Workbench

50 articles
Reliable, Safe and Secure? Ada and VxWorks Can Help!

Reliable, Safe and Secure? Ada and VxWorks Can Help!

By guest contributor Ben Brosgol, Senior Technical Staff, AdaCore Writing reliable, safe and secure software is tough. Doing it for for hard real-time systems with demanding certification requirements -- such as DO-178B or DO-178C for avionics -- is tougher and indeed is one of the most daunting challenges that a developer has to face. Meeting this challenge calls for experience-hardened…
Automated requirements based testing from QA Systems Cantata with Wind River Workbench

Automated requirements based testing from QA Systems Cantata with Wind River Workbench

By Jasmine Williams, Marketing Manager at QA Systems Ltd Poorly defined and implemented requirements can lead to expensive project rework. Requirements based testing helps to ensure that code does what was intended and its purpose has been defined to a suitable level of detail. This avoids expensive mistakes and aids customer acceptance. Safety critical software projects use unit and integration…
GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

GrammaTech CodeSonar Brings the Power of Advanced Static Analysis to Wind River Workbench

The integration of GrammaTech CodeSonar with Wind River Workbench enables software developers to annotate and resolve the bugs and software vulnerabilities that CodeSonar highlights without leaving the Wind River Workbench development environment, thereby significantly boosting productivity. Supporting the native Wind River VxWorks® real-time operating system as well as the POSIX API, CodeSonar provides advanced, whole program static analysis of application…
It’s Transformation Time for Embedded Development – Part 4

It’s Transformation Time for Embedded Development – Part 4

By Dennis Wong Embedded Development Transformation in the Develop Phase To see the definitions of each of the product development phases, take a look at the second post in this blog series. The develop phase is the main software construction occurs, where the code is produced. Risks This phase encompasses the full-out development and unit (even subsystem) testing of code…
It’s Transformation Time for Embedded Development – Part 1

It’s Transformation Time for Embedded Development – Part 1

By Bill Graham Something Needs to Change Fast-evolving technologies including virtualization, multi-core processors, and System on Chip (SoC) are bringing exciting new capabilities to embedded devices. These technologies can help address new market requirements to support the Internet of Things, connectivity, cloud computing, machine to machine communications, and improved security, but they also underscore an uncomfortable truth: development risks increase…

The Role of Tools in Improving Embedded Software Security / Part 3: Mapping the Tools to Activities

By Bill Graham In the previous posts in this series, Part 1: Automation is the Key and Part 2: Security Improvement and the Software Development Lifecycle, I talked about the connection between the typical embedded device development process and the 5+1 improvement framework for embedded security.  Figure 1 is an illustration of this connection (and discussed in more detail in…

Simplifying M2M

By Brian Vezza Today, Wind River is taking a significant step forward in simplifying machine-to-machine (M2M) development for our customers.  We announced the Wind River Intelligent Device Platform which builds upon Wind River’s operating system and tools leadership with M2M middleware to make it easier to design, build, and operate M2M or smart connected devices. As I’ve written before, M2M devices…

All Your Mars are Belong to US!

By Mike Deliman It's time to celebrate. We have returned to Mars with the most complex roving robotic laboratory ever sent to another planet. We have demonstrated and proved the Sky Crane concept, which opens doors onto other worlds that we have never had before. We can successfully deliver 1 metric ton to the surface of Mars.This is an achievement…

Complexity

By Mike Deliman This afternoon I watched the press conferences for Mars Science Laboratory “Curiosity” that were hosted by NASA/JPL from Pasadena, Ca.  These conferences were broadcast over NASA-TV, both on the cable/satellite channels and over the web.  If you haven’t seen the Seven Minutes Video I encourage you to watch it. Various scientists, directors and managers of the project…

The Role of Tools in Improving Embedded Software Security / Part 1: Automation is the Key

By Bill Graham Security Vulnerabilities are Expensive Shipping security vulnerabilities in a finished product and having them discovered or worse, exploited, is a very expensive proposition for embedded device vendors. As I’ve discussed in an earlier post, security defects are much more expensive to patch and fix the later they are discovered. If you’re lucky to catch a vulnerability during…