Skip navigation

Secure software design depends on six key strategies. Wind River just published an article that explains these strategies and provides advice on how to implement them, citing practical applications of Wind River VxWorks, Wind River Hypervisor, and the 3rd generation Intel® Core™ processor family.




security.pngFor more articles like this, subscribe to the Embedded Innovator. Subscribers receive a bi-annual magazine and quarterly newsletter with the latest industry trends and design ideas. For more on securing connected devices, see




Wind River is a Premier member of the Intel® Intelligent Systems Alliance.



Kenton Williston

Roving Reporter (Intel Contractor), Intel® Intelligent Systems Alliance

Editor-In-Chief, Embedded Innovator magazine

Follow me on Twitter: @kentonwilliston