MAKING THE GRADE WITH LINUX AND CYBERSECURITY AT THE INTELLIGENT EDGE
A MICROWEB TECH SERIES WITH MICHAEL MEHLBERG
Part 1 // Open Source Gaining at the Edge
The proliferation of open source software on edge devices has grown by orders of magnitude year over year. But a single, static variant of Linux on the edge can’t meet the requirements of every...
Part 2 // Defining Market Grade Requirements
Requirements differ by market for intelligent edge devices. An enterprise or data center–centric Linux solution won’t cut it for embedded markets such as automotive, industrial, or aerospace...
Part 3 // Performance Matters at the Edge
Performance—specifically latency and jitter—is one of the most common requirements when building intelligent edge solutions. This goes across all markets. Learn how to ensure that Linux solutions...
How can Wind River help you optimize the security of your systems and devices?TALK TO EXPERT
Part 4 // Open Source Compliance
Learn how you can manage accountability and providence tracking of the collection of all compliance artifacts of an open source solution, as it takes form while traversing the supply chain from...
Part 5 // Creating a Secure Edge Product
Get the rundown on a solid process for creating a secure edge product, from methodology to mapping secure principles to design imperatives.
Part 6 // Cybersecurity Requirements
A cybersecurity-first approach is one that goes beyond traditional security measures and looks at system security from a holistic perspective. Learn about what you need to implement it.
Part 7 // Managing CVEs for Deployed Devices
Open source has become a game changer for innovation, from the data center to the far edge. Software developers use open source Linux because of its ease of access, flexibility, and leading-edge...
Are You Safe from Cyberthreats?FIND OUT
Take a 3 Minute Security Assessment