Skip to main content
Wind River Wind River
  • Products

    Embedded Platforms »

    • Real-Time Operating System
      VxWorks

      Safety certified RTOS with deterministic performance and reliability for mission-critical embedded systems.

    • Commercial Linux for Embedded Systems
      Wind River Linux

      Yocto Project embedded Linux subscription with security vulnerability monitoring, long term maintenance and support.

    • Mixed-Criticality Hypervisor
      Helix Virtualization Platform

      Embedded virtualization platform that allows multiple operating systems, such as VxWorks, Linux and Android, to run simultaneously on a single SoC.

    Enterprise Platforms »

    • Commercial Linux for Edge Systems
      eLxr Pro

      Debian-based enterprise Linux distribution for edge computing with long-term maintenance and support.

    • Private Cloud Platform
      Wind River Cloud Platform

      High availability, cost-effective, open source, cloud infrastructure for virtualized and containerized workloads.

    Studio Tools »

    • Develop
      WorkspacesDiab CompilerPipeline Manager

      Create, build and integrate software for embedded and edge systems, with standardized environments and process automation.

    • Test
      Virtual LabTest AutomationInteI®Simics®

      Automate and accelerate software testing, quality, and time to market using simulated and physical environments.

    • Manage
      OTA UpdatesConductor

      Automate, deploy, orchestrate and update software for embedded devices, edge systems, and cloud infrastructure

    • Monitor
      Digital Feedback LoopAnalytics

      Analyze data across networks of distributed devices and servers to gain cross-domain visibility and actionable insights.

  • Industries

    Industries

    • Industry Col Left
      • Aerospace & Defense
      • Automotive
      • Energy
      • Enterprise
    • Industry Col Right
      • Industrial
      • Medical
      • Telecommunications
      • Retail
    Customer Stories

    Examples of how our solutions have helped customers achieve their goals.

    Start Exploring
  • Insights

    Insights »

    • Topics
      • 5G
      • AI
      • DevOps
      • Intelligent Edge
      • Security
    • Content Types
      • White Papers
      • Videos
      • Use Cases
      • Inside Edge: Industry Primers
      • Articles/Blogs
      • Seminars & Events
  • Services

    Wind River Services »

    • CAPABILITIES
      • Design Services
      • Lifecycle Management Services
      • Managed Services
      • Safety & Certification Services
      • Security Services
      • Education Services
    • PACKAGES
      • Wind River Linux Services
      • Wind River Acceleration Program
      • Wind River Zephyr Solutions
    Wind River Learning Subscription

    Choose a single product stream or mix & match bundles for cost-effective learning options!

    Upgrade Your Team’s Skills
  • Security

    Security

    • SECURITY
      • Security Center
      • Linux Security Scanner
      • Secure Development Lifecycle
    • Response
      • PSIRT
      • Vulnerability Responses
      • CVE Database
    Security Center

    Get the latest alerts, CVE updates, and security information.

    Stay Informed
  • Support

    Support

    • SUPPORT
      • Wind River Support Network
      • Product Documentation
    • Learning
      • Wind River Learning
      • Enhanced Support Offerings
    Support Network

    Access documentation, download software, submit request, & more.

    Get Support
  • About

    About Wind River »

    • ABOUT US
      • Newsroom
      • Awards
      • Executive Leadership Team
      • Customer Stories
      • Partners
      • Careers
      • University Program
    • CONTACT US
      • hidden-item
    The Intelligent Systems Future Is Ours to Build Together
Shop icon Shop Contact icon Contact

Wind River Blog

Tag:
Linux

57 articles
Back to blog
AdobeStock: Engineer

Detangling SBOM, CVE, and Regulatory Mandates

Software bills of materials (SBOMs) and Common Vulnerabilities and Exposures (CVEs) are not new concepts to software developers, and the two are not inherently related. But because...
2 months 1 week ago
Credit: NASA

Real-Time Solutions at the “Cosmic Edge”

NASA’s Artemis missions aim to return humans to the Moon, establishing a sustainable lunar presence. Advanced technologies for space stations, satellites, human surface mobility...
2 months 2 weeks ago
Free Linux Security Vulnerability Scanning from the Industry Leader

