7 10, 2015

Securing the Internet of Things Just Got Easier

2015-10-07T15:08:50-07:00

Traditional network and endpoint protection mechanisms are struggling today to protect our corporate IT infrastructure and computers. Adding the projected billions of nodes that will constitute the Internet of Things exacerbates the problem dramatically.

The advantage that the embedded industry has over the traditional computer world, is that the devices are generally being built for a specific purpose, and as part of the design of these systems, security and protection could be a primary consideration. However, adding security of any form to a resource-constrained device that isn’t secure by design is almost impossible.

Providers of the traditional embedded software platform, the real-time operating system, are in a prime position to address this need by stepping up and offering the security functionality developers need to protect […]

5 09, 2012

Now Any Embedded System Can Be Hi-Reliability

2015-11-19T12:32:19-07:00

The distinction between ‘hi-reliability’ and ‘standard’ embedded software design is being blurred as the commercial and human consequences of embedded system failure escalate. Whether in avionics, medical, automotive, or SCADA systems, the slightest flaw can ripple down to a system failure and potential injury or loss of life.

Technology integrated into these systems must be highly scrutinised to ensure system reliability is preserved. While robustness is a primary concern, these systems are constantly evolving to increase functionality, reduce footprint, and save operational cost.

In order to meet these demands systems become more software intensive and more complex, making robustness difficult to achieve.

At the same time, the increasingly connected world of commercial embedded systems leaves them vulnerable to threats from the outside, leading to increased demand […]

19 04, 2012

Can Sensitive Data for Tactical Military Environments Be Protected in the Cloud?

2015-11-19T12:30:17-07:00

Louise Funke, Translattice
Robert Day, LynuxWorks —

When storing, accessing, and disseminating military data in the cloud, top concerns include security, data reliability and redundancy, and data location. The good news is that these can be delivered when secure virtualization pairs with a distributed cloud computing scenario.

While the promise of cloud computing, with its lower costs and improved access through utility computing and storage, is very attractive, it is currently difficult to achieve for users with highly sensitive data.

Consider the case of a warfighter who has identified a threat that must be reported. The warfighter sends the data directly back to his command where others can use it to take action and prevent casualties. Shortly after the data […]

7 03, 2012

Lynx Software Technologies Patented Technology Speeds Handling of Hardware Events

2015-11-19T12:33:37-07:00
Patent #5,469,571
lynxos-50px
“Operating System Architecture using Multiple Priority Light Weight kernel Task-based Interrupt Handling.” Granted November 21, 1995

One of the most difficult challenges faced by designers of embedded systems is to meet real-time performance requirements. The interaction of multiple input-output (I/O) devices and system processes gives rise to complexities in timing and can degrade system performance.

Lynx™ Software Technologies developed a new way of managing kernel threads and priority processing, and was awarded a patent for its technology, which is part of the LynxOS® real-time operating system. The invention takes a unique approach to handling hardware events in a real-time environment, and allows complex […]

14 12, 2011

Building on 2011 – the Year that Secure Computing Came of Age

2015-11-19T12:35:10-07:00

originally published in ElectronicsWeekly.com, 14 DECEMBER 2011 – 17 JANUARY 2012

High profile cyber attacks drove defence grade security software into the general IT market, writes Robert Day, vice-president of marketing at LynuxWorks

Malware has become sophisticated in its entry, infection and damage mechanisms – and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011-12 so far.

Serious though these were, they didn’t threaten national security. What makes this trend alarming is the problem of key industrial infrastructure controlled by connected computers. Often this infrastructure is in the private sector, but targeted cyber-attacks on its central control systems could bring a city, region or country to a standstill.

The Stuxnet attack illustrates the […]

27 08, 2011

Building in RTOS Support for Safety- & Security-Critical Systems

2015-11-19T12:37:06-07:00

Safety- and security-critical systems are both focused on building technology to protect peoples’ lives. But despite the similar critical nature of the two systems, they are designed to function in very different worlds.  With different environmental assumptions, different problem spaces, and different governing legislation, each system has its own unique requirements when it comes to selecting the foundations for the technology, such as platform operating systems.

Safety- and security-critical systems are by no means mutually exclusive, but when building critical systems it is essential to have the right tool for the job. There is no such thing as a one-size-fits-all solution for both realms without sacrificing some aspect of safety or security. Therefore, LynuxWorks offers two independent RTOS products: LynxOS-178 for safety-critical platforms and […]

17 02, 2011

Enhancing Application Performance on Multicore Systems

2015-11-19T12:38:15-07:00

originally published at Military Embedded Systems

In a simple view of the world, an application running on a multicore system should run at least as fast as the same application runs on a single-core system with the same CPU power. Unfortunately, in practice, that is not the case. However, by implementing application parallelism and using an SMP OS and an embedded hypervisor, one can solve the challenge and realize dramatic performance improvements.

Let’s face it. The Multicore Era is upon us. How did we get here? For years, processor manufacturers delivered on the Moore’s Law promise of doubling CPU performance every couple years by increasing the number of transistors, increasing clock rates, and increasing instruction-level parallelism. We saw clock rates go from 1 GHz in […]