Archive For 2013

49 articles
Simics Unleashed – Applications of Virtual Platforms

Simics Unleashed – Applications of Virtual Platforms

By Jakob Engblom "Simics Unleashed - Applications of Virtual Platforms" is the title of the latest issue of the Intel Technology Journal (ITJ). The ITJ issue on Simics is approximately 200 pages long, and contains 11 articles from Wind River, Intel, and academia. It covers a wide range of Simics uses, including such diverse topics as very large cluster simulation,…
Security in the Internet of Things

Security in the Internet of Things

By Paul Chen Wind River, with Intel and McAfee, is driving the Internet of Things. With “things” - devices and systems - interconnected to provide enhanced services enabled by increased data and adaptive analytics, it’s clear that “security is paramount and failure is not an option.” AJ Shipley, in his blog entry “European Utility Week 2013: Critical Infrastructure Security,” outlines…
Simics Network  Simulation (with Video)

Simics Network Simulation (with Video)

By Jakob Engblom Network simulation is an integral part of Simics, and most Simics target systems are networked in one way or another. The Simics Networking video posted on the Wind River Youtube channel provides a recorded demo of the fundamentals of Simics networking. In the video, we show a small heterogeneous Ethernet network containing five different machines, and perform…
It’s Transformation Time for Embedded Development – Part 2

It’s Transformation Time for Embedded Development – Part 2

By Bill Graham Every project starts with a vision—a goal for a product that is innovative and competitive. Achieving that vision requires an orchestration of internal and external variables at each phase of development, in a way that maximizes quality, mitigates risk, minimizes complexity, reduces overall cost, and ensures timely completion of the project. The shift left approach can help…
Cyberphysical Simics (with Videos)

Cyberphysical Simics (with Videos)

By Jakob Engblom An embedded computer system is rarely an isolated system. While personal computers and consumer electronics tend to operate happily on their own with a bit of user interaction, most embedded systems are deeply connected to their surrounding world. They sense the world, run control algorithms on the values read, and use actuators to control the state of…
Simics Device Modeling (Video Demo)

Simics Device Modeling (Video Demo)

By Jakob Engblom To give a feeling for how modeling works in Simics, we have posted a video on Youtube that shows how a new device is added to an existing machine. In the video, the task is to add a new device to an existing machine and make the driver software for this device happy. To achieve this, we…
Top Ten Reasons To Trust Your Business to Wind River Linux – Part 3

Top Ten Reasons To Trust Your Business to Wind River Linux – Part 3

By Bill Graham In this final post of this series (see Part 1, Part 2), I want to emphasize the importance of support, maintenance and training. The high quality support and training that is available worldwide is what differentiates commercial Linux from a roll your own solution. Wind River’s goal is to help our customers succeed with embedded Linux and this…
European Utility Week 2013: Critical Infrastructure Security

European Utility Week 2013: Critical Infrastructure Security

By AJ Shipley Wind River, Intel, and McAfee recently wrapped up a trip to European Utility Week 2013 in Amsterdam.  Security was a consistent theme across the convention sessions and around the exhibition floor; it’s a topic that everyone knows is incredibly important, but is not entirely sure how to properly address. What I find most interesting when I talk…
Top Ten Reasons to Trust Your Business to Wind River Linux – Part 2

Top Ten Reasons to Trust Your Business to Wind River Linux – Part 2

By Bill Graham In my previous post I talked about some of the top reasons that you should trust your business to Wind River Linux. Those points speak to our well-earned market leadership and company strengths. To continue, we’ll investigate additional points regarding how our embedded Linux solutions are, in the end, less risk and cost than roll-your-own solutions. Let’s have a…
It’s Transformation Time for Embedded Development – Part 1

It’s Transformation Time for Embedded Development – Part 1

By Bill Graham Something Needs to Change Fast-evolving technologies including virtualization, multi-core processors, and System on Chip (SoC) are bringing exciting new capabilities to embedded devices. These technologies can help address new market requirements to support the Internet of Things, connectivity, cloud computing, machine to machine communications, and improved security, but they also underscore an uncomfortable truth: development risks increase…