Welcome!

Linux Containers Authors: Liz McMillan, Elizabeth White, Pat Romanski, Lori MacVittie, Flint Brenton

News Feed Item

Green Hills Software to Present and Exhibit at DESIGN West 2013 in San Jose, CA

SANTA BARBARA, CA -- (Marketwired) -- 04/18/13 -- Green Hills Software, the largest independent vendor of embedded software solutions, will deliver technology presentations at DESIGN West in San Jose, CA, during the week of April 22, 2013. In booth #1320, Green Hills Software will also demonstrate its latest embedded software solutions. For more information on Green Hills Software's presence at DESIGN West, visit http://www.ghs.com/events/ESCSV_2013.html.

Green Hills Software speaker presentations include:

Topic: Embedded IPv6 - What's the beef?
When: Tuesday, April 23, 2013, 8:00 AM - 9:00 AM
Where: McEnery Convention Center; Room: 212 AC
Who: Thomas Cantrell, Engineering Manager, Embedded Networking, Green Hills Software

Synopsis: Embedded systems, from mobile devices to low-powered sensor networks, are becoming new members of the "Internet of Things," adding features such as field upgrade, remote management, and application downloads. The growth of these new devices adds further pressure to the nearly exhausted IPv4 address space. This class starts by talking about the reasons for the growth in IPv6 interest and customer requirements over the last year. It talks about the technical details of IPv6 in relation to traditional IPv4 networking. It then explores how to add and support IPv6 at the system level and at the application level.

Topic: Designing Your System for High Reliability
When: Wednesday, April 24, 2013, 9:15 AM - 10:15 AM
Where: McEnery Convention Center; Room: Salon 3
Who: Greg Davis, Director of Engineering, Green Hills Software

Synopsis: While 85% of embedded designs use C and C++, these languages are notorious for their inherent lack of safety. Many of the most common sources of errors are unlikely to show up during testing, and may manifest themselves later as costly product glitches and glaring security holes. This talk focuses on the tools and techniques that can be used to augment any software design paradigm. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid.

Topic: Tips and Tricks for Debugging
When: Thursday, April 25, 2013, 2:00 PM - 3:00 PM
Where: McEnery Convention Center; Room: Salon 1
Who: Greg Davis, Director of Engineering, Green Hills Software

Synopsis: There is no shortage of courses and books written on programming and software design. Yet despite the fact that developers spend 80% of their time debugging code, relatively little attention is paid to debugging. This talk goes over a number of top techniques in how to get to the bottom of problems using a modern debugger and readily available tools. Design techniques to make debugging easier are also discussed.

Topic: Separate and Not Equal: Safety and Security Design in Real-Time Operating Systems
When: Thursday, April 25, 2013, 2:00 PM - 3:00 PM
Where: McEnery Convention Center; Room: 212 BD
Who: Thomas Cantrell, Engineering Manager, Embedded Networking, Green Hills Software

Synopsis: Real-time operating systems by definition offer predictable scheduling behavior, but for a safety/security-critical system more is required. One other core function of the operating system must be to separate various elements of the system securely from each other. This course starts by looking at examples of mixed-criticality embedded systems, explores the safety and security interactions of the components in these systems, and then examines the ways real-time operating systems can secure the interactions. In addition, the course will briefly talk about various safety and security certifications including IEC 61508 and ISO 26262.

In booth #1320, Green Hills Software will offer a wide range of interesting presentations and demonstrations, including:

Main Stage Demonstrations

Solving complex embedded problems
For more than thirty years, Green Hills Software has solved the most challenging problems in embedded software. The presentation and live demonstration will show Green Hills Software's leadership in performance optimization, tools and techniques for maximizing developer productivity, and expertise in building safe, secure, and reliable embedded software.

Delivering product-differentiating security for Android devices
Connected mobile devices are commonplace in the enterprise. Nearly 70% of smartphones sold in 2012 run Android with a vast number of known and UNKNOWN vulnerabilities. This presentation will show how easy it is to exploit root vulnerabilities, remotely control devices and even extract critical data files. INTEGRITY Multivisor™, a separation kernel-based type-1 hypervisor, delivers the trusted mobile device architecture that secures Android devices for the enterprise.

Kiosk Demonstrations

Multimedia Rich Solutions
Next-generation devices need modern graphics capabilities. Green Hills Software will demonstrate OpenGL 3D capabilities for the INTEGRITY® RTOS on a Freescale i.MX6 Quad-core CPU. The combination of a high performance OpenGL stack with the safe, secure and real-time INTEGRITY separation kernel is ideal for safety-critical automotive and Class II-III medical devices. Middleware components featured include Vivante OpenGL drivers and Real Time Logic's Barracuda Application Server supporting HTML 5.

Advanced Debugging
To show how developers in the embedded Linux world can dramatically improve their debugging productivity, this demo will feature comprehensive, source-level debugging from boot loaders to applications. For developers of safety-critical systems, pre-qualified tools can save significant time throughout the development process. Green Hills Software will demonstrate the MULTI® IEC 61508:2010 (SIL 4), EN 50128:2011 (SWSIL 4) and ISO 26262 (ASIL D) pre-qualified tool suite on a TI Hercules microcontroller. The demonstration will also include the powerful TimeMachine™ debugger that takes advantage of the live CPU on-chip generated trace data of Xilinx Zynq processors.

Embedded to Enterprise Virtualization
A securely virtualized Android Jelly Bean-based platform features the world's first ARM Virtualization Extension (VE) enabled hypervisor, INTEGRITY Multivisor, running on a TI OMAP™ 5 processor. Multivisor's unique architecture provides hard real-time capabilities with fast boot performance. For mobile devices, demonstration will include the INTEGRITY Secure Smartphone - Trusted Mobile Device (INTEGRITY TMD) supporting dual personas running on a Galaxy Nexus Trusted Handheld. Also featured is an INTEGRITY PC™ workstation, which provides enterprise-level protection from hackers and malware.

About Green Hills Software
Founded in 1982, Green Hills Software is the largest independent vendor of embedded development solutions. In 2008, the Green Hills INTEGRITY-178B RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA & NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software at www.ghs.com.

Green Hills, the Green Hills logo, MULTI, INTEGRITY, Multivisor, INTEGRITY PC and TimeMachine are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...