By Rich Kellen, Vice President and Chief Information Security Officer, Wind River
By 2030 machines will connect, sense, predict, and comprise a significant portion of the U.S. economy by then ($7T) for industries as diverse as industrial manufacturing and aerospace and defense.
SCOTTSDALE, Arizona. Modernization efforts that require consolidating multiple proven software systems onto a single intelligent edge platform are difficult. Fortunately, there are strategies that allow you to maintain your software integrity and partitioning while taking advantage of cutting edge software development technology in modern avionics systems. In this webcast on December 1, 2020 at 11 am Est., subject matter experts from Wind River and AdaCore will demonstrate how you can map your existing architecture to guest operating systems on hypervisors, by using Wind River’s Helix Virtualization Platforms and software development tools from the compiler experts at AdaCore.
As intelligent edge deployments accelerate, we have reached a crossroads where many are being forced to choose between the accessibility, ease of use, flexibility, and leading-edge capabilities of open source software and the safety and security of systems in the field. How we proceed has the potential to lead massive transformation in the embedded industry.
Trenton Systems, Star Lab to discuss cybersecure mission-critical systems, computing at the tactical edge in collaborative webinar - Press ReleaseOctober 20, 2020
Trenton Systems and Star Lab, a Wind River company, are holding an exclusive webinar, Cybersecure Mission-Critical Systems, on Thursday, October 22, 2020, at 2 p.m. EST to discuss how ruggedized, field-tested computer systems, when combined with hardened software, can run the most demanding applications in harsh environments while also protecting your sensitive data against tampering and unauthorized access.
Updating and patching security vulnerabilities to limit the attack surface for the military’s embedded systems – especially legacy ones – can be a daunting task.
HUNTSVILLE, Ala. Abaco Systems has received orders from a major prime contractor to support the upgraded computing capability of a European nation’s fleet of 70 fighter aircraft.
According to IDC, there will be an estimated 42 billion connected devices by 2025. Each of these devices represents a point of entry that can be exploited by a cyberattack. For devices and systems with safety-critical functionality, a security breach can have catastrophic consequences. Security becomes even more paramount than safety.