Testing for Security
By Ido Sarig, vice president of product marketing at Wind River Last summer was a watershed event for security-consciousness in the embedded systems world: Stuxnet, a highly sophisticated worm...
View ArticleEmbedded Device Security: Information Assurance and Cyber Security
By Marc Brown, Vice President of Tools and Marketing Operations, Products Group at Wind River Security is a heavily overloaded term, meaning different things to different people. In the embedded...
View ArticleHow to Get Virtual
By Jakob Engblom, Technical Marketing Manager, Simics, Wind River My blog posts about Simics tend to focus on how virtual platforms are used and what you can do with them. However, underlying all...
View ArticleM2M: Smarter than Ever (But Still Misunderstood)
By Brian Vezza, Director of M2M Solutions, Wind RiverWithin the next few years, Machine-to-Machine (M2M) devices will account for more than half of all connected devices shipped annually. Think about...
View ArticleThe Yocto Project: What It Is and What It Isn't
By Davide Ricci, Senior Product Manager, Open Source Platforms, Wind River As I work heavily with embedded Linux on a daily basis, I’m often asked about the Yocto Project. While the Yocto Project is...
View ArticleDebugging Simics -- on Simics
By Jakob Engblom, Senior Technical Manager, Tools & Lifecycle Solutions at Wind River I often write and talk about how useful Simics is debugging concurrency bugs and glitches in multithreaded and...
View ArticleAnalyze this…Accelerate that…
By Steve Konish, Director, Product Management, Wind River In just three short months, the engineering team at Wind River has added new, amazing capabilities to the Wind River Intelligent Network...
View ArticleSecurity Must be Built In…Or Else
By AJ Shipley, Senior Security Architect, Wind River Security cannot be bolted on, it must be built in. This statement proves to be especially true when considering the recent hack of the New York...
View Article
More Pages to Explore .....