Archive For 2012

72 articles

Wind River PFI achieves GENIVI 3.0 compliance

By Franz Walkembach It’s new, it’s here, and we have it! The GENIVI Alliance recently released its latest compliance specification GENIVI 3.0, and Wind River Platform for Infotainment was among the first to achieve it. Why should this matter? It’s all about trust, scalability and quality. GENIVI®, Autosar, Car Connectivity Consortium…these are all groups created in order to set up…

Biggest Predictions for M2M

By Brian Vezza With the end of the year around the corner, I've been thinking about what's to come on the machine-to-machine (M2M) front.  Overall, I believe we’ll see a tremendous acceleration in the investment and adoption of M2M devices, systems, applications and services.  This will be due to two primary factors: opportunity and necessity.  The opportunity of M2M gets the most interest with predictions of…

Debugging Simics — on Simics

By Jakob Engblom I often write and talk about how useful Simics is for debugging concurrency bugs and glitches in multithreaded and multicore systems. Recently, we had a case where we proved this on a very complex application, namely Simics itself. This nicely demonstrated both the recursive completeness of Simics, and its usefulness for conquering tricky bugs in complex software.…

Determinism, Simics, and Flying Piggies

By Jakob Engblom  In a recent Simics seminar, I was asked about repeatability, variability, determinism and Simics. This is a question that comes up almost every time I present about Simics in front of an audience with testing experience. The people asking the question intuitively think that determinism is a bad thing - since it sounds like it will limit the execution scenarios that will…

The Yocto Project…Striking the balance of speed and stability

By Davide Ricci On my flight back to the Bay Area, I was reflecting on my memories of Barcelona at the Embedded Linux Conference Europe 2012. I’m recalling my time on stage, during the opening panel of the Yocto Project Dev Day, with my friends and colleagues from Texas Instruments, Intel, Jupiter, and ... Mentor. Surprised at the mix of…

Simulation is a competitive advantage!

By Michel Genard The American general election is over. Pundits providing postmortem analysis will continue to generate a ton of studies. Let’s examine one aspect of the election that has already generated some interesting ink. This article in Time Magazine mentions how analytic teams tried to predict election results, even running as many as 66,000 simulations night after night. The Obama campaign managed…

Poll Results are in…Network Intelligence Heading to Edge and Core

By Steve Konish If you’re an information junkie like I am, informative charts and polls always catch the eye. Polls are great for capturing an instant snapshot of public opinion on a specific topic. By no means are they scientific. However, they do give us some useful data to gauge whether or not other people share the same opinions we…

The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities

By Bill Graham In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security.  Figure 1 is an illustration of this connection (and discussed in more detail in…

Just minutes to a faster, smarter and more secure network

By Stephen Konish A few minutes…and you’re on the fast path to building the next generation of faster, smarter and more secure network applications. Three minutes – that’s all it typically takes to install key components of the new Wind River Intelligent Network Platform.  So, let’s take the next few minutes to look at  an evolution taking place for our networking and…

Medical Device Security

By Jeff Fortin A recent study published by GAO caused quite a bit of uproar over medical device security. The GAO declared in its report [read more] that the FDA has not put enough oversight in the premarket approval (PMA) of certain medical devices that are susceptible to threats. In the report the GEO referred to an experiment described in…