White Papers

  • DevSecOps in the Automotive Sector

    DevSecOps in the Automotive Sector

    The Essential Practice for Automotive Security, Safety, and Customer Trust

    Explore
  • La robotique progresse grâce à l’IA

    La robotique progresse grâce à l’IA

    Explore
  • Fortschritte in der Robotik dank KI

    Fortschritte in der Robotik dank KI

    Explore
  • AI Technologies Transform Industrial Control Automation

    AI Technologies Transform Industrial Control Automation

    Smarter Manufacturing Processes Are Powered by AI

    Explore
  • ×

    Submit a
    Sales Inquiry


    Fill out the form below and a Wind River representative will contact you shortly.

    First Name
    Last Name
    Company
    Industry
    Job Title - optional
    Phone - optional
    Product or Service of Interest
    Country
    State
    Province/Territory
    Province
    Prefecture
    County
    Comments - optional
    I agree to receive marketing materials and other information about Wind River’s products & services.
    Thank you. You'll be contacted shortly.
    Error - something went wrong!
  • Achieving Carrier-Grade Openstack for NFV

    Achieving Carrier-Grade Openstack for NFV

    This paper by Heavy Reading discusses how HP and Wind River have innovated on top of open source efforts to address the performance, scalability, resiliency, reliability, security, and...

    Explore
  • The Business Case for Commercial Embedded Linux

    The Business Case for Commercial Embedded Linux

    Linux has been a phenomenon in embedded device development, and is now the predominant platform for devices. Part of the appeal is the perception that Linux is free. But there are costs—plus time...

    Explore
  • Managing the 2020 Medical Device Windows Upgrade Cycle

    Managing the 2020 Medical Device Windows Upgrade Cycle

    In January 2020, support for the popular operating system Windows® 7 is set to expire. The support for many versions of Windows CE and Windows Embedded have ended or will end soon.

    Explore
  • Accelerating the Deployment of Critical Infrastructure Edge Services Through the OpenStack StarlingX Project

    Accelerating the Deployment of Critical Infrastructure Edge Services Through the OpenStack StarlingX Project

    The StarlingX open source project was created to address the need for an open source software platform that enables telco-grade applications and services to be deployed at the network edge.

    Explore
  • Industry 4.0 and 5G in the COVID Pandemic

    Industry 4.0 and 5G in the COVID Pandemic

    2020 was the “Annus Horribilis” for manufacturers, whose operations and supply chains have been severely disrupted by the COVID-19 global pandemic. What has been the impact of this disruption on...

    Explore
  • Cybersicherheit und sichere Anwendungen

    Cybersicherheit und sichere Anwendungen

    Wirksame Sicherheit mit Simulationstechnologie

    Explore
  • Robotics Advance with AI Technologies

    Robotics Advance with AI Technologies

    Efficiency, Automation, and Enhanced Security and Safety Across Industries

    Explore
  • La nouvelle Peripherie Intelligente

    La nouvelle Peripherie Intelligente

    Les quatre moteurs de transformation numérique au niveau de la périphérie intelligente, et les questions à se poser pour mettre en oeuvre une stratégie efficace

    Explore
  • Garantir la securite des logiciels en peripherie de reseau

    Garantir la securite des logiciels en peripherie de reseau

    LA SÉCURITÉ DOIT COUVRIR L’ENSEMBLE DES DISPOSITIFS ET L’INTÉGRALITÉ DE LEURS CYCLES DE VIE

    Explore
  • Die neue Intelligent Edge

    Die neue Intelligent Edge

    Vier treibende Kräfte der digitalen Transformation an der Intelligent Edge und die Schlüsselfragen, die entscheidende Beiträge zu Ihrem Erfolg leisten werden

    Explore
  • Software-Sicherheit in der gesamten Intelligent Edge

    Software-Sicherheit in der gesamten Intelligent Edge

    SICHERHEIT MUSS JEDES EINZELNE ENDGERÄT IM GESAMTEN LEBENSZYKLUS UMFASSEN

    Explore
  • 10 Properties of Secure Embedded Systems

    10 Properties of Secure Embedded Systems

    Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks

    Explore
  • WHY YOUR COMPANY NEEDS TO CREATE A SECURITY POLICY BEFORE IMPLEMENTING A SECURITY PROGRAM

    WHY YOUR COMPANY NEEDS TO CREATE A SECURITY POLICY BEFORE IMPLEMENTING A SECURITY PROGRAM

    In this white paper we’ll review research findings from a recent security study, interpret those findings, and make suggestions on how to implement a valuable security plan.

    Explore
  • Software Security Across the Intelligent Edge

    Software Security Across the Intelligent Edge

    Security Must Cover Every Single Endpoint Device, Through the Entire Lifecycle

    Explore
  • Edge Computing: Next Steps in Architecture, Design and Testing

    Edge Computing: Next Steps in Architecture, Design and Testing

    This collaborative white paper authored by representatives from Dell, Intel, OpenStack Foundation, Verizon, and others is another step by OSF Edge Computing Group’s work to better define and test...

    Explore
  • Delivering Reliability, Safety, and Security to Electric Vertical Takeoff and Landing Vehicles

    Delivering Reliability, Safety, and Security to Electric Vertical Takeoff and Landing Vehicles

    Meeting the Challenges of the Next Generation of Advanced Air Mobility

    Explore
  • loading
    Loading More...