White Papers

  • Industry 4.0 and 5G in the COVID Pandemic

    Industry 4.0 and 5G in the COVID Pandemic

    2020 was the “Annus Horribilis” for manufacturers, whose operations and supply chains have been severely disrupted by the COVID-19 global pandemic. What has been the impact of this disruption on...

    Explore
  • Cybersicherheit und sichere Anwendungen

    Cybersicherheit und sichere Anwendungen

    Wirksame Sicherheit mit Simulationstechnologie

    Explore
  • Robotics Advance with AI Technologies

    Robotics Advance with AI Technologies

    EFFICIENCY, AUTOMATION, AND ENHANCED SECURITY AND SAFETY ACROSS INDUSTRIES

    Explore
  • La nouvelle Peripherie Intelligente

    La nouvelle Peripherie Intelligente

    Les quatre moteurs de transformation numérique au niveau de la périphérie intelligente, et les questions à se poser pour mettre en oeuvre une stratégie efficace

    Explore
  • ×

    Submit a
    Sales Inquiry


    Fill out the form below and a Wind River representative will contact you shortly.

    First Name
    Last Name
    Company
    Industry
    Job Title - optional
    Phone - optional
    Product or Service of Interest
    Country
    State
    Province/Territory
    Province
    Prefecture
    County
    Comments - optional
    I agree to receive marketing materials and other information about Wind River’s products & services.
    Thank you. You'll be contacted shortly.
    Error - something went wrong!
  • Garantir la securite des logiciels en peripherie de reseau

    Garantir la securite des logiciels en peripherie de reseau

    LA SÉCURITÉ DOIT COUVRIR L’ENSEMBLE DES DISPOSITIFS ET L’INTÉGRALITÉ DE LEURS CYCLES DE VIE

    Explore
  • Die neue Intelligent Edge

    Die neue Intelligent Edge

    Vier treibende Kräfte der digitalen Transformation an der Intelligent Edge und die Schlüsselfragen, die entscheidende Beiträge zu Ihrem Erfolg leisten werden

    Explore
  • Software-Sicherheit in der gesamten Intelligent Edge

    Software-Sicherheit in der gesamten Intelligent Edge

    SICHERHEIT MUSS JEDES EINZELNE ENDGERÄT IM GESAMTEN LEBENSZYKLUS UMFASSEN

    Explore
  • 10 Properties of Secure Embedded Systems

    10 Properties of Secure Embedded Systems

    Protecting Can’t-Fail Systems from Tampering, Reverse Engineering, and Other Cyberattacks

    Explore
  • WHY YOUR COMPANY NEEDS TO CREATE A SECURITY POLICY BEFORE IMPLEMENTING A SECURITY PROGRAM

    WHY YOUR COMPANY NEEDS TO CREATE A SECURITY POLICY BEFORE IMPLEMENTING A SECURITY PROGRAM

    In this white paper we’ll review research findings from a recent security study, interpret those findings, and make suggestions on how to implement a valuable security plan.

    Explore
  • Software Security Across the Intelligent Edge

    Software Security Across the Intelligent Edge

    SECURITY MUST COVER EVERY SINGLE ENDPOINT DEVICE, THROUGH THE ENTIRE LIFECYCLE

    Explore
  • Edge Computing: Next Steps in Architecture, Design and Testing

    Edge Computing: Next Steps in Architecture, Design and Testing

    This collaborative white paper authored by representatives from Dell, Intel, OpenStack Foundation, Verizon, and others is another step by OSF Edge Computing Group’s work to better define and test...

    Explore
  • Delivering Reliability, Safety, and Security to Electric Vertical Takeoff and Landing Vehicles

    Delivering Reliability, Safety, and Security to Electric Vertical Takeoff and Landing Vehicles

    Meeting the Challenges of the Next Generation of Advanced Air Mobility

    Explore
  • 5G Edge Cloud Infrastructure: For vRAN, Industrial, and Automotive Applications

    5G Edge Cloud Infrastructure: For vRAN, Industrial, and Automotive Applications

    This report is a must-read for anyone who wants to understand how and when service providers will deploy their 5G edge clouds, as well as the downstream appetite and impact of 5G services in the...

    Explore
  • The New Intelligent Edge

    The New Intelligent Edge

    Four Drivers of Digital Transformation at the Intelligent Edge and the Key Questions That Will Help Architect Your Success

    Explore
  • Open Source Infrastructure Software for vRAN Deployment and Operation

    Open Source Infrastructure Software for vRAN Deployment and Operation

    Learn how an open source 5G vRAN architecture can help meet the operational challenges of managing thousands of nodes.

    Explore
  • Modernizing Energy Production and Automating Processes

    Modernizing Energy Production and Automating Processes

    In an era of rising energy demand, multiple challenges confront electricity utilities, energy producers, system architects, and automation equipment OEMs. In response, a slate of interoperable...

    Explore
  • Expanding the Role of Virtual Machines and Containers from IT to OT

    Expanding the Role of Virtual Machines and Containers from IT to OT

    Operational technology (OT) and embedded systems are at an inflection point as they evolve past specialized, single-purpose hardware to obtain the business and technology advantages of hosting...

    Explore
  • Managing the 2020 Medical Device Windows Upgrade Cycle

    Managing the 2020 Medical Device Windows Upgrade Cycle

    In January 2020, support for the popular operating system Windows® 7 is set to expire. The support for many versions of Windows CE and Windows Embedded have ended or will end soon.

    Explore
  • The Internet of Trains

    The Internet of Trains

    Explore the opportunities for rail operators to improve safety, manage system capacity, and reduce operating and maintenance costs through the more efficient use of infrastructure.

    Explore
  • Enabling the Migration to Software-Defined Platforms for Critical Infrastructure

    Enabling the Migration to Software-Defined Platforms for Critical Infrastructure

    There is a growing need across multiple sectors for devices to be able to support the greater intelligence required to transition from automated to autonomous systems. This is driving technical...

    Explore
  • loading
    Loading More...