Wind River Web Seminar

Test Early and Test Often
A How-to Guide for Cybersecurity

Threats to cyber systems are continually evolving, so your test environment also needs to evolve. Testing on your production system is not only risky, but may not be possible if it isn’t built yet. Creating a physical replica is too expensive, especially if you have to recreate it again after one of your tests blows up the system.

Wind River® is joined by Alpha-Beta Technologies (ABT) in this web seminar, where we discuss some of the challenges of testing for security vulnerabilities in today’s systems.

Some of the topics covered include how to:
  • Overcome some of the challenges inherent in testing systems built for MIL-STD-1553
  • Test for OTE security and conduct root cause analysis much more efficiently
  • Conduct non-destructive security testing by creating a virtualized environment that can be set up, blown up, analyzed, and recreated endless times without damage to the system
  • Test vulnerabilities by injecting faults into the system
  • Manipulate time to your advantage—the system clock can be manipulated to create security breach opportunities; being able to manipulate the time in simulation helps uncover possible exposures
Speakers
  • Sean Evoy,
    Product Line Manager,
    Wind River Tools
  • Michael Morris,
    Founder and Executive Vice President,
    Alpha Beta Technologies, Inc.

 

Register to watch this web seminar

 
 

Robotics: The Era of AI and Autonomy

Thursday, December 3, 11 a.m. PT / 2 p.m. ET

Thanks to the technology advances and discoveries of the past few years, robots are becoming more sophisticated, while end users are demanding higher accuracy, speed, programmability, autonomy, and more.

Collaborative robots hold the potential to increase productivity by up to 20%.

Robots are evolving into intelligent, autonomous machines that make decisions at the electromechanical edge, where most processing of the massive amounts of available data is happening — but data is also integrated and analyzed in a larger cloud infrastructure. This presents both opportunities and challenges for robot manufacturers and solution providers, as they connect these two worlds.

Integrating more intelligence closer to the edge reduces data transfer. It also means traditional automation technology must be augmented with real-time AI.

What you will learn:
  • How you can build a solution designed to operate at the edge and easily connect to cloud environments

  • What level of security is needed to prevent disruption of industrial workflows

  • The place of AI and machine learning in robotics applications

  • What you should look for in your real-time technology stack in order to make real-time AI systems possible

Speaker:
  • Michel Chabroux,
    Senior Director, Product Management,
    Wind River

Register to watch

Thanks for your registration.

 

EXPERT PANEL

AIRBORNE SAFETY WITH FACE
IN THE DIGITAL BATTLESPACE

September 29, 2020 | 1 p.m. ET / 5 p.m. GMT

Safety has always been a key requirement for aviation systems, and as the world digitally transforms it is both more important and more complex than ever. For military airborne platforms, the U.S. Department of Defense is promoting the implementation of open architecture solutions to enable more capable avionics hardware and software and to transition systems into the field faster and at lower cost.

To meet this requirement, the Future Airborne Capability Environment (FACE) consortium developed an open architecture technical standard as well as business models for implementing FACE standards, which includes profiles for safety systems. But safety engineering practices are outside the domain of the FACE Technical Standard—these are left to industry best practices and existing safety processes such as RTCA DO-178C.

Join aviation experts from Wind River®, Rapita Systems, and Collins Aerospace for an online panel discussion of these issues and more.

You will get answers to questions such as:
  • How are experts thinking about and applying FACE to build the next generation of avionics standards?

  • Why are FACE-conformant technologies interchangeable, and how can you distinguish among them?

  • What new safety challenges will you encounter in a digital world where FACE conformance is essential?

Panelists
  • Alex Wilson,
    Director of Aerospace and Defence Market Segment,
    Wind River
  • Steven H. VanderLeest,
    Principal Engineer for Multicore Solutions,
    Rapita Systems
  • Levi VanOort,
    Associate Director, Systems Engineering - Avionics,
    Collins Aerospace
 
Moderator
  • Roberto Valla,
    Senior Director of Business Development for Aerospace and Defense,
    Wind River
 
 

Register to watch this webinar

 
 
 

Industry IoT Presents

Transforming your Organizations’ DNA to Thrive in the Digital Age

Originally recorded on July 29, 2020

Digital transformation is all around us. It’s a $2T annual investment (the size of the 10th largest economy in the world). By choice or by default, navigating a pathway to success has to be the main focus of leaders as they look inside their company, their industries, and across new opportunities. The most successful executive leaders invest on average 17.4 hours a week focused on managing and collaborating for design.

The Wall Street Journal bestselling author of The Digital Helix: Transforming your Organizations’ DNA to Thrive in the Digital Age and Forbes contributor on leadership, Michael Gale will show specific primary research from the six-year project to detect the DNA behind digital transformation success.

View the presentation if you want to answer any of the following questions for your organization:

  • Why should we care about digital transformation, and why now?

  • What challenges will we face when transforming digitally?

  • How do we successfully transform to digital?

