Wind River Systems U.K. Ltd

Address:
Regus
Central Boulevard
Blythe Valley Park
Solihull
West Midlands
B90 8AG
United Kingdom

Phone: +44 (0)1564 711 110

Fax: +44 (0)1564 711 302

Web: http://www.windriver.com


Wind River Systems U.K. Ltd articles

Displaying 1 - 20 of 60

Why are containers a benefit for Industrial IoT?

Why are containers a benefit for Industrial IoT?
Virtual machines and containers have been well-accepted by enterprise IT, but they are now moving into non-IT areas, such as industrial IoT edge devices. Both are tools that developers and system management use to take separate single applications or systems and consolidate multiple applications on to a single compute platform or server to optimise compute resources and save IT/OT costs.  Guest blog written by Ranjan Sikand, Wind River Intern.
23rd September 2019

5G moving from hype to reality

5G moving from hype to reality
Recently we’ve seen a couple of interesting items on the topic of 5G. The first is, 'Ericsson Rides 5G Wave Across Asia, North America' from SDX Central. The article summarises some key points gleaned from a recent Ericsson earnings call with analysts.  Guest blog written by Jeff Gowan, Wind River.
20th August 2019

Urgent/11 further boosts VxWorks security

Urgent/11 further boosts VxWorks security
At Wind River, security is embedded in its DNA. It is part of the rich heritage of nearly 40 years in mission-critical systems. It is built into all the technologies it provides to help customers develop trusted and reliable solutions. Wind River take security extremely seriously, which is why the recent vulnerabilities discovered within the TCP/IP (IPnet) networking stack, dubbed “Urgent/11,” has resulted in the most secure VxWorks to date. Guest blog written by Arlen Baker, Wind River Chief Security Architect.
31st July 2019


5G, autonomous systems and the revenge of real time and determinism!

5G, autonomous systems and the revenge of real time and determinism!
If you tend to look at the technology landscape through the lens of a cloud approach, you probably believe that infinite compute, storage and bandwidth are available to you thanks to the cloud. In terms of scalability and elasticity, IT and most of the popular PaaS have largely demonstrated that this is possible - just buy more compute, storage, services from your favorite cloud platform. Guest blog written by Michel Genard, Wind River.
13th June 2019

Testing against cyber-attacks with simulation technology

Testing against cyber-attacks with simulation technology
Cyber-security is often a story of the “weak link.” The following two recent cyber-security events involving USBs brings to light the importance of testing the system against cyber-attacks to eliminate this type of risk. Guest blog written by Michel Genard, Wind River.
31st May 2019

How does your software security measure up?

How does your software security measure up?
In recent months, Wind River has offered a free software security assessment on our website.The survey is open to anyone and asks ten very brief yes/no security questions about your software system. Each question focuses on a different aspect of security as spelled out by the Wind River Helix Security Framework. This framework is built on the industry standard Confidentiality, Integrity and Availability (CIA) Triad.  Guest blog written by Rick Anderson and Arlen Baker.
16th April 2019

Improving ATM security

Improving ATM security
While the security of Automated Teller Machines is not necessarily ‘life critical’ as with many other industries (think transportation, medical and some industrial applications), there are certainly financial and identity theft risks associated with these devices. There is much data on the web regarding the various ATM attack vectors, the estimated number of annual hacks and the cost to the industry. Guest blog by Rick Anderson, Wind River.
3rd April 2019

Titanium cloud virtualisation platform for UNICA initiative selected

Titanium cloud virtualisation platform for UNICA initiative selected
Wind River announced that Telefónica has completed their validation in their NFV Reference Lab of Wind River Titanium Cloud as a Virtualised Infrastructure Manager (VIM) for NFV workloads, in line with the multi VIM paradigm of their UNICA initiative. Titanium Cloud is an ultrareliable, deployment-ready virtualisation software platform, fully compatible with open standards such the Open Source MANO (OSM) orchestration project.
22nd January 2019

