Paul Viorel
Linux vs QNX: 6 Considerations When Safety Certifying Embedded
· Cybersecurity

Linux vs QNX: 6 Considerations When Safety Certifying Embedded

Safety-certification of an embedded device can take a year or more and cost millions of dollars. Yet as many as 60% of products that companies attempt to safety certify fail to receive the desired stamp of approval. The losses are significant. At BlackBerry® QNX®, we’re changing that statistic for our customers with a near-100% success […]

Read more →
Xavier Miville, Product Manager
· Our Contributors

Xavier Miville, Product Manager

Xavier is a senior product and team leader with 15 years of experience in software architecture and development. He is passionate about graphics, video and distributed architectures, skilled at software engineering, from C++, Javascript and Java application development down to low level programming with C and Assembly. Xavier is self-motivated, resourceful and determined, comfortable with […]

Read more →
Supply Chain Economics and Cybersecurity
· Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of thousands of suppliers, from raw materials to hardware to firmware to software and everything in between. As companies continually […]

Read more →
Randy Martin, Product Manager
· Our Contributors

Randy Martin, Product Manager

 Randy Martin serves as Product Manager Virtualization Technologies, BlackBerry QNX. He is an energetic outgoing Technical Sales Representative, Product Manager, Product Marketing Manager, Technical Writer and Technical Sales Manager with 15+ years of proven results. Strong team builder, mentor, facilitator and motivator.

Read more →
Cybersecurity and Data Concerns in 5G
· Cybersecurity

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of 5G security concerns is the amount of data collected and how it is interpreted. […]

Read more →
Extend the Lifecycle of Embedded Systems with a Hypervisor
· Cybersecurity

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software areas to share common hardware and resources. When it comes time to develop a new version of a system, […]

Read more →
IoT: Three Types of Security
· Cybersecurity

IoT: Three Types of Security

IoT security will never be confused with Fort Knox. It is very important that IoT to be secure in a way that is both technically and economically appropriate. But an IoT strategy that does not incorporate active security measures is not a strategy, but something more akin to hope. A recent ZDNet article called attention […]

Read more →
Jacques Bourhis, CTO
· Our Contributors

Jacques Bourhis, CTO

Jacques Bourhis is CTO of IoTerop, an award-winning leader of IoT device management solutions and an important contributor to open-standards. Our Lightweight M2M compliant framework of rich device services enables companies to build future-proof industrial Internet-of-Things solutions quickly. Customers include Itron, Traxens, and Elvaco.

Read more →
Emerging Tech and Sustainability – A Missed Opportunity
· Connected Industry

Emerging Tech and Sustainability – A Missed Opportunity

The traditional industrial terms of digital technology and environmental sustainability are not intertwined and the compelling factors remain unrelated. Sustainability through Industry 4.0 contribute to developing a better understanding of Industry 4.0 elements and the advanced technologies, considering the key changes in management and emerging opportunities towards sustainable development. The evolution of digital technologies has […]

Read more →
Identifying Compromises Through Device Profiling
· Cybersecurity

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one of our systems is sending traffic that it shouldn’t? In this article, I’ll show you how to detect these […]

Read more →
The Million-Dollar Startup – Can Enterprises Adopt a Green Field Mentality?
· Connected Industry

The Million-Dollar Startup – Can Enterprises Adopt a Green Field Mentality?

Why is it so hard for enterprise organizations to act like the startup companies they increasingly come up against? It’s a very good question. In every industry, across every vertical we see new businesses emerge from seemingly nowhere, impacting the market landscape. What is it that prevents our largest companies from adopting a similar path, […]

Read more →
Bill Stearns, Customer Support, Development, and Training for Active Countermeasures
· Our Contributors

Bill Stearns, Customer Support, Development, and Training for Active Countermeasures

Bill provides Customer Support, Development, and Training for Active Countermeasures. He has authored numerous articles and tools for client use. He also serves as a content author and faculty member at the SANS Institute, teaching the Linux System Administration, Perimeter Protection, Securing Linux and Unix, and Intrusion Detection tracks. Bill’s background is in network and operating […]

Read more →