  • What does successful leadership look like?

  • How can we reach the fullest potential of our organization?


Register to watch on demand

Thanks for your registration.

The Great Security Disconnect:
Real Implementation Versus Executive Perception

Originally recorded on July 29, 2020

All stakeholders agree that a good security strategy is essential when building an intelligent-edge device. After all, you can’t have a safe product without a good security implementation. Yet, while 70% of executives think their products meet industry benchmarks, 50% of developers believe their products fall short of security requirements.

Join Wind River® Principal Security Architect Arlen Baker as he shares stunning new survey results that show an extreme disconnect between executive perception and the reality of embedded security implementations.

You will learn:
  • The biggest security threats executives and developers are concerned about

  • Who is responsible for implementing security features

  • The roadblocks to securing devices

  • How security breaches are identified and resolved

Speakers
  • Arlen Baker,
    Principal Technologist for Security,
    Wind River
  • Terry Persun,
    Freelance Science and Technology Writer



Register to watch on demand

Thanks for your registration.

On-Demand Web Seminar

Edge Computing in Telco Networks: Gaining the Competitive Edge

October 7, 2020, 11 a.m. New York / 4 p.m. London

Earlier this year, Wind River® teamed up with F5, Schneider Electric, and Heavy Reading on a global survey of communications service providers in order to better understand what drives their edge computing strategies. Listen as representatives from each company share and interpret the results.

What you will learn:
  • Which use cases are currently driving edge computing

  • How service providers will secure their coming edge deployments

  • How edge computing will impact 5G rollout and vRAN

  • What challenges telcos are seeing to full-scale edge deployments

Speakers
  • Jennifer Clark,
    Principal Analyst - Cloud Infrastructure and Edge Computing,
    Heavy Reading
  • Richard Lopez,
    Senior Strategic Architect for the Service Provider Business,
    F5
  • Javier Martin,
    Telecommunications Edge,
    Schneider Electric, Inc.
  • Jeff Gowan,
    Product Line Marketing Manager,
    Wind River

Thanks for your registration.

Web Seminar Series for Ericsson

SIMULATION AND MODERN DEVELOPMENT

Choose your Live Sessions Watch On Demand

In order to stay ahead of the competition, telecom equipment manufacturers must deliver more features at a faster pace. Modern development methodologies make this possible, but they also place new demands on hardware availability. Automation, collaboration, and access to the hardware are more important than ever before—and simulation technology, along with modern OS development methodologies, helps development teams achieve these.

Join us for a close look at Wind River® Simics® and Wind River Linux and find out how developers can benefit from working with them.

You will learn:
  • How Simics can be used to simulate a board for telecommunications products
  • New methods for debugging applications in a sandbox environment
  • How Simics can simulate entire networks of boards, allowing for new inspection capabilities
  • How to build an image in Wind River Linux containing exactly what you want; nothing less, nothing more

Wind River Simics Basics

April 16, 2020, 2 p.m. CET

Learn how Simics can be used to simulate a board for networking products. Concepts such as scripting, checkpointing, examining states, booting the OS, and running applications will be described.



Wind River Simics Debugging

April 23, 2020, 2 p.m. CET

Simulation tools can not only be used as a replacement for hardware, they can also bring extra value by giving developers new methods for debugging applications in a sandbox environment. In this session we will discuss how to debug applications running in Linux and how to connect debuggers or use built-in debugging tools.



Wind River Simics Networking

April 30, 2020, 2 p.m. CET

Simics is a full system simulator, simulating not only CPUs and devices but boards and entire networks of boards, all simulated in the same context. This allows for new inspection capabilities where the entire system can be halted, network packages can be analyzed, and fault packages can be injected. In this session, find out how modern development methodologies can deliver new networking capabilities.



Wind River Linux Container Images

May 7, 2020, 2 p.m. CET

The Yocto Project is an open source Linux distribution builder, which makes it possible to build images that contain exactly what the user wants; nothing less, nothing more. Wind River Linux is based on the Yocto Project and provides support, long term maintenance, and other features required for Linux in production systems. In this session we will look at how to build a container image in Wind River Linux.



Wind River Linux Security

May 14, 2020, 2 p.m. CET

Wind River Linux comes with a set of security features which can be enabled by the user. In this session we will go through some of these settings and how it makes your platform more secure.

Making the Grade with Linux and Cybersecurity at the Intelligent Edge

A Microweb Tech Series With Michael Mehlberg

Watch them all

Open source has become a game changer for innovation, from the data center to the far edge. Software developers use open source Linux because of its ease of access, flexibility, and leading-edge technologies. It also has one of the largest and most prolific communities, with vast amounts of resources. At the intelligent edge, where devices and systems have mission-critical functionality, Linux adoption has lagged behind other markets. But the momentum is shifting, and Linux has the potential to lead the way for a massive transformation of the embedded industry.

Join Michael Mehlberg, vice president of marketing for Wind River® Security, for a fast-paced micro series covering the requirements needed for Linux to make the grade at the intelligent edge.

Using open source early in the proof-of-concept cycle means taking advantage of the rapid pace of open source innovation. Taking your solution to market comes with additional measures meant to protect your device throughout its lifecycle.
Matt Jones, Chief Architect, Wind River

Open Source Gaining at the Edge

The proliferation of open source software on edge devices has grown by orders of magnitude year over year. But a single, static variant of Linux on the edge can’t meet the requirements of every market. That’s why a variant of Linux that could adapt, changing to address different requirements in different markets, would be a huge asset to any intelligent edge company.

Watch Now

Defining Market Grade Requirements

Requirements differ by market for intelligent edge devices. An enterprise or data center–centric Linux solution won’t cut it for embedded markets such as automotive, industrial, or aerospace and defense. Learn what is vital for strictly regulated markets.

Watch Now

Performance Matters at the Edge

Performance—specifically latency and jitter—is one of the most common requirements when building intelligent edge solutions. This goes across all markets. Learn how to ensure that Linux solutions achieve these criteria.

Watch Now

Open Source Compliance

Learn how you can manage accountability and providence tracking of the collection of all compliance artifacts of an open source solution, as it takes form while traversing the supply chain from conception to end user.

Watch Now

Creating a Secure Edge Product

Get the rundown on a solid process for creating a secure edge product, from methodology to mapping secure principles to design imperatives.

Watch Now

Cybersecurity Requirements

A cybersecurity-first approach is one that goes beyond traditional security measures and looks at system security from a holistic perspective. Learn about what you need to implement it.

Watch Now

Managing CVEs for Deployed Devices

Security vulnerabilities have been on the rise significantly since 2016. Understand best practices for monitoring and dealing with CVEs as they occur.

Watch Now

Find out Where You Might Be Vulnerable

Walk through a brief set of questions to see where you stand.

Take an assessment

Get Expert Help

Contact us

Web Seminar Series

Simulation and Modern Development

Watch On Demand

In order to stay ahead of the competition, you must deliver more features at a faster pace. Modern development methodologies make this possible, but they also place new demands on hardware availability. Automation, collaboration, and access to the hardware are more important than ever before—and simulation technology, along with modern OS development methodologies, helps development teams achieve these.

Join us for a close look at Wind River® Simics® and Wind River® Linux and find out how developers can benefit from working with them.

Watch On Demand

For more in-depth training courses including hands-on lab exercises and quizzes, explore the Wind River Learning Subscription at www.windriver.com/education/learning-subscription.

Wind River Simics Basics

Learn how Simics can be used to simulate a board. Concepts such as scripting, checkpointing, examining states, booting the OS, and running applications will be described.



Wind River Simics Debugging

Simulation tools can not only be used as a replacement for hardware, they can also bring extra value by giving developers new methods for debugging applications in a sandbox environment. In this session we will discuss how to debug applications running in Linux and how to connect debuggers or use built-in debugging tools.



Wind River Simics Networking

Simics is a full system simulator, simulating not only CPUs and devices but boards and entire networks of boards, all simulated in the same context. This allows for new inspection capabilities where the entire system can be halted, network packages can be analyzed, and fault packages can be injected. In this session, find out how modern development methodologies can deliver new networking capabilities.



Wind River Linux Container Images

The Yocto Project is an open source Linux distribution builder, which makes it possible to build images that contain exactly what the user wants; nothing less, nothing more. Wind River Linux is based on the Yocto Project and provides support, long term maintenance, and other features required for Linux in production systems. In this session we will look at how to build a container image in Wind River Linux.



Wind River Linux Security

Wind River Linux comes with a set of security features which can be enabled by the user. In this session we will go through some of these settings and how it makes your platform more secure.

Web Seminar Series for Airbus

WHERE DEVOPS MEETS CYBERSECURITY

Simulating systems, from the smallest to the most complex, allows you to adopt new development techniques that are simply not possible with physical hardware. By moving from physical hardware to a virtual lab, embedded software teams can revolutionize crucial aspects of their processes, enabling them to deliver better software faster.

LEARN HOW SIMULATION:
  • Shortens development time
  • Enables DevOps
  • Improves Cybersecurity

Simulation for Embedded Systems

March 27, 13:30–14:30 CET

Learn how to shorten time from concept to impact by using modern simulation techniques, such as behavioural simulation and virtual processing time, which embrace a more agile approach to embedded software design.

Register



DevOps and Digital Twins

April 3, 13:30–14:30 CET

In this web seminar we’ll discuss why—and demonstrate how—an automated workflow can be applied to embedded system projects. Learn the benefits of taking a systematic approach to testing and the lessons we learned applying this workflow internally.

Register



Cybersecurity

April 24, 13:30–14:30 CET

Learn how a virtual prototype improves embedded software security. We’ll demonstrate simulation techniques that enable developers, testers, and QA to create fast and fail-safe experiments without special hardware.

Register