Security

143 articles
Swarm Technology – Pushing the Barriers of Autonomous Systems

Swarm Technology – Pushing the Barriers of Autonomous Systems

By Andreea Volosincu These are not just any ordinary unmanned aircraft systems (UAS). They fly together. Better still, they swarm together, for any Star Trek fans out there. They can also team up with a manned aircraft and act like a force multiplier. This kind of unmanned aircraft can bring significant improvements to almost every area of national and homeland…
My New Socks from the ARC Industry Forum in Orlando

My New Socks from the ARC Industry Forum in Orlando

By Tony Crupi A few weeks ago, I attended the ARC Industry Forum in Orlando, FL. This was my fourth year attending the conference and it has grown to over 950 attendees, which included attendees from ExxonMobil, Schneider Electric, Rockwell Automation, GE, Honeywell, Intel, and many others. During the event, I was able to meet with many Wind River’s customers, as well…
Is your ATM moving from Windows 7 to Windows 10?  Save the Motherboards!

Is your ATM moving from Windows 7 to Windows 10? Save the Motherboards!

By Rick Anderson Within the financial sector, Automated Teller Machines (ATMs) are one of the primary mechanisms for getting cash out of your bank or savings & loan account.  The majority of these devices are running Microsoft’s Windows 7 operating system on older Intel motherboards.  Unfortunately, Windows 7 end of life occurs on January 14, 2020 and after that date, these ATMs…
Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

Security Response Management: Risk, Cost, and Best Practices in an Imperfect World

By David Reyna Keeping our products secure is a requirement for survival, demanding vigilance in finding, applying, and distributing working patches to our customers in the timeliest manner possible. While there is heightened awareness about device vulnerabilities, what is often missing is awareness about the process of managing the security response process itself. Community security vulnerability data is available, but…
Meeting FDA Regulations to Update Medical Devices for Safety and Security

Meeting FDA Regulations to Update Medical Devices for Safety and Security

By Jeff Kataoka Protecting patients and promoting public health is a key directive for the U.S. Food & Drug Administration (FDA). This directive includes oversight on the safe and secure use of medical devices for patient care. That means that if you are a medical device manufacturer, your company needs to ensure that its medical device is meeting FDA regulations…
Reliable, Safe and Secure? Ada and VxWorks Can Help!

Reliable, Safe and Secure? Ada and VxWorks Can Help!

By guest contributor Ben Brosgol, Senior Technical Staff, AdaCore Writing reliable, safe and secure software is tough. Doing it for for hard real-time systems with demanding certification requirements -- such as DO-178B or DO-178C for avionics -- is tougher and indeed is one of the most daunting challenges that a developer has to face. Meeting this challenge calls for experience-hardened…
The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

By Gareth Noyes Software content is increasing in every realm of technology, and has been the catalyst for the explosive growth of entirely new market sectors. The development and deployment of software at scale has matured significantly over the last decade in enterprise- and cloud-IT applications. This has been enabled, among other factors, by: Uniformity of computing infrastructure (think of…
New Performance Breakthrough for VxWorks-based HPEC Systems

New Performance Breakthrough for VxWorks-based HPEC Systems

By guest contributor Michelle Watson, Marketing Product Portfolio Manager, Curtiss-Wright Defense Solutions For years, designers of High Performance Embedded Computing (HPEC) systems have sought to free up critical resources and establish optimal performance for Intelligence, Surveillance and Reconnaissance (ISR) applications.  Today, system designers can take full advantage of the Intel® Xeon® D processor architecture for their multi-core/multi-board HPEC systems using…
VxWorks: Past and Future

VxWorks: Past and Future

By Andreea Volosincu The year is 2002. Brazil is winning the FIFA World Cup and the first cell phone to have a built-in camera is released in the US – yes, this story is THAT old. In the world of secure and reliable systems, Wind River releases VxWorks 5.5. Fast forward 16 years, VxWorks® 5.5 reaches its End-of-Life (EOL) status…
Software Considerations and Security Requirements for Medical Devices

Software Considerations and Security Requirements for Medical Devices

By guest contributor Daniela Previtali, Global Marketing Director, Wibu-Systems Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient data, all in an increasingly connected environment. For embedded system developers, in particular, choosing the software best suited for the design of the medical device and its…