Cloud Native for Telco: Making IT Technology Feasible at the Network Edge


The term cloud native has come to dominate telco industry discussions around network transformation. Communications service providers (CSPs) are realizing that the cloudbased networking practices...
Return to Resource Center

Certification of Avionics Applications on Multi-core Processors: Opportunities and Challenges


Using the latest multi-core processors in integrated modular avionics (IMA) programs is a perfect solution for consolidating avionics applications and reducing size, weight, and power (SWaP) on next-generation platforms. However, multi-core processors pose many more system implementation and certification challenges than typical single-core or multiple discrete processor solutions. This paper provides guidance on the certification challenges of multi-core solutions as well as an update on work at Wind River® to develop commercial off-the-shelf (COTS) RTCA DO-178C DAL A certification evidence packages for VxWorks® 653 3.0 Multi-core Edition platform. LEARN Potential risks associated with multi-core certification programs Key tenets when seeking certification for safety-critical applications  Insights from the DO-178C DAL A certification strategy for VxWorks 653
Return to Resource Center

Accelerating the Deployment of Critical Infrastructure Edge Services Through the StarlingX Project


The StarlingX open source project was created to address the need for an open source software platform that enables telco-grade applications and services to be deployed at the network edge.
Return to Resource Center

Accelerate DevOps with Continuous Integration and Simulation


Your team wants to adopt DevOps and Continuous Integration (CI) practices in order to meet the growing demand for faster delivery of new features. But implementing these practices can be...
Return to Resource Center

10 Steps to Virtualization


Virtualization—the creation of multiple virtual machines (VMs) on a single piece of hardware, where each VM emulates an actual computer so that each VM can execute a different operating system...
Return to Resource Center

Design Update Capabilities for Medical Devices


With the objective to achieve better results in patient healthcare and lifesaving techniques, regulatory agencies such as the U.S. Food and Drug Administration continue to announce rules and regulations to make medical devices safer and more secure for patients. In a recent 2018 announcement, the FDA released an article, “Medical Device Safety Action Plan: Protecting Patients, Promoting Public Health,” that outlines various new FDA actions to improve medical device safety. One of the components of this plan is the call for mandatory built-in capabilities providing safety and security updates to medical devices.
Return to Resource Center

Solutions for Space Systems


A combination of our embedded heritage and the latest innovative technologies is enabling space system providers today with end-to-end software solutions that usher in a new era of flexibility.
Return to Resource Center

Solutions for Energy Sector Use Case


Large-scale energy producers face enormous challenges while seeking sustainable solutions in the face of rising demand. Production facilities are under pressure to dramatically increase efficiency and reduce costs while maintaining current output, security, and safety standards. Meanwhile, many facilities are burdened with legacy, single-purpose automation systems, often nearing the end of their useful lives. The cost of updating these legacy systems is astronomical, while simply replacing them with more current versions will not deliver the efficiency gains or long-term OPEX reductions necessary to remain competitive. Finally, energy production facilities are in continuous operation, so they cannot be shut down to undergo a single, comprehensive upgrade. Today’s connected technologies offer the opportunity to improve efficiency and cut costs, but they bring yet another challenge: security. The more connected systems become, the more vulnerable they are to external tampering. And even legacy hardware not directly connected to the Internet can be subject to attack.
Return to Resource Center