embedded

31 articles

Inspecting and Reconfiguring a Target in Simics 4.8

By Jakob Engblom  As we said in the first blog post on Simics 4.8, a really big new feature is the System Editor function. The system editor combines two functions into a single view, both the exploration of an existing target as well as the modification and even construction of a new target from existing pieces. A demo video is available on the Wind River channel on YouTube,…

Let’s Talk About Securing the Device

By AJ Shipley In my previous blog post, I touched on the key variables influencing how we approach device security.  In this blog post, I’ll focus the discussion on securing the device.  Before I do, I want to touch briefly on what was a key take away for me from last month’s RSA conference in San Francisco.  This year, the…

The Yocto Project…Striking the balance of speed and stability

By Davide Ricci On my flight back to the Bay Area, I was reflecting on my memories of Barcelona at the Embedded Linux Conference Europe 2012. I’m recalling my time on stage, during the opening panel of the Yocto Project Dev Day, with my friends and colleagues from Texas Instruments, Intel, Jupiter, and ... Mentor. Surprised at the mix of…

Simulation is a competitive advantage!

By Michel Genard The American general election is over. Pundits providing postmortem analysis will continue to generate a ton of studies. Let’s examine one aspect of the election that has already generated some interesting ink. This article in Time Magazine mentions how analytic teams tried to predict election results, even running as many as 66,000 simulations night after night. The Obama campaign managed…

Poll Results are in…Network Intelligence Heading to Edge and Core

By Steve Konish If you’re an information junkie like I am, informative charts and polls always catch the eye. Polls are great for capturing an instant snapshot of public opinion on a specific topic. By no means are they scientific. However, they do give us some useful data to gauge whether or not other people share the same opinions we…

Just minutes to a faster, smarter and more secure network

By Stephen Konish A few minutes…and you’re on the fast path to building the next generation of faster, smarter and more secure network applications. Three minutes – that’s all it typically takes to install key components of the new Wind River Intelligent Network Platform.  So, let’s take the next few minutes to look at  an evolution taking place for our networking and…

Analyzing Manycore Scaling with Simics

By Jakob Engblom In my previous blog post on multicore scaling investigations with Simics, I tested a simple parallel program on a variety of machines. The scaling obtained was not particularly impressive, especially not on a 60-core target machine. In this post, we will use the Simics timeline view to look a bit closer at what is going on inside the…

Wind River Linux and the Yocto Project…Sowing the seeds of change

By Davide Ricci The year was 1998, I was walking through the aisles of a book store on campus at the Politecnico of Milano and a box of software caught my eye. It looked unconventional, sort of "homemade" and on its cover was an image of a man with a red hat. It was Red Hat 5.2, and the box…

The Yocto Project: What It Is and What It Isn’t

By Davide Ricci As I work heavily with embedded Linux on a daily basis, I’m often asked about the Yocto Project.  While the Yocto Project is gaining traction and folks in the industry are generally aware of it, there still exists a bit of unfamiliarity of the details. What exactly is the Yocto Project? Is it a Linux distribution?  How…

Resistance is futile. You will be simulated!

By Michel Genard Within our blog series, we frequently refer to functional simulation as a requisite to do things that aren't possible in the real world when working on a physical board and a cross development system to develop embedded software. By using simulation, you’re transported to a novel dimension where, because of the control over time, you can become Neo from…