Videos

Wind River is helping to lead digital transformation of the world’s critical infrastructure, and the changes are coming fast. Don’t miss our latest videos.

  • Implementing Cybersecurity with Simics37:34

    Implementing Cybersecurity with Simics

    WATCH
  • Wind River Simicsとは?2:58

    Wind River Simicsとは?

    WATCH
  • Putting It All Together3:15

    Putting It All Together

    Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.

    WATCH
  • Ongoing Threat Prevention3:48

    Ongoing Threat Prevention

    Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in to

    WATCH
  • Hardening and Fortifying3:57

    Hardening and Fortifying

    You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your thre

    WATCH
  • Designing with a Trusted Foundation4:50

    Designing with a Trusted Foundation

    Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigre

    WATCH
  • Building a Security Policy4:23

    Building a Security Policy

    Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolera

    WATCH
  • Capturing Use Case Security Requirements4:57

    Capturing Use Case Security Requirements

    Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will n

    WATCH
  • The Cybersecurity Journey Through the Full Product Lifecycle3:09

    The Cybersecurity Journey Through the Full Product Lifecycle

    Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of

    WATCH
  • Ceros Training Video - Creating Tablet and Mobile versions of a Desktop Page16:18

    Ceros Training Video - Creating Tablet and Mobile versions of a Desktop Page

    WATCH
  • VxWorksを試そう!Linux開発者のためのリアルタイムOS - 入門編 - 第1回:リアルタイムOSとは34:35

    VxWorksを試そう!Linux開発者のためのリアルタイムOS - 入門編 - 第1回:リアルタイムOSとは

    WATCH
  • Containers at the Intelligent Edge - 日本語字幕6:49

    Containers at the Intelligent Edge - 日本語字幕

    Containers at the Intelligent Edge - Japanese Subtitled By 2022, more than 75% of global organizations will be running containerized applications in production, driven by the adoption of cloud-native

    WATCH
  • What Can Simics Do For You?2:58

    What Can Simics Do For You?

    Learn how Simics enables development techniques that are simply not possible with physical hardware, enabling you to deliver better software faster.

    WATCH
  • Charting the Use of Hardware Acceleration and Integration in Open RAN Deployments1:01:00

    Charting the Use of Hardware Acceleration and Integration in Open RAN Deployments

    This webinar presents the key findings from the Heavy Reading Accelerating Open RAN Platforms Survey, conducted in March and April 2021. Panelists included representatives from Qualcomm...

    WATCH
  • Security Summit 2021: Expert Panel - A Message of Influence30:31

    Security Summit 2021: Expert Panel - A Message of Influence

    Listen to a spirited discussion among our guest speakers, moderated by Wind River Chief Product Officer Cyra Richardson.

    WATCH
  • Security Summit 2021: Window Snyder - Secure Foundations12:52

    Security Summit 2021: Window Snyder - Secure Foundations

    Devices with high security requirements may take years to go from design to development, then spend a decade or more in the field. What can you do to make the security work you do today support...

    WATCH
  • Security Summit 2021: Dr. David Bray - Why We Must Bake-In Resilience by Design13:05

    Security Summit 2021: Dr. David Bray - Why We Must Bake-In Resilience by Design

    The last two decades have demonstrated how the increasing democratization of data and tech holds great promise for humanity — and at the same time presents significant challenges in assuring...

    WATCH
  • Security Summit 2021: Dr. Eric Cole - Security Metrics15:47

    Security Summit 2021: Dr. Eric Cole - Security Metrics

    You cannot manage what you cannot measure. A common issue with cybersecurity is doing good things, but not the right things that really matter. Missing one key aspect is all it takes for an...

    WATCH
  • Security Summit 2021: Wendy Frank - The 5G Revolution13:29

    Security Summit 2021: Wendy Frank - The 5G Revolution

    The 5G revolution brings about many well-known benefits, such as faster speeds, lower latency, and enhanced connectivity, built upon previous generations of technology. The shift in 5G architecture...

    WATCH
  • People Studio Podcast: Stephanie Moscrip26:36

    People Studio Podcast: Stephanie Moscrip

    Listen to Wind River Chief People Officer Terese Lam in conversation with Senior Director of Engineering Stephanie Moscrip.

    WATCH
  • loading
    Loading More...