Linux

226 articles
Wind River Helps Omron Solve Their Industrial IoT Challenges

Wind River Helps Omron Solve Their Industrial IoT Challenges

By Alex Wilson Shaping the Factory of the Future When we look at digital business transformation, there are many aspects to be considered on how we might improve our company performance or expand into new or adjacent markets. The Industrial Internet of Things (IIoT), or Industry 4.0, is driving digital transformation by optimizing our industrial control systems though use of…
When supplier product lifecycles fight back

When supplier product lifecycles fight back

By Kevin Konkos As a young systems engineer I was often mentored by my Chief Systems Engineer to define requirements beyond product features and consider the “ilities”.  These “ilities,” such as reliability, maintainability, and supportability define the success of the product over the entire product lifecycle.  As a mid-twenties systems engineer it was hard for me to imagine the issues…
Working More Efficiently with OpenStack

Working More Efficiently with OpenStack

By Ron Breault As someone who loves the outdoors, I have a number of watercraft.  Not the kind with engines, but the kind that are self-propelled: kayaks and canoes.  Being out on a calm lake in the wee hours of the morning is pure pleasure!  Being on that same lake with a strong headwind can be exhausting. Many years ago…
More Testing than Tapas: ETSI Releases Detailed Plugtest Report

More Testing than Tapas: ETSI Releases Detailed Plugtest Report

By Charlie Ashton A few weeks ago, we published a post “Tapas and Testing: Two Weeks in Madrid” summarizing Wind River’s involvement in ETSI’s first “NFV Plugtest” event, which was hosted by 5TONIC Laboratory in Leganes, near Madrid  from January 23rd through February 3rd. In that post, we summarized the success of the Wind River Titanium Cloud network virtualization platform in…
More details on Nokia’s use of Wind River Titanium Cloud in AirFrame Data Center Solution

More details on Nokia’s use of Wind River Titanium Cloud in AirFrame Data Center Solution

By Charlie Ashton As service providers plan for Cloud Radio Access Network (Cloud-RAN) deployments, the stringent capacity and latency requirements of mobile radio access technologies drive the need for an extremely powerful cloud infrastructure, tailored for real-time performance. To meet these challenging goals with their AirFrame Cloud-RAN solution, Nokia selected the Wind River Titanium Cloud portfolio of virtualization software. The…
Order from Chaos

Order from Chaos

By Ron Breault What’s more frustrating than trying to root cause a problem with an app running on a large, multi-process server?  How about doing the same when that server is running OpenStack, notorious for generating cryptic logs?  Now imagine the challenge of doing the same when the app might span or migrate across 100 servers and runs virtualized in…
What’s in a Name? New Applications for Virtualization in Critical Infrastructure

What’s in a Name? New Applications for Virtualization in Critical Infrastructure

By Charlie Ashton Product naming can be challenging. Just ask Coke, who probably didn’t expect that “Coke Classic” would result in countless business school studies about how to damage a perfectly good brand. On the other hand I’ve always believed that NASA got it right with “Voyager”, which seems like the perfect name for a couple of spacecraft whose journeys…
Don’t Miss Integrated Demonstration of OPEN-O at Mobile World Congress

Don’t Miss Integrated Demonstration of OPEN-O at Mobile World Congress

By Charlie Ashton If you’re attending Mobile World Congress later this month, you’ll have the opportunity to see one of the first public demonstrations of and end-to-end use case enabled based on the OPEN-O open-source orchestration project. At China Mobile’s booth (Hall 1 Stand 1G50), you’ll see a demo that is the result of extensive collaboration between China Mobile, Intel…
What is the Response to Security Incidents in the Embedded World?

What is the Response to Security Incidents in the Embedded World?

By Tim Radzykewycz It is simply a reality that no computer system is impervious to threat or some sort of compromise.  However, it is an industry best practice to deploy Intrusion Detection Systems (IDS) to detect intrusions, have rapid access to an Incident Response Team (IRT) to investigate the intrusion, and have a plan on how to deal with certain,…
Tapas and Testing: Two Weeks in Madrid

Tapas and Testing: Two Weeks in Madrid

By Charlie Ashton Over the past couple of weeks, Spain was the place to be if you provide products targeted at Network Functions Virtualization (NFV). From January 23rd through February 3rd, the ETSI Centre for Testing and Interoperability organized its first “NFV Plugtest” event, which was hosted by 5TONIC Laboratory in Leganes, near Madrid. The primary objective was to determine…