Open Source And 5G: A Perfect Partnership for Wider Deployment?

As 5G technology becomes the industry standard in mobile telecommunications, enabling new levels and areas of connectivity, how can it be deployed in industry? What processes and platforms need to be in place to maximize the technology’s wider potential? Open source software is increasingly being seen as a means of helping developers extend 5G’s use cases and applications.

View Now

Graybar Boosts IT Infrastructure Automation and Management with Red Hat Enterprise Linux

Graybar serves the construction market; the commercial, institutional, and government (CIG) market; and the industrial and utility markets. Graybar now leverages Red Hat® Enterprise Linux® as its sole Linux distribution after completing a migration from a third-party Linux OS in 2021. Read this detailed, Red Hat sponsored, customer case study by IDC for information about the organizational challenges, solutions, and business benefits of IT infrastructure and automation management.

View Now

Log4Shell, Open Source Maintenance, And Why SBOMs Are Critical Now

Tidelift CEO and co-founder Donald Fischer and guest speaker Forrester Principal Analyst Sandy Carielli discussed some of the key lessons organizations can learn from Log4Shell along with some critical recommendations organizations can use to prepare for handling similar issues down the road.

Sandy and Donald talked about how enterprise organizations should:

  • Use software bills of materials to better understand and manage their open source software supply chain.
  • Enhance their visibility of the open source components being used and the associated transitive dependencies.
  • Focus on proactive open source maintenance and how to better prepare their teams to quickly mitigate the risk of future vulnerabilities.
  • Consider the role open source maintainers play in risk planning and mitigation.

View Now

Purpose-Built Linux for Embedded Solutions

The explosive growth of the Internet of Things (IoT) is just one of several trends that is fueling the demand for intelligent devices at the edge. Increasingly, embedded devices use Linux to leverage libraries and code as well as Linux OS expertise to deliver functionality faster, simplify ongoing maintenance, and provide the most flexibility and performance for embedded device developers.

This e-book looks at the various approaches to providing both Linux and a build environment for embedded devices and offers best practices on how organizations can accelerate development while reducing overall project cost throughout the entire device lifecycle.

View Now

Deploying Containers in a RTOS World

Embedded development is modernizing and transforming digitally, changing forever — and for good. The Internet of Things and the advent of intelligent systems require network connectivity to collect data that can be used for monitoring and analytics. This persistent connectivity calls for constant upgrades and new capabilities as well as rapid fixes for security issues. One of the most efficient and effective ways to accomplish this is through containers.

This demonstration and discussion will touch on some of the embedded use cases where it makes sense to leverage container technology on an RTOS. We will show you how containers can empower a software developer to leverage open source, extend functionality after deployment, and adapt to changing specifications.

What you will learn:

  • Use cases for containers on both Linux and VxWorks
  • How to resource partitioning to maximize container benefits
  • How to rapidly deploy a new application for VxWorks using containers

View Now

10 Properties of Secure Embedded Systems

Discover 10 principles that together will protect your organization’s systems.

The number of security flaws published last year made 2020 the fourth consecutive year to break records in the number of recorded vulnerabilities. It’s time to change how we think about securing embedded systems.

This white paper covers the most important security design principles that, if adhered to, give you a fighting chance against any attacker who seeks to gain unauthorized access, reverse engineer, steal sensitive information, or otherwise tamper with your embedded system.

View Now

10 Best Practices for Secure Embedded Systems

Learn the latest threats to your embedded systems and how to protect against them — even when attackers have already struck.

The number of security flaws published last year made 2020 the fourth consecutive year to break records in the number of recorded vulnerabilities (US-CERT Vulnerability Database). We must change how we think about securing embedded systems.

Join Wind River® for a discussion of the current threat landscape and a look at 10 principles that can achieve a multiplicative effect in helping your organization protect embedded systems.

You will learn:

  • The modern threat landscape for embedded systems
  • Why it’s impossible to always keep all attackers out
  • How to protect a system that an attacker has already breached
  • 10 fundamental and essential properties of secure embedded systems

View Now

Smart Linux Solutions for the Intelligent Edge

Linux is the default environment for most software developers and is a popular choice for embedded solutions. However, one of Linux’s greatest strengths, and to some extent its biggest challenge, is that it comes in so many flavors and varieties, each well suited to a particular use case.

Commercially supported embedded Linux is the primary alternative to RYO. Not only are the long-term support and maintenance costs much lower but the technical, business, and legal risks of commercially supported embedded Linux are much lower as well. Commercial vendors can also provide full development services, including platform, services, maintenance, and support, which increase productivity and reduce the overhead of maintaining your own unique embedded Linux distribution.

View Now

Open Source and Cloud-Based Software to Power AI Initiatives

Enterprises are using artificial intelligence (AI) and machine learning (ML) to generate significant business benefits. Most technology leaders are using open source tools and hybrid cloud based infrastructure to power their AI/ML projects. Red Hat and Pulse surveyed 100 enterprise IT and data leaders who use AI and ML to understand why they implemented the technology, the types of AI/ML tools they rely on, and the most popular initiatives they’re investing in.

View Now