Integrating Workflows With Visual Studio Code


Over 71% of 83,000 respondents ranked Visual Studio Code as their favorite development environment in Stack Overflow’s 2021 Developer Survey. Come see some of the features that Wind River® Studio adds to Visual Studio Code, as well as dozens of other integrations that make development faster, easier, and more accessible.

What you will learn:

Return to Resource Center

Industry Leaders Choose Wind River Linux


Leading companies across all major industries choose Wind River Linux for superior open source technology, integrated and optimized embedded development, and world-class customer support. To learn mo
Return to Resource Center

Industrial Workload Consolidation via Virtualization


This demonstration shows multiple software systems working as virtual machines (VMs) on a single platform, combining a critical controller application with a robotic safety monitor with...
Return to Resource Center

Industrial Edge Computing Demonstration Using Wind River Linux


Industrial edge computing demonstration of electric pump with fault detection using Seco gateway running Wind River Linux.
Return to Resource Center

In the Beginning: Kevin Dallas and Jerry Fiddler in Conversation


To celebrate Wind River's 40th anniversary, current President & CEO Kevin Dallas spoke with Wind River founder Jerry Fiddler about the beginnings -- and future -- of the company.
Return to Resource Center

IIoT Edge Computing Architecture with Wind River Linux


View how Wind River Linux enables IIoT edge computing use cases as part of SECO EDGEHOG ALL-IN-ONE IIoT PLATFORM. *** Use Case 1: IoT Architecture - The Vending Machine SBC-868-eNUC with the Intel®
Return to Resource Center

How To Manage Threat Models


Red Canary detected 20,000 confirmed threats to systems in 2020 alone (“2021 Threat Detection Report”). We must clearly define our threat models to configure for security and determine the needed protection levels.

What you will learn:

  • Questions to help narrow down the threat model
  • How to decompose a system and apply a threat model to each critical component
  • How to address threats and attacks
Return to Resource Center

Hardening and Fortifying


You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your thre
Return to Resource Center

Greater AI Visibility in Embedded Software (Embedded World 2021)


https://www.windriver.com/events/embedded-world-2021 James Hui, Senior Solutions Architect, Wind River, speaks at Embedded World 2021. There are growing demands to incorporate AI into embedded soft
Return to Resource Center