rohamilton
By: rohamilton

August 8, 2019 6:27 pm

1,454 views

A Blunt Reminder About Security for Embedded Computing

  Recent news of the VxWorks security breach raises the unsettling question that those of us in the embedded computing industry have grappled with for decades. How do we secure an embedded operating system from a nefarious attack? The ICS Advisory (ICSA-19-211-01) released on July 30th by the Cybersecurity and Infrastructure Security Agency (CISA) […]

Read More


Terri Schlosser
By: Terri Schlosser

March 5, 2019 9:31 pm

1,049 views

SUSECON 2019: Family and innovative partnerships to support customer needs

SUSECON provides a forum for building a passionate community of technically knowledgeable participants who use open source technology from SUSE in their enterprise IT environments and share their passion for this open source technology with their peers. At our annual conference, we announce and demonstrate SUSE’s vision and latest technical advances to customers, partners, […]

Read More


BJM
By: BJM

April 20, 2018 6:37 pm

1,703 views

Teradata & SUSE: A Universe of Opportunity

As a recognized leader in data warehouse and data management solutions for analytics, Teradata knows a thing or two about providing technology that help organizations maximize the information they have in order to turn it into powerful business intelligence. Part of what allows Teradata to provide it's customers with such valuable tools and technologies is […]

Read More



By: SUSE

April 25, 2017 2:07 pm

842 views

Join the Results Webinar of this Year's Embedded Market Study

There are few things that consistently serve as an accurate barometer of an industry, but openly polling the people who are in the trenches day after day is one of them. In keeping true with this philosophy, EETimes and Embedded.com have been surveying engineers and embedded system experts for more than 20 years—gathering […]

Read More



By: SUSE

April 19, 2017 9:28 am

2,150 views

Resources for Staying Current on Embedded System Trends

The embedded development industry is changing rapidly. To stay current, embedded technologists need to identify resources that provide value and knowledge. This can be tricky in a space with such a broad definition, especially when you consider that more than 95,500,000 Google results appear when searching for ‘embedded system development resources.’ […]

Read More



By: SUSE

March 29, 2017 5:50 am

1,695 views

Don’t Settle for Subpar Debugging and Embedded Development Tools

Maybe this scenario sounds familiar—you’ve spent weeks developing code, but inevitably you’re feeling frustrated and concerned that you may have missed something that will put your company or customers at risk. You think, “There must be a better way to get the insight I need to know for sure that the […]

Read More



By: SUSE

March 9, 2017 10:27 am

2,077 views

Critical Questions When Evaluating Embedded Linux Systems

Investing in the right technology solutions can help overcome many of the challenges developers and companies face when bringing embedded systems to market. More and more embedded developers are recognizing that embedded Linux operating systems will enable them to keep up with the increasing pressure to innovate in a rapidly changing environment. According to VDC, […]

Read More



By: SUSE

February 10, 2017 8:36 am

2,985 views

Join SUSE at the Embedded Linux Conference

SUSE Embedded is proud to be a Gold Sponsor at the Embedded Linux Conference (ELC) February 21-23, 2017, in Portland, Oregon. Co-located with the OpenIoT Summit, the events will feature 130+ sessions for Kernel Developers, System Developers, Architects, Firmware Developers, Application Developers and other open source professionals. Content at the event will cover a […]

Read More



By: SUSE

February 2, 2017 1:10 pm

2,690 views

Key Security Considerations for Embedded Linux Systems

From the outset, security needs to be a key ingredient in tooling embedded Linux systems—not an afterthought. Software security is a complex challenge as software has many of its own security features, such as authentication methods, encryption, intrusion prevention and detection, and backup. At the same time, it can also contain errors (both deliberate […]

Read More