Linux

209 articles
What is CVE-2015-7547?

What is CVE-2015-7547?

By Andreea Volosincu Some of the uncovered common vulnerabilities capture the world’s attention to the point of being attributed a nickname (e.g. heartbleed). Others are fixed and get popular just in engineering circles. CVE-2015-7547 is one for engineers to know about. The latest reported common vulnerability has not received a nickname, but this is not to say CVE-2015-7547 isn’t important. Exploring…
More than NFV: Transformations in Networking Bring Challenges and Opportunities

More than NFV: Transformations in Networking Bring Challenges and Opportunities

By Charlie Ashton With all the industry hype around Network Functions Virtualization (NFV), it’s easy to lose track of the fact that telecom infrastructure is not the only segment of the networking market that’s undergoing radical transformation. Business of all kinds are benefitting from the wide-ranging evolutions of the networks they depend on. Billions of consumers, most of  whom are…
Two to Tango: When Hardware Met Software

Two to Tango: When Hardware Met Software

By Andreea Volusincu Try going incognito on Google (as if you’re on a covert mission), and type “Why is embedded software so” and see what you get. It’s an interesting a dilemma. Autocomplete is a wonderful thing. You can certainly question how accurately the suggested word fits your search, but it still says a lot about what popular perceptions and…
Long Live the New LTS Kernel

Long Live the New LTS Kernel

By Andreea Volosincu It’s the most wonderful time of the year again! No, it’s not Christmas, but the beginning of a new cycle in the Linux microcosm. A few days ago, the Linux 4.1 kernel has been released, and chosen as the LTS kernel of 2015, becoming the most advanced long-term supported release. This is significant not only because the LTS…

Using VirtIO to Virtualize Storage

By Mark Hermeling Embedded virtualization allows for consolidation of multiple different operating systems on a single box. Our video demonstration combines four different Wind River Linux operating systems onto a single Advantech 2151 board. Combining multiple operating systems together often means that you need to share critical resources. In the above demonstration we show how the Virtualization Profile of VxWorks…
Intel DPDK  – A Technology that is Thriving

Intel DPDK – A Technology that is Thriving

By Andreea Volosincu For far too many times, the world of open source software gives way to a plethora of standards and reference designs that are supposed to make users’ life easier, improve performance, and security; often making it onto many conference slides as best examples. Some come, some are left behind, but those that manage to stick are continuously…
Break Out and Stay Out with Open Source

Break Out and Stay Out with Open Source

By Andreea Volosincu Let’s talk about the issues around proprietary software and closed ecosystems. Using them keeps your embedded devices enclosed. However, some may come to think there is no better option out there, especially when they’ve seen  how other people have tried to break the proprietary bond but failed. Yes, looking at you Munich! Meanwhile the world continues to innovate…
How Virtual Switch Performance Improves Service Provider OPEX

How Virtual Switch Performance Improves Service Provider OPEX

By Charlie Ashton This post will explain how increasing the performance of the virtual switch in an NFV platform causes very significant improvements in service provider opex. We’ll show an example that illustrates a 6.7x increase in the number of subscribers supported per server, while explaining how greater improvements are possible in other use cases. When the concepts for network functions virtualization (NFV) were first…
It’s Transformation Time for Embedded Development – Part 4

It’s Transformation Time for Embedded Development – Part 4

By Dennis Wong Embedded Development Transformation in the Develop Phase To see the definitions of each of the product development phases, take a look at the second post in this blog series. The develop phase is the main software construction occurs, where the code is produced. Risks This phase encompasses the full-out development and unit (even subsystem) testing of code…
It’s Transformation Time for Embedded Development – Part 3

It’s Transformation Time for Embedded Development – Part 3

By Dennis Wong Embedded Development Transformation in the Bring Up Phase In an earlier post of this blog series, our team discussed the phases of embedded development. The bring up phase is unique to embedded development because embedded systems are tightly coupled with their hardware which is often customized for its unique application. Getting early hardware and software operational is…