Linux

238 articles
What is the Response to Security Incidents in the Embedded World?

What is the Response to Security Incidents in the Embedded World?

By Tim Radzykewycz It is simply a reality that no computer system is impervious to threat or some sort of compromise.  However, it is an industry best practice to deploy Intrusion Detection Systems (IDS) to detect intrusions, have rapid access to an Incident Response Team (IRT) to investigate the intrusion, and have a plan on how to deal with certain,…
Tapas and Testing: Two Weeks in Madrid

Tapas and Testing: Two Weeks in Madrid

By Charlie Ashton Over the past couple of weeks, Spain was the place to be if you provide products targeted at Network Functions Virtualization (NFV). From January 23rd through February 3rd, the ETSI Centre for Testing and Interoperability organized its first “NFV Plugtest” event, which was hosted by 5TONIC Laboratory in Leganes, near Madrid. The primary objective was to determine…
Boost your VNF’s performance by 30x without lifting a finger (and 40x with just a little effort)

Boost your VNF’s performance by 30x without lifting a finger (and 40x with just a little effort)

By Charlie Ashton As service providers move beyond initial trials of Network Functions Virtualization (NFV) and start planning actual deployments of virtualized applications, the economics of this transition come under increasing scrutiny. After all, why would you take the risk of deploying new, risky technology unless the Return on Investment (RoI) is both significant and quantifiable? One of the major…
Networking, networking, networking, networking!

Networking, networking, networking, networking!

By Ron Breault There's a funny, infamous video someone put together on YouTube years ago showing a highly enthusiastic Steve Balmer (to put it mildly) strutting on stage shouting "Developers, developers, developers, developers!" over and over again.  Much of this footage presumably came from speeches given by Steve at conferences, talking about how important developers were to his company's future. …
The Value of Focus

The Value of Focus

By Ron Breault One of the regular activities we undertake at Wind River is to evaluate our products vs. alternative solutions. How do we compare?  What are our strengths and weaknesses?  How do we continue to lead? I recently watched as a colleague went through a lengthy and frustrating process to install a commercial, enterprise class OpenStack distribution.  He had…
Wind River Continues Longstanding Leadership in Global Embedded Software Market

Wind River Continues Longstanding Leadership in Global Embedded Software Market

By Michael Krutz The IoT and embedded operating systems provide the backbone of the software that ship in billions of new devices every year. According to VDC Research, embedded OS unit shipments will grow from 13.3B in 2016 to 19.3B in 2020. Given this competitive environment, I’m excited to share that once again Wind River topped both the real-time operating…
Wind River Linux: Worry-Free Open Source Support Since 2007

Wind River Linux: Worry-Free Open Source Support Since 2007

By Andreea Volosincu Working with the open source community is very rewarding, and the Linux team here at Wind River has helped hundreds of customers tap into open source innovation over many years. This month, our efforts culminated in the latest release of Wind River Linux – now in its 9th edition. Wind River Linux 9 is providing a flowing stream…
China Telecom Completes Virtual IMS Proof-of-Concept Based on Titanium Cloud

China Telecom Completes Virtual IMS Proof-of-Concept Based on Titanium Cloud

By Charlie Ashton Back in June, we blogged about China Telecom’s evaluation of the Wind River Titanium Cloud network virtualization platform. Based on a conversation with Ou Liang, Senior Engineer, Head of NFV Infrastructure Technology and Solutions at the Guangzhou Research Institute of China Telecom, we summarized the results of this evaluation. At that time, Mr. Ou told us that China…
Prevent human error in security: Dave meet STIG, STIG meet Dave

Prevent human error in security: Dave meet STIG, STIG meet Dave

By Tim Radzykewycz Recently, I ran across a cartoon about software security by John Klossner.  It shows a boxing ring, with assorted security software in one corner, and in the other corner was a guy wearing a shirt labelled "Human Error."  I had seen this cartoon before.  But for some reason, it touched off a reaction this time. Credit: 2006…
Roadmap Planning: Choose the Right Linux Building Blocks

Roadmap Planning: Choose the Right Linux Building Blocks

By Andreea Volosincu The year is drawing to a close, and it’s becoming increasingly hard to book conference rooms. Everyone is planning, estimating, strategizing, agreeing to disagree, etc. The result? A golden document, which, made right, it will make or break your product goals in 2017 – the strategic product roadmap. Whether you are a system integrator selling industrial development…