Archive For April, 2012

9 articles

Industrial Automation and the Cloud

By Alexander Damisch We’re hearing so much about the cloud lately – and I get asked often what cloud computing means in the context of industrial automation and about the benefits delivered, so I thought I’d take this opportunity to share my thoughts on the cloud as it pertains to industrial automation.  It's a topic I recently covered in a Q&A session for…

Improving Embedded Operating System Security Part 6: Harden the System Against Attack

By Bill Graham In the previous posts I’ve discussed various steps that need to be taken in order to improve security, but these are all preventative measures that require validation before a device is ready for market. Enabling the security features of your embedded OS is the first step, but it’s important to test the system continuously throughout development. The…

Getting Code Coverage with LDRA Tools on Simics

By Jakob Engblom A system development tool like Simics is rarely used completely on its own. Simics is usually brought in by companies and development teams who are already using a variety of tools and expect to keep doing so along with Simics. Also, Simics by itself cannot reasonably be expected to solve all problems for all people. Instead, we…

How Are You Reducing Radiation?

By Pete MacKay A few years back the FDA launched an initiative aimed at reducing radiation exposure in patients undergoing CT scans.  Clearly there are concerns with exposing the human body to ionizing radiation, and due to the prevalence and popularity of these imaging techniques the FDA feels they are in a position to ensure proactive steps are taken to…

Improving Embedded Operating System Security Part 5: Securing Code and Data

By Bill Graham Secure the Boot and Execution Embedded systems are vulnerable at boot time. For example, it’s common for hobbyists to re-flash consumer products’ firmware to change the way it operates. However, malicious attacks on device boot up and operation are undesirable for mission critical systems. In addition, devices often allow updates via web interfaces or other remote access…

Linux Foundation’s License Compliance Standard, SPDX, Offers Real Value

By Mark Gisi There is only one criterion that determines whether a piece of software is open source software (OSS) - the license from which you receive the software under. If you are granted rights under an open source license such as the BSD, Apache or GPL, it is open source software. Although the open source movement has other core…

Wind River and Android – 5 great years, with many more to come

By Dan Noal It was 5 years ago this week that I got an email from our CEO who had just met with Andy Rubin and Rich Miner at the Googleplex. Google had invited us to talk privately and confidentially about what would become Android.  Other companies were already on board, and they asked us to join the small group of…

Improving Embedded Operating System Security Part 4: Partition Systems to Protect Essential Components

By Bill Graham An effective security technique is to separate different major components of a system into partitions. In some cases these partitions are physical, i.e., separate devices with physical separation. With modern virtualization technologies these partitions can be virtual, in software, on the same device or processor. An example of this would be combining a general purpose OS (GPOS)…

Wind River Showcases Yocto and GENIVI in IVI

By Franz Walkembach We're looking forward to an upcoming global GENIVI all hands meeting that brings together major OEMs like BMW, Peugeot, Citroen, Nissan or Renault as well as automotive Tier 1 companies like Continental Automotive, Denso, Delphi and Bosch. Later this month, these organizations will gather for several days near Paris to discuss the current state of affairs and latest developments…