Blog
IoT Security – the next-gen of social responsibility
In response to recent events, the White House and the National Institute of Standards and Technology (NIST) have just released the much awaited and polished guidance around cyber security for the Internet of Things (IoT). Guest blog by Neil McLellan.
Building the infrastructure for digital transformation in industrial automation
Software-defined infrastructure has been explored in many ways, especially in its approach and how it is in combination with the IIoT driving the digital transformation of industrial automation, as well as its benefit, but what about what is required in order to realise these benefits? Guest blog by Gareth Noyes.
Is it time for USB Type C?
The USB 3.1, type C standard have been around long enough such that the connectors and chips are readily available. But, it's a more complex set up and may have far more capabilities than is needed in your design. It's got quite a few more pins and types of signals. If you don't need all that, should you still make the plunge?
Ready for more NFV magic?
Aside from initial installation and commissioning, what’s typically one of the most important, and carefully managed tasks that operators have to tackle on a regular basis? The answer is simple: system upgrades. The process however, is nothing short of magic. Guest blog by Ron Breault.
Oracle and Wind River bring the enterprise to the edge
We’ve all seen the predictions on the opportunities that IoT presents to companies in the industrial sector. Regardless of which of the wide-ranging analyst figures you follow, its clear to see that the possibilities are endless. Turning those possibilities into reality starts with bridging the gap between IT and OT. Guest blog by Amanda Lowe.
Safety-critical expertise brought to functional safety for Industrial IoT
With the accelerating growth of the Internet of Things (IoT), it is increasingly important to identify and implement safety-related systems for smart grids, connected vehicles, robotics, industrial control systems, smart factories, and more. And when it comes to ensuring the reliability of these can’t-fail systems, Wind River has a proven track record of success across critical infrastructure sectors. Guest blog by Chip Downing.
Prevent human error in security: Dave meet STIG, STIG meet Dave
In a recent cartoon about software security by John Klossner, it shows a boxing ring, with assorted security software in one corner, and in the other corner was a guy wearing a shirt labelled ‘Human Error.’ This cartoon was not new, but for some reason, it touched off a reaction this time. Guest blog by Tim Radzykewycz.
Smart homes to protect you during zombie apocalypse
There’s been a lot of talk lately about smart homes. The convenience, the security, the gadgets, even the health benefits—like a smart refrigerator that tracks nutrition. But can a smart home fatten your wallet at the same time that it’s shrinking your waistline? Cees Links, GM, Qorvo Wireless Connectivity explains.
The 'unknown unknowns' of IoT security
As the Internet Of Things (IoT) evolves, our dependency on it will grow exponentially. With complexity comes hidden vulnerabilities; the 'unknown unknowns'. We cannot fully predict where security weakness lies because no single group has full access to all the code and hardware. Here, David Campbell outlines the importance of security design and high-level design considerations.
As Telcos start NFV deployments, Titanium Server streamlines network operations
As NFV deployments are started, Wind River has released and upgrade to its Titanium Server network virtualisation platform with features that streamline network operations and enable service provider efficiency. Guest blog by Charlie Ashton.