Oct 25, 2011 embedded virtualization

Improving Embedded Security: Proper Runtime Selection

By Bill Graham

Bill Graham

Selection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and development costs. Moreover, there are additional benefits from using commercial-off-the-shelf (COTS) software components over Roll Your Own (RYO) code or self-ported and maintained open source code. Some of the COTS components worth considering include:

Continue reading >>

Previous Achieving Seamless Connectivity and Compliance for Mobile Healthcare
Next How Security and Safety Regulatory Concerns Impact Public Transportation Industry