Archive For February, 2014

4 articles
Safety-critical Systems Symposium 2014

Safety-critical Systems Symposium 2014

By Paul Parkinson  I recently attended the 22nd Annual Safety-critical Systems Symposium, in Brighton, UK. It was a memorable event (and not just for the storms raging outside of the hotel, which have recently battered the UK!). The symposium covered a range of safety-related topics relevant to the Aerospace & Defence, Industrial and Medical markets, and it was interesting to…
VxWorks 7: The RTOS for the Internet of Things Is Here

VxWorks 7: The RTOS for the Internet of Things Is Here

By Michael Weinstein Updating an iconic product that has been setting the standard for over 25 years is no trivial task. How does a successful company go about making such a product more relevant to the changing customer needs and market dynamics while maintaining the unique appeal that secured it the status of a market leader in the first place?…
Scaling Deep Packet Inspection Intelligence in the Virtual Network

Scaling Deep Packet Inspection Intelligence in the Virtual Network

By Jeff Gowan How can you get Intrusion Detection that is many times faster than in-house or open source? What happens when you put it in the cloud? Join us Monday night, 2/24 at 6:45 in the Intel Security booth (#3203) at the RSA Conference 2014 to find out. Steve Konish (of the Konish Academy) will discuss how the Content…
Don’t be a Target for Cyber-crime

Don’t be a Target for Cyber-crime

By Jeff Gowan I’m a relatively new employee at Wind River and continue to learn new things and make new connections every day. As I was driving home from work the other day I was listening to yet another news story regarding the credit card fraud incidents that hit Target and Neiman Marcus at the end of last year. This…