Archive For June, 2013

9 articles
A Whole New ‘Internet of Things’ World

A Whole New ‘Internet of Things’ World

By Jens Wiegand The Internet of Things (IoT) is transforming not only businesses, but also our lives. The ability of intelligent devices to perceive and respond to the environment around them makes them incredibly valuable for complex decision-making in a broad range of industries. The growth potential is explosive: billions of units are generating more than $1 trillion in revenue…
Getting Closer to the Network Virtualization Vision

Getting Closer to the Network Virtualization Vision

By Davide Ricci Recent times have been, and continue to be, tough times for the networking industry. Data, data and data…it’s a constant flood of data. And, legacy infrastructure isn’t able to scale to meet the exponential growth in demand for capacity. At the same time, operators are trying to introduce new advanced services to grow new revenue streams while also reducing…

Back to Reverse Execution (Video)

By Jakob Engblom  Simics reverse execution and reverse debugging is a unique and very powerful feature of the simulator. In this blog post and accompanying video, we will look at what exactly it is you can do with reverse execution in Simics. It is not just a matter of running backwards to a breakpoint or stepping instructions (pick up my 2012 S4D article for…
Operating System Hardening Techniques and Security Strategies

Operating System Hardening Techniques and Security Strategies

By AJ Shipley In my last blog post, I focused on securing the device at a high level, and in this post, I’d like to dive a bit deeper into the technical aspects of device security; specifically, regarding defense against “run time,” or operational vulnerabilities, that a system is exposed to after it has booted up. A defense in depth…

How Simics Gets Started (with video)

By Jakob Engblom ?Having worked with Simics for more than a decade, it is easy to get blind to the obvious. To me, starting a Simics simulation is a trivial thing that I do many times per day. However, to a newcomer to the product, it is not so obvious, and it might even seem a bit daunting. It is…

Confusion Abounds as Buzzwords Converge on Defining Internet of Things

By Gareth Noyes Trends seem to have a life of their own, especially in technology. Clusters of thoughts and ideas converge to re-frame an idea or define something completely new and then buzzwords are born. But before they reach critical mass and gain widespread acceptance, they often go through painful phases where the same words are used, but we get…

Reliability….the key constant in network transformation

By Jessica Schieve  Wind River recently conducted a webinar on the topic of network transformation and the growing trend around building greater intelligence.   The webinar discussed the results of a survey we commissioned through Light Reading exploring the different facets of network intelligence: packet acceleration, content inspection, flow analysis and traffic shaping, and network virtualization.  It was one of our…

Inspecting and Reconfiguring a Target in Simics 4.8

By Jakob Engblom  As we said in the first blog post on Simics 4.8, a really big new feature is the System Editor function. The system editor combines two functions into a single view, both the exploration of an existing target as well as the modification and even construction of a new target from existing pieces. A demo video is available on the Wind River channel on YouTube,…

Analytics and the ‘Internet of Things’

By Gareth Noyes Analytics has become a major buzzword these days, whether in the realm of connected devices, the Internet of Things, web analytics or big data business analytics.  In the context of the Internet of Things, I thought I’d share some observations on different analytics paradigms and use cases. One common analytics model is what could be termed “store-and-analyze-later,”…