Archive For June, 2011

5 articles

Software at the Toddler Stage

By Jakob Engblom Developing software is an adventure where you explore the unknown, one line of code at a time.  At some point, the program reaches the stage where you can actually run it and try it - and that's where the real fun begins.  The software will sometimes behave as expected, but more often than not it will not.…

They Just Upgraded our Coffee Machine

By Jakob Engblom They just upgraded our coffee machine in the office. When I came out into the kitchen to get another cup, a service technician was there with a laptop perched on the sink and a USB cable running into the innards of the coffee machine, into the back of its open front panel. When I asked what was…

The new front in cyber warfare: embedded systems

At the recent Take Down Conference, a scheduled talk on security vulnerabilities in SCADA (Supervisory Control And Data Acquisition) systems was cancelled due to direct requests from the Department of Homeland Security and Siemens (CNET - "SCADA hack talk canceled after U.S., Siemens request" . The request was made because the details of the vulnerabilities and the exploits associated with…

Wind River Named “Transformational”

By Ido Sarig Voke, Inc. has just released its annual “Market Mover Array Report on Application Lifecycle Management (ALM)," and we’re very pleased to see that Wind River’s Device Lifecycle Management solutions were favorably reviewed, and ranked as  “Transformational” - the highest category, reserved for vendors that are changing the tone and direction of the market!  Continue Reading>>

In embedded systems, a lifetime is a long time

By Bill Graham The recent news about the demise of the Mars Rover Spirit (Mike Deliman blogged about this last week) and comments about how it succeeded its mission many times over, got me thinking about just how long product lifetimes are for embedded products (see "End of Mars mission: Way beyond warranty" by Bob McDonald at the CBC). In many industries…