Free Linux Security Vulnerability Scanning from the Industry Leader

As a founding member and the foremost commercial software contributor to the Yocto Project, we are setting new standards for excellence in Linux implementation within the embedded...
2 years 5 months ago
5 Best Practices for Securing Linux Devices at the Edge

5 Best Practices for Securing Linux Devices at the Edge

The Internet of Things. It sounds innocuous enough. After all, how much damage can one little thing cause? But if they called it The Internet of Unsecured Devices with Easy Access...
2 years 5 months ago
Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

Delivering Collaborative Solutions for Embedded Avionics, Automotive, Industrial, Medical, Robotics, and More: A Long and Successful History

With more than 40 years of experience, Wind River has built an unmatched reputation for delivering runtime software that has been integrated with the most popular hardware...
2 years 5 months ago
7 Building Blocks for CVE Prioritization

7 Building Blocks for CVE Prioritization

Welcome to part two of our three-part series on bringing a structured approach to securing embedded Linux devices. The previous post outlined key questions you can ask to fully...
2 years 6 months ago
6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

6 Essential Questions for Evaluating the Threat Landscape of Your Embedded Linux Devices

The real question is how to get a realistic, accurate understanding of your threat landscape, so you can transform chaotic or haphazard security measures into structured, cost...
2 years 6 months ago
Wind River at Quad A 2023

Wind River at Quad A 2023

For those working with the US Army Aviation teams, Quad A is a must-attend event. Quad A is April 26-28 at the Gaylord Opryland Resort & Convention Center in Nashville. If you’re...
2 years 7 months ago
Develop Once, Deploy Anywhere

Develop Once, Deploy Anywhere

Modern development methodologies keep evolving, with methodologies such as Agile, SCRUM, CI/CD, DevOps, etc. The idea is often to develop faster with better quality. Speed can be...
2 years 7 months ago
There’s an Easy Way to Fix Your Frankenstein Linux Problem

There’s an Easy Way to Fix Your Frankenstein Linux Problem

Use Wind River’s Lifecycle Security Service to keep your legacy Linux platforms secureSoftware maintenance. For development teams that are focused on innovation and emerging...
2 years 7 months ago

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • …
  • Next page ››
  • Last page Last »

Wind River Blog

The Wind River Blog is made up of a variety of voices: executives, technologists and industry enthusiasts. We hope to foster conversations and encourage the sharing of insights regarding the evolving landscape of intelligent, connected systems with our ecosystem of customers, partners and colleagues.

Get our RSS feed

Subscribe

Enter your email address to receive notifications of new posts.

Popular Tags

Wind RiverVxWorksNetworkingLinux / Open SourceNFVAerospace & DefenseIndustrialIoT / M2MLinuxOpen SourceSecurityInternet of ThingsSimicsAutomotiveTelecomTools & SimulationAerospace and Defense

Disclaimer

The postings on this site are the views of the individual poster and do not represent Wind River's positions, strategies or opinions. This site is subject to Wind River’s Terms of Use.

Products

  • Platforms
    • VxWorks
    • eLxr Pro
    • Wind River Cloud Platform
    • Helix Virtualization Platform
    • Wind River Linux
    • Zephyr
  • Studio Tools
    • Workspace
    • Diab Compiler
    • Pipeline Manager
    • Test Automation
    • Virtual Lab
    • Intel® Simics®
    • OTA Updates
    • Conductor
    • Digital Feedback Loop
    • Analytics

Industries

  • Aerospace & Defense
  • Automotive
  • Energy
  • Enterprise
  • Industrial
  • Medical
  • Startups
  • Telecommunications

Security

  • Security Center
  • Vulnerability Responses
  • Linux Security Scanner
  • CVE Database

Explore

  • Resource Library
  • Intelligent Systems Research
  • Web Seminars & Events
  • Wind River Blog
  • Customer Stories
  • Learning Subscription
  • Guides to Intelligent Systems

Support

  • Wind River Support
  • Product Documentation

About

  • About Wind River
  • Newsroom
  • Awards
  • Executive Leadership Team
  • Partners
  • Careers
  • University Program
Support
Contact Us
Compliance at Wind River  | Privacy  | Feedback |
Country
U.S. Japan China

© 2025 Wind River Systems, Inc.
Facebook Twitter Linkedin Youtube