embedded systems

See the following -

Open Source Embedded Technology & Health IT Systems

Embedded computer systems are usually designed to do a few specific functions, often with real-time computing constraints.  They are being installed within an increasingly wide range of complex systems or devices, e.g. Read More »

Why Linux is Critical to Edge Computing

Edge computing is a model of infrastructure design that places many "compute nodes" (a fancy word for a server) geographically closer to people who use them most frequently. It can be part of the open hybrid-cloud model, in which a centralized data center exists to do all the heavy lifting but is bolstered by smaller regional servers to perform high frequency-but usually less demanding-tasks. Because Linux is so important to cloud computing, it's an ideal technology to learn if you intend to manage or maintain modern IT systems.

Read More »

EclipseCon France 2017

Event Details
Type: 
Conference
Date: 
June 21, 2017 - 10:00am - June 22, 2017 - 7:20pm
Location: 
Centre de Congrès Pierre Baudis
11 Esplanade Compans Caffarelli
31685 Toulouse
France

EclipseCon France is conference organized by the Eclipse Foundation to bring together the French and greater European Eclipse community to learn about and collaborate on the most recent ideas and information about Eclipse technologies, Eclipse member companies, and the Eclipse Working Groups. Attendees can expect opportunities to network with other professionals, keynote speeches, demonstrations of Eclipse-based tools in action, and technical sessions on current topics such as modeling, embedded systems, Internet of Things, geospatial, and case studies. You can find the program schedule here...

Read More »

Cyber Resilience: Protecting Data and Immunizing Software

Event Details
Type: 
Seminar/Webinar
Date: 
April 21, 2020 - 2:00pm - 3:00pm

Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.

Read More »