Linux

205 articles
What is the Response to Security Incidents in the Embedded World?

What is the Response to Security Incidents in the Embedded World?

By Tim Radzykewycz It is simply a reality that no computer system is impervious to threat or some sort of compromise.  However, it is an industry best practice to deploy Intrusion Detection Systems (IDS) to detect intrusions, have rapid access to an Incident Response Team (IRT) to investigate the intrusion, and have a plan on how to deal with certain,…
Wind River Linux: Worry-Free Open Source Support Since 2007

Wind River Linux: Worry-Free Open Source Support Since 2007

By Andreea Volosincu Working with the open source community is very rewarding, and the Linux team here at Wind River has helped hundreds of customers tap into open source innovation over many years. This month, our efforts culminated in the latest release of Wind River Linux – now in its 9th edition. Wind River Linux 9 is providing a flowing stream…
Prevent human error in security: Dave meet STIG, STIG meet Dave

Prevent human error in security: Dave meet STIG, STIG meet Dave

By Tim Radzykewycz Recently, I ran across a cartoon about software security by John Klossner.  It shows a boxing ring, with assorted security software in one corner, and in the other corner was a guy wearing a shirt labelled "Human Error."  I had seen this cartoon before.  But for some reason, it touched off a reaction this time. Credit: 2006…
Roadmap Planning: Choose the Right Linux Building Blocks

Roadmap Planning: Choose the Right Linux Building Blocks

By Andreea Volosincu The year is drawing to a close, and it’s becoming increasingly hard to book conference rooms. Everyone is planning, estimating, strategizing, agreeing to disagree, etc. The result? A golden document, which, made right, it will make or break your product goals in 2017 – the strategic product roadmap. Whether you are a system integrator selling industrial development…
Multi-Vendor Interoperability Demonstrates Compliance with Open Standards for NFV

Multi-Vendor Interoperability Demonstrates Compliance with Open Standards for NFV

By Charlie Ashton This week, service providers, vendors and analysts from around the world will gather in The Netherlands to attend SDN and OpenFlow World Congress, which is taking place in The Hague this time. Happy Birthday NFV Those of us that attended this same event back in October 2012, when it was located in Darmstadt, Germany, will remember that…
Creating the Next Generation Automotive Cockpit

Creating the Next Generation Automotive Cockpit

By Dan Noal The automotive landscape is undergoing a software revolution. Consumers are coming to expect a connected lifestyle in every aspect of their lives including inside their car. The importance of software is growing as it is becoming the key to creating unique driving experiences. Wind River Helix Cockpit is a Linux based offering targeting in-vehicle infotainment (IVI), telematics,…
LG U+ Announces Commercial Carrier Grade NFV based Virtual Router

LG U+ Announces Commercial Carrier Grade NFV based Virtual Router

LG U+ Announces Commercial carrier grade network equipment by overcoming major challenges of reliability Advancement would allow LGU+ to deploy NFV infrastructure optimized for 5G services. LG U+ announced that the company partnered with global network company Juniper and Wind River to successfully commercialize a carrier grade NFV (Network Functions Virtualization)-based virtual router for application in service networks. NFV is a…
Open Data Plane Support for Linux-based Network Applications

Open Data Plane Support for Linux-based Network Applications

By Bruce Ashfield The collaborative way of developing software shows us that where there’s a technical challenge, there’s an open source project to tackle it. Also, where there’s an open source project, there’s a group of people supporting, contributing, extending and using it to drive innovation. OpenDataPlane (ODP) is one of those open source projects. It offers a layer for…
Unlocking The Potential Of SDN And NFV

Unlocking The Potential Of SDN And NFV

By Sohini Bagchi  In the enterprise networking space, the Internet of Things (IoT) is gradually becoming mainstream. According to IT industry body NASSCOM, the global IoT business is expected to touch USD 300 billion by 2020. And according to Grand View Research, the global enterprise networking market is expected to touch USD 64.6 billion in revenue by 2024. With this transformation, it is interesting to note…
Automotive networks can benefit from security layers

Automotive networks can benefit from security layers

By Tim Radzykewycz Last year, at the Black Hat conference in Las Vegas, Charlie Miller and Chris Valasek reported their security research on a Jeep Cherokee.  They were able to remotely break into the system and take control of steering, brakes, and other safety critical systems on the vehicle, as well as systems not normally considered safety critical such as…