Linux

239 articles
Accelerated Virtual Routing Makes OpenStack More Cost-Effective

Accelerated Virtual Routing Makes OpenStack More Cost-Effective

By Charlie Ashton In a recent post we outlined some of the approaches we’re taking to solve OpenStack-related problems and thereby enable it to become a viable solution for VM orchestration in telco applications such as virtual CPE. This topic is also covered in a detailed white paper that you can find here. As we talk with service providers and…
Which Virtualization Strategy is Right for You?

Which Virtualization Strategy is Right for You?

By Chip Downing Advances in microprocessor technology now enable embedded and IoT designers to create very powerful solutions by integrating both information technology (IT) and operational technology (OT) into shared, consolidated compute platforms. Today’s embedded microprocessors have hardware-assisted virtualization intellectual property that supports full operating system environments in virtual machines (VMs) on a shared compute environment. Although this capability has…
Security Vulnerabilities with Fingerprinting: Linux Considerations

Security Vulnerabilities with Fingerprinting: Linux Considerations

By  Tim Radzykewycz Various tools, such as nmap, can be used to help determine what operating system a particular computer is running, based on the network responses it generates to crafted network probes. This is called “fingerprinting.” Fingerprinting is a security concern.  It doesn't make it possible to exploit anything that isn't already exploitable.  However, it significantly trims the search…
Are you DROWNing?

Are you DROWNing?

By Mark Hatle An attack on the SSLv2 protocol, was disclosed this week by security researchers. Visit https://drownattack.com if you want to get straight to the scoop. This is yet another in a long string of attacks on the SSLv2 protocol, including the well publicized Heartbleed issue from a few years ago. This protocol was considered to be so insecure…
What is CVE-2015-7547?

What is CVE-2015-7547?

By Andreea Volosincu Some of the uncovered common vulnerabilities capture the world’s attention to the point of being attributed a nickname (e.g. heartbleed). Others are fixed and get popular just in engineering circles. CVE-2015-7547 is one for engineers to know about. The latest reported common vulnerability has not received a nickname, but this is not to say CVE-2015-7547 isn’t important. Exploring…
Two to Tango: When Hardware Met Software

Two to Tango: When Hardware Met Software

By Andreea Volusincu Try going incognito on Google (as if you’re on a covert mission), and type “Why is embedded software so” and see what you get. It’s an interesting a dilemma. Autocomplete is a wonderful thing. You can certainly question how accurately the suggested word fits your search, but it still says a lot about what popular perceptions and…
Collaborating in the Helix Lab Cloud to Fix a Software Problem – How to do Remote Help Right

Collaborating in the Helix Lab Cloud to Fix a Software Problem – How to do Remote Help Right

By Jakob Engblom As you might know, we recently announced and launched the preview version of the Helix Lab Cloud. With Helix Lab Cloud, you access (simulated) computers in the cloud, and among other unique abilities, you can share a session with other people. Thanks to the underlying Simics technology, sharing a session covers both the current state of the…

How To Get Started With Embedded Virtualization

By Mark Hermeling Embedded virtualization provides a lot of benefits. Being able to consolidate multiple workloads on a single multi-core device helps reduce capital expenses and operating expenses, something that is on everybody's mind. However, new technology can be a bit daunting. Wind River has published a white paper with ten steps that you should think about when embarking on your…
Long Live the New LTS Kernel

Long Live the New LTS Kernel

By Andreea Volosincu It’s the most wonderful time of the year again! No, it’s not Christmas, but the beginning of a new cycle in the Linux microcosm. A few days ago, the Linux 4.1 kernel has been released, and chosen as the LTS kernel of 2015, becoming the most advanced long-term supported release. This is significant not only because the LTS…
Deciding if Open Source is Good for Your Business

Deciding if Open Source is Good for Your Business

By Andreea Volosincu Switching to Open Source - it’s what economists identify as a dynamic choice. Unlike  its old-fashioned sisters, the static choices, dynamic choices made today can affect the opportunities you have tomorrow and pave the way for additional choices. In other words, today’s choice needs to be informed by the value of tomorrow opportunities or lack thereof. Choosing…