White Papers

  • It’s Transformation Time for Embedded Development

    It’s Transformation Time for Embedded Development

    Embedded development is at a tipping point. Complexity, cost, risk, and delay are all on an upward climb. Development teams are under intense pressure to get their projects completed on time...

    Explore
  • The Business Case for Commercial Embedded Linux

    The Business Case for Commercial Embedded Linux

    Linux has been a phenomenon in embedded device development, and is now the predominant platform for devices. Part of the appeal is the perception that Linux is free. But there are costs—plus time...

    Explore
  • Distributed Edge Clouds Are Complex, But Must They Be Difficult?

    Distributed Edge Clouds Are Complex, But Must They Be Difficult?

    Service providers need to support applications that require extremely low latency and high bandwidth to cloud services, but the traditional, centralized cloud architecture was not designed for that.

    Explore
  • Using Linux in Medical Devices: What Developers and Manufacturers Need to Know

    Using Linux in Medical Devices: What Developers and Manufacturers Need to Know

    Linux is a popular choice for a wide range of medical devices. Yet due to the critical nature of these devices, manufacturers must take additional precautions.

    Explore
  • Cybersecurity for Medical Devices in a Connected Healthcare System

    Cybersecurity for Medical Devices in a Connected Healthcare System

    Explore
  • Enterprise Linux vs. Embedded Linux

    Enterprise Linux vs. Embedded Linux

    Explore
  • ARC Brief: Virtualization and Industrial Control

    ARC Brief: Virtualization and Industrial Control

    Explore
  • Update on Using Multicore Processors with a Commercial ARINC 653 Implementation

    Update on Using Multicore Processors with a Commercial ARINC 653 Implementation

    Explore
  • Virtualization: A Critical Capability for Service Provider Success in IoT, 5G & Beyond

    Virtualization: A Critical Capability for Service Provider Success in IoT, 5G & Beyond

    The Internet of Things (IoT) is a huge opportunity for communications service providers (CSPs) because of the sheer scale of investment it will attract and the business impact it will have...

    Explore
  • Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading

    Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading

    Hacker attacks and attempts on national critical infrastructure continue to rise. VxWorks® provides essential security features to protect important equipment from serious attackers.

    Explore
  • A Survey of Information Security Implementations for the Internet of Things

    A Survey of Information Security Implementations for the Internet of Things

    To fully realize the opportunities of the Internet of Things (IoT), a strict and reliable approach to security is essential. Different devices, systems, and industries have varying security...

    Explore
  • The RTOS as the Engine Powering IoT Critical Infrastructure

    The RTOS as the Engine Powering IoT Critical Infrastructure

    Digital transformation offers industrial manufacturers the vision of business advantages and efficiencies through the use of data analytics and advanced control systems.

    Explore
  • Securing Linux Systems in the Internet of Things

    Securing Linux Systems in the Internet of Things

    Explore
  • Requirements for Virtualization in Next-Generation Industrial Control Systems

    Requirements for Virtualization in Next-Generation Industrial Control Systems

    If you are evaluating virtualization platforms for your next generation control system you probably have a list of factors to consider.

    Explore
  • The Internet of Things in the Lab

    The Internet of Things in the Lab

    Staging and Testing for the Real World

    Explore
  • 10 Steps to Virtualization

    10 Steps to Virtualization

    Virtualization—the creation of multiple virtual machines (VMs) on a single piece of hardware, where each VM emulates an actual computer so that each VM can execute a different operating system...

    Explore
  • Open, Secure Industrial Automation Systems

    Open, Secure Industrial Automation Systems

    Many of today's industrial automation solutions are overly expensive and inflexible, partly due to proprietary solutions that do not interoperate well with other products in the market.

    Explore
  • Cybersecurity and Secure Deployments

    Cybersecurity and Secure Deployments

    Learn why creating and testing security solutions is more effectively performed using virtual hardware and system simulation technology, rather than using the live systems that are subject to attacks.

    Explore
  • Navigating the Open Source Legal Maze

    Navigating the Open Source Legal Maze

    Explore
  • Linux Containers

    Linux Containers

    Explore
  • loading
    Loading More...