Security

147 articles
The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

The Critical Infrastructure Challenge: Developing and Supporting Software for the Long Term

By Gareth Noyes Software content is increasing in every realm of technology, and has been the catalyst for the explosive growth of entirely new market sectors. The development and deployment of software at scale has matured significantly over the last decade in enterprise- and cloud-IT applications. This has been enabled, among other factors, by: Uniformity of computing infrastructure (think of…
New Performance Breakthrough for VxWorks-based HPEC Systems

New Performance Breakthrough for VxWorks-based HPEC Systems

By guest contributor Michelle Watson, Marketing Product Portfolio Manager, Curtiss-Wright Defense Solutions For years, designers of High Performance Embedded Computing (HPEC) systems have sought to free up critical resources and establish optimal performance for Intelligence, Surveillance and Reconnaissance (ISR) applications.  Today, system designers can take full advantage of the Intel® Xeon® D processor architecture for their multi-core/multi-board HPEC systems using…
VxWorks: Past and Future

VxWorks: Past and Future

By Andreea Volosincu The year is 2002. Brazil is winning the FIFA World Cup and the first cell phone to have a built-in camera is released in the US – yes, this story is THAT old. In the world of secure and reliable systems, Wind River releases VxWorks 5.5. Fast forward 16 years, VxWorks® 5.5 reaches its End-of-Life (EOL) status…
Software Considerations and Security Requirements for Medical Devices

Software Considerations and Security Requirements for Medical Devices

By guest contributor Daniela Previtali, Global Marketing Director, Wibu-Systems Software has become ubiquitous in the healthcare industry given its widespread use for controlling medical devices and health information systems and communicating and maintaining electronic patient data, all in an increasingly connected environment. For embedded system developers, in particular, choosing the software best suited for the design of the medical device and its…
Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

Wind River and Rockwell Collins Bring Open Architectures from Planning to Production

By Chip Downing Although many military aircraft suppliers, armed services, and government organizations have been promoting Open Architecture (OA) and Modular Open Systems Architecture (MOSA) for years, it has been somewhat difficult to find really good implementations of open architectures in shipping, fielded products.   Many companies simply tend to create and update purpose-built platforms that are the legacy of almost…
When AI Goes Bad

When AI Goes Bad

By Mychal McCabe The Future of Humanity Institute recently followed up on last year's survey about AI exceeding human performance in a variety of tasks, with a report titled "The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation." The report focuses on three macro changes to the threat landscape: expansion of existing threats, introduction of new threats, and a…
Choosing the Right System Software for Medical Devices

Choosing the Right System Software for Medical Devices

By Jeff Kataoka The advances in healthcare, therapies and medical technologies are moving forward at an unbelievable pace. I’m amazed at how the treatments and technology can change so quickly, even from one year to the next. Recently, I witnessed how knee replacement surgery and the treatments can change over just fourteen months. I’ve witnessed new methods of providing anesthesia…
Spectre and Meltdown – How to Respond in the Embedded World

Spectre and Meltdown – How to Respond in the Embedded World

By Tim Skutt The past few weeks have included a whirlwind of speculation and revelations around a new set of security issues known as Spectre and Meltdown.  Collectively, these issues impact most of the major processor architectures and implementations, prompting the cross-cutting question – “what should I do about these issues?” Much of the initial information available focuses on answering…
VxWorks Secure Boot

VxWorks Secure Boot

By Ka Kay Achacoso The massive internet outage last year in the United States blocked millions of users from access to the most popular sites on the internet. Suddenly, we learned that common consumer devices like cameras, printers, and DVRs participated in attacking the DNS infrastructure with denial of service attacks.  This internet outage was repeated later in Europe and…
Cybersecurity:  The Importance of Protecting Data at Rest with VxWorks

Cybersecurity: The Importance of Protecting Data at Rest with VxWorks

By Ka Kay Achacoso A few months ago, Equifax had a data breach that exposed to hackers the names, social security numbers, credit card numbers, driver’s license numbers, and other sensitive personal information and resulted in a total of 145.5 million consumers impacted by this cyber security breach  after the forensic investigation concluded.  The resulting outcry from potentially affected businesses…