Simplifying the management of distributed edge clouds

Simplifying the management of distributed edge clouds
A new white paper from Wind River has just been published by Mobile World Live titled: ‘Distributed Edge Clouds Are Complex, But Must They Be Difficult?’ (The answer is no by the way.) Guest blog written by Charlie Ashton.
5th December 2018

Collaboration on edge cloud computing for 5G

Collaboration on edge cloud computing for 5G
IoT software to critical infrastructure provider, Wind River, has collaborated with BT on a research activity showcasing edge cloud compute applications. The joint proof of concept will be demonstrated by Wind River (booth C7) at SDN NFV World Congress 2018 and features Wind River Titanium Cloud, a deployment-ready virtualisation software platform.
9th October 2018

Service providers increasingly explore cloud-native deployments

Service providers increasingly explore cloud-native deployments
Becoming an increasingly hot topic ‘Cloudification’ is especially a big talking point at telecom conferences and in conversations with service providers. Here Wind River will provide some observations on the business opportunities driving this focus on cloudification and explain why containers are becoming as important as Virtual Machines (VMs) for new telecom use cases that are moving towards deployment. Guest blog written Charlie Ashton.
8th October 2018

Automation moves telecom networks from automatic to autonomous

Automation moves telecom networks from automatic to autonomous
Back in 2012, telecom service providers worldwide launched a collaborative initiative to establish open standards for the virtualisation of telecom networking functions, which came to be known as Network Functions Virtualisation (NFV). Given the fierce competition in this market as well as anti-trust concerns, this was very much the equivalent of Donald Trump sitting down for a chat with Kim Jong Un, though the modest venue for the first NFV conference was Darmstadt, Germany rather than a slightly more luxurious island off Singapore. Guest blog by Charlie Ashton.
2nd July 2018

CIA triad three pillars for securing the IoT

Although it has been with us in some form and under different names for many years, the IoT is now suddenly the thing.
1st June 2018

Secure device management IoT's knight in shining armour

The security risks of IoT are well publicised from DDoS attacks and botnets to threats not yet known.
31st May 2018

Network virtualisation goes well beyond telecommunications

Network virtualisation goes well beyond telecommunications
The line between what is considered technology for telecommunications vs industrial control and other operations technology applications is becoming blurry. Software is being used in more instances across more industries because it provides a level of flexibility and cost savings like we’ve never seen before. Guest blog written by Jeff Gowan.
30th May 2018

Implementing functional safety in IIoT critical infrastructure systems

Modern real time operating systems (RTOSes) provide the basic building blocks for many applications.
30th May 2018

Is IoT the next standards battleground?

Is IoT the next standards battleground?
In previous blog posts about future proofing an IoT deployment, the top 2 takeaways from discussions at the Industry of Things event in San Diego were covered.  Guest blog written by Tom Gibbings. 
8th May 2018

Future proofing your IoT deployment

Future proofing your IoT deployment
If you were not aware, a few days ago 9th April was Global IoT Day, and it was actually the seventh year of this ‘holiday’ which saw plenty to celebrate. Guest blog written by Tom Gibbings.
11th April 2018

End-to-End security ensures virtualisation is viable

End-to-End security ensures virtualisation is viable
In applications such as industrial control and telecom the business-level benefits of virtualisation are becoming more understood. Companies worldwide have analysed real-world use cases and concluded that major savings in lifetime operational costs are achievable by deploying software-based, virtualised systems compatible with open standards, instead of traditional fixed-function physical equipment based on proprietary, vertically integrated architectures.  Guest blog written by Charlie Ashton.
11th April 2018

IoT gets redefined…again

IoT gets redefined…again
The word everyone loves and cannot get enough of… IoT! The continuously discussed term Internet of Things is getting redefined again. The promise of workload consolidation at the edge and things levels is disrupting the role of cloud in IoT. How did we get here? Guest blog from Wind River.
29th March 2018


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

Connected World Summit 2019
22nd October 2019
United Kingdom The Business Design Centre, London
IoT Solutions World Congress 2019
29th October 2019
Spain Barcelona