There's no way around it — as a software developer, system engineer, or system architect, you're going to encounter design complexity when developing safe, secure, and reliable IoT systems for today's critical infrastructure. In this new software-defined world, and with the IoT exploding around us, companies like yours must adapt to stay relevant.
Wind River® is excited to sponsor an online three-part Embedded University series from Embedded Computing Design on how to design safe, secure, and reliable critical infrastructure IoT systems.
- Update, not replace, your current critical infrastructure system for today's digital universe
- Meet the safety and security requirements necessary for connecting to the IoT
- Use virtualization to reduce your IoT critical infrastructure system cost and risk
IoT Critical Infrastructure Design
September 26, 8 a.m. PT / 11 a.m. ET
With legacy critical infrastructure just too expensive to replace completely, there are ways to implement new features that will define premium products for your market and meet the safety and security requirements necessary for connecting to the IoT. In Day 1 of this three-day class, we'll look at how you can transform digitally and ensure that your applications remain safe and secure.
Using Virtualization to Enable Your Safety-Certified IoT Critical Infrastructure System
September 27, 8 a.m. PT / 11 a.m. ET
Day 2 of our class looks at the use of partitioning to consolidate your safety-certified and non-safe code, enabling huge benefits in the use of advanced technologies to implement IoT capabilities. We'll also examine how virtualization using various types of partitioning in your IoT design can maximize safety and enable the use of Java and analytics, leading to reductions in your overall design cost and risk.
Using Virtualization to Enable Greater Cybersecurity in Your IoT Critical Infrastructure System
September 28, 8 a.m. PT / 11 a.m. ET
Our final class looks at how your IoT applications can be made secure and updated with critical cybersecurity patches while your safe and certified critical infrastructure applications remain untouched.