Workbench

49 articles
It’s Transformation Time for Embedded Development – Part 4

It’s Transformation Time for Embedded Development – Part 4

By Dennis Wong Embedded Development Transformation in the Develop Phase To see the definitions of each of the product development phases, take a look at the second post in this blog series. The develop phase is the main software construction occurs, where the code is produced. Risks This phase encompasses the full-out development and unit (even subsystem) testing of code…
It’s Transformation Time for Embedded Development – Part 3

It’s Transformation Time for Embedded Development – Part 3

By Dennis Wong Embedded Development Transformation in the Bring Up Phase In an earlier post of this blog series, our team discussed the phases of embedded development. The bring up phase is unique to embedded development because embedded systems are tightly coupled with their hardware which is often customized for its unique application. Getting early hardware and software operational is…
It’s Transformation Time for Embedded Development – Part 2

It’s Transformation Time for Embedded Development – Part 2

By Bill Graham Every project starts with a vision—a goal for a product that is innovative and competitive. Achieving that vision requires an orchestration of internal and external variables at each phase of development, in a way that maximizes quality, mitigates risk, minimizes complexity, reduces overall cost, and ensures timely completion of the project. The shift left approach can help…
It’s Transformation Time for Embedded Development – Part 1

It’s Transformation Time for Embedded Development – Part 1

By Bill Graham Something Needs to Change Fast-evolving technologies including virtualization, multi-core processors, and System on Chip (SoC) are bringing exciting new capabilities to embedded devices. These technologies can help address new market requirements to support the Internet of Things, connectivity, cloud computing, machine to machine communications, and improved security, but they also underscore an uncomfortable truth: development risks increase…

The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities

By Bill Graham In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security.  Figure 1 is an illustration of this connection (and discussed in more detail in…

Simplifying M2M

By Brian Vezza Today, Wind River is taking a significant step forward in simplifying machine-to-machine (M2M) development for our customers.  We announced the Wind River Intelligent Device Platform which builds upon Wind River’s operating system and tools leadership with M2M middleware to make it easier to design, build, and operate M2M or smart connected devices. As I’ve written before, M2M devices…

All Your Mars are Belong to US!

By Mike Deliman It's time to celebrate. We have returned to Mars with the most complex roving robotic laboratory ever sent to another planet. We have demonstrated and proved the Sky Crane concept, which opens doors onto other worlds that we have never had before. We can successfully deliver 1 metric ton to the surface of Mars.This is an achievement…

Complexity

By Mike Deliman This afternoon I watched the press conferences for Mars Science Laboratory “Curiosity” that were hosted by NASA/JPL from Pasadena, Ca.  These conferences were broadcast over NASA-TV, both on the cable/satellite channels and over the web.  If you haven’t seen the Seven Minutes Video I encourage you to watch it. Various scientists, directors and managers of the project…

The Role of Tools in Improving Embedded Software Security / Part 1: Automation is the Key

By Bill Graham Security Vulnerabilities are Expensive Shipping security vulnerabilities in a finished product and having them discovered or worse, exploited, is a very expensive proposition for embedded device vendors. As I’ve discussed in an earlier post, security defects are much more expensive to patch and fix the later they are discovered. If you’re lucky to catch a vulnerability during…

How Are You Reducing Radiation?

By Pete MacKay A few years back the FDA launched an initiative aimed at reducing radiation exposure in patients undergoing CT scans.  Clearly there are concerns with exposing the human body to ionizing radiation, and due to the prevalence and popularity of these imaging techniques the FDA feels they are in a position to ensure proactive steps are taken to…