Software  >   Systems Software  >  

Embedded Operating Systems

RSS Feed    Add to Google    Add to My Yahoo!
Embedded Operating Systems Reports
 
IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

Using Static Source Code Analysis to Develop Secure Embedded Software
sponsored by Programming Research
WHITE PAPER: When it comes to embedded software, it's critical to address the root causes of security issues rather than just the symptoms of the problem. This resource explains how static analysis tools can simplify and automate code review to eliminate mistakes before they become integrated into the code base.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

Programming Research

Engineering Lifecycle Management: 5 Key Areas for Accelerating Innovation in the Automotive Industry
sponsored by IBM
WHITE PAPER: In this white paper, explore the challenges auto manufacturers face in creating more complex products made up of interconnected systems and how a comprehensive systems engineering approach can help overcome these difficulties.
Posted: 05 Aug 2014 | Published: 31 Jan 2013

IBM

Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESOURCE: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

Case Study: 3 Companies Integrate Success with 6 Embedded BI Techniques
sponsored by TIBCO Software Inc.
WHITE PAPER: This document will help you determine which approach to embedded BI is right for you. Uncover the advantages you'll experience with proper BI software selection after you review 6 integration techniques to get you started.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TIBCO Software Inc.

Enable relevant, in-context business intelligence: Embedding BI content into applications and processes
sponsored by IBM
WHITE PAPER: This brief resource introduces a platform that gives you the power to create customized BI content and embed it into applications and processes for relevant, contextualized business intelligence.
Posted: 15 Jan 2014 | Published: 30 Sep 2012

IBM

Embedded Open Source Analysis
sponsored by Klocwork
WHITE PAPER: This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Klocwork

Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT: This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Klocwork

Expert tips for embedded software development
sponsored by SAP America, Inc.
EGUIDE: Development teams often face strict compliance, security and testing requirements when tasked with developing embedded software. This useful e-guide provides tips for developing reliable embedded devices, strategies for ensuring embedded software security and tools and best practices for embedded software testing.
Posted: 19 Dec 2012 | Published: 17 Dec 2012

SAP America, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement