Secure software design depends on six key strategies. Wind River just published an article that explains these strategies and provides advice on how to implement them, citing practical applications of Wind River VxWorks, Wind River Hypervisor, and the 3rd generation Intel® Core™ processor family.
For more articles like this, subscribe to the Embedded Innovator. Subscribers receive a bi-annual magazine and quarterly newsletter with the latest industry trends and design ideas. For more on securing connected devices, see intel.com/go/embedded-security.
Wind River is a Premier member of the Intel® Intelligent Systems Alliance.
Roving Reporter (Intel Contractor), Intel® Intelligent Systems Alliance
Editor-In-Chief, Embedded Innovator magazine
Follow me on Twitter: @kentonwilliston