a geek who spends way too much time online reading network test reports or a battle-hardened engineer who’s lugged bulky test equipment through too many airports and is now returning home from two weeks in the…
Multi-Access Edge Computing: Bringing Forward the 5G Experience

Multi-Access Edge Computing: Bringing Forward the 5G Experience

By guest contributor Alla Goldner, Director of Technology, Strategy and Standardization, Amdocs  5G will dramatically alter the relationships between service providers in all industries and the customers they serve. Despite the hype, it will still be years before standards are formalized and technology is mature enough to support all the potential 5G use cases. With advanced technology, such as artificial intelligence…