Skip to the main content.

Global armed services are looking at strategies and techniques to open up systems and reduce vendor lock. These programs are often deployed for decades, so these architectures need to be resistant to changes in the supply chain, capable of advancing functionality to keep systems globally competitive against all adversaries, and functionally safe and secure. Virtually every presentation from the US Armed Services is driving a Modular Open Systems Approach (MOSA), and includes acronyms like FACE (Future Airborne Capability Environment), SOSA (Sensor Open System Architecture), and other open capability standards.  

Earlier this week, we received confirmation from the Future Airborne Capability Environment (FACE) Consortium that LynxOS-178, our DAL A certified real-time operating system, had passed the conformance testing for version 3.1 of the FACE specification for three processor architectures: Arm, PowerPC, and x86.

If you are new to FACE, this article by our VP of Engineering provides a great background and is a quick read.

This white paper discusses that a supplier cannot simply claim FACE conformance. Instead, the process mandates a 3rd party verification authority (VA) to perform the testing. The FACE Conformance Program provides the conformance criteria and processes necessary to ensure that UoCs (Unit of Conformance – In our case, this is a software component) are developed according to the FACE Technical Standard. These criteria and processes require the verification, certification, and registration of the UoC. In our case, we chose LDRA as our VA.

4.7.23-blog

We have to be careful, though, not to think that our work is done by simply aligning to standards. While they describe interfaces of libraries that applications can link into to use operating system services, these interfaces only include descriptions for software that can run in the user application space. The standards lack descriptions of expected behavior and side effects that can inform real-time and hazard analysis. They do not account for the system information needed to build, integrate, and configure a comprehensive system to behave correctly. They also do not cover software components that reside in the operating system itself, such as drivers and health monitors. 

Those are the areas where Lynx focuses on delivering differentiated standards-based platforms through:
  1. LynxSecure which enables architects to partition resources and allocate components as individual virtual machines, and
  2. LynxElement (Unikernel) which can be used as the runtime environment for each individual component instead of traditional guest OSs to improve resource utilization and timing properties

Some great reading on how these can assist system architects can be found in this article written by Will Keegan (page 26 of this edition of Military Embedded).

Lynx's Strategic Leap: Unveiling New Capabilities and Vision for Defense-Optimized Software Solutions

Lynx's Strategic Leap: Unveiling New Capabilities and Vision for Defense-Optimized Software Solutions

Strategic Expansions and Future Capabilities in MilAero Market In December, we unveiled Lynx’s acquisition of Timesys, our first major growth since ...

Read More
Embracing Innovation, Collaboration, & Growth with Acquisition of Timesys

Embracing Innovation, Collaboration, & Growth with Acquisition of Timesys

I joined Lynx in June 2022 as a result of the acquisition of Lynx by OceanSound Partners. One of my first priorities was a collaborative effort...

Read More
C2 Server: What Is It? What Can Be Done to Thwart Them?

C2 Server: What Is It? What Can Be Done to Thwart Them?

what is a c2 server Cybersecurity attacks are on the rise across a diverse set of markets. Behind the more intentional attacks is a desire to extract...

Read More