From: Market Wired
COMMENT -Green Hills Software again offers some of their employees, Thomas Cantrell and Greg Davis, to provide you with exciting insights on how to use GHS technologies to optimize your ability to provide tools which can easily kill innocent civilians.
How many of the drone contractors providing 'hardware' actually use GHS software? Inquiring minds want to know, and will find out.
It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives.
A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes.
In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows.
How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle?
Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few -- the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill.
And what is this bill?
This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations.
Butler was the most decorated military figure in the first half of the 20th Century and his words would, decades later, be echoed by those of John Perkins, whistleblower, who wrote, "Confessions of an Economic Hitman."
It took Perkins a generation to come clean, providing the insight to understand this portion of the Greedville Business Plan.
NEWS RELEASE
SANTA BARBARA, CA--(Marketwired - Apr 18, 2013) - Green
Hills Software, the largest independent vendor of embedded software
solutions, will deliver technology presentations at DESIGN West in San
Jose, CA, during the week of April 22, 2013. In booth #1320, Green Hills
Software will also demonstrate its latest embedded software solutions.
For more information on Green Hills Software's presence at DESIGN West,
visit http://www.ghs.com/events/ESCSV_2013.html.
Green Hills Software speaker presentations include: Topic: Embedded IPv6 - What's the beef?When: Tuesday, April 23, 2013, 8:00 AM - 9:00 AM
Where: McEnery Convention Center; Room: 212 AC
Who: Thomas Cantrell, Engineering Manager, Embedded Networking, Green Hills Software
Synopsis: Embedded systems, from mobile devices to low-powered sensor networks, are becoming new members of the "Internet of Things," adding features such as field upgrade, remote management, and application downloads. The growth of these new devices adds further pressure to the nearly exhausted IPv4 address space. This class starts by talking about the reasons for the growth in IPv6 interest and customer requirements over the last year. It talks about the technical details of IPv6 in relation to traditional IPv4 networking. It then explores how to add and support IPv6 at the system level and at the application level.
Topic: Designing Your System for High Reliability When: Wednesday, April 24, 2013, 9:15 AM - 10:15 AM
Where: McEnery Convention Center; Room: Salon 3
Who: Greg Davis, Director of Engineering, Green Hills Software
Synopsis: While 85% of embedded designs use C and C++, these languages are notorious for their inherent lack of safety. Many of the most common sources of errors are unlikely to show up during testing, and may manifest themselves later as costly product glitches and glaring security holes. This talk focuses on the tools and techniques that can be used to augment any software design paradigm. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid.
Topic: Tips and Tricks for Debugging When: Thursday, April 25, 2013, 2:00 PM - 3:00 PM
Where: McEnery Convention Center; Room: Salon 1
Who: Greg Davis, Director of Engineering, Green Hills Software
Synopsis: There is no shortage of courses and books written on programming and software design. Yet despite the fact that developers spend 80% of their time debugging code, relatively little attention is paid to debugging. This talk goes over a number of top techniques in how to get to the bottom of problems using a modern debugger and readily available tools. Design techniques to make debugging easier are also discussed.
Topic: Separate and Not Equal: Safety and Security Design in Real-Time Operating SystemsWhen: Thursday, April 25, 2013, 2:00 PM - 3:00 PM
Where: McEnery Convention Center; Room: 212 BD
Who: Thomas Cantrell, Engineering Manager, Embedded Networking, Green Hills Software
Synopsis: Real-time operating systems by definition offer predictable scheduling behavior, but for a safety/security-critical system more is required. One other core function of the operating system must be to separate various elements of the system securely from each other. This course starts by looking at examples of mixed-criticality embedded systems, explores the safety and security interactions of the components in these systems, and then examines the ways real-time operating systems can secure the interactions. In addition, the course will briefly talk about various safety and security certifications including IEC 61508 and ISO 26262.
In booth #1320, Green Hills Software will offer a wide range of interesting presentations and demonstrations, including:
Main Stage Demonstrations
Solving complex embedded problemsFor more than thirty years, Green Hills Software has solved the most challenging problems in embedded software. The presentation and live demonstration will show Green Hills Software's leadership in performance optimization, tools and techniques for maximizing developer productivity, and expertise in building safe, secure, and reliable embedded software.
Delivering product-differentiating security for Android devicesConnected mobile devices are commonplace in the enterprise. Nearly 70% of smartphones sold in 2012 run Android with a vast number of known and UNKNOWN vulnerabilities. This presentation will show how easy it is to exploit root vulnerabilities, remotely control devices and even extract critical data files. INTEGRITY Multivisor™, a separation kernel-based type-1 hypervisor, delivers the trusted mobile device architecture that secures Android devices for the enterprise.
Kiosk Demonstrations
Multimedia Rich SolutionsNext-generation devices need modern graphics capabilities. Green Hills Software will demonstrate OpenGL 3D capabilities for the INTEGRITY® RTOS on a Freescale i.MX6 Quad-core CPU. The combination of a high performance OpenGL stack with the safe, secure and real-time INTEGRITY separation kernel is ideal for safety-critical automotive and Class II-III medical devices. Middleware components featured include Vivante OpenGL drivers and Real Time Logic's Barracuda Application Server supporting HTML 5.
Advanced DebuggingTo show how developers in the embedded Linux world can dramatically improve their debugging productivity, this demo will feature comprehensive, source-level debugging from boot loaders to applications. For developers of safety-critical systems, pre-qualified tools can save significant time throughout the development process. Green Hills Software will demonstrate the MULTI® IEC 61508:2010 (SIL 4), EN 50128:2011 (SWSIL 4) and ISO 26262 (ASIL D) pre-qualified tool suite on a TI Hercules microcontroller. The demonstration will also include the powerful TimeMachine™ debugger that takes advantage of the live CPU on-chip generated trace data of Xilinx Zynq processors.
Embedded to Enterprise VirtualizationA securely virtualized Android Jelly Bean-based platform features the world's first ARM Virtualization Extension (VE) enabled hypervisor, INTEGRITY Multivisor, running on a TI OMAP™ 5 processor. Multivisor's unique architecture provides hard real-time capabilities with fast boot performance. For mobile devices, demonstration will include the INTEGRITY Secure Smartphone - Trusted Mobile Device (INTEGRITY TMD) supporting dual personas running on a Galaxy Nexus Trusted Handheld. Also featured is an INTEGRITY PC™ workstation, which provides enterprise-level protection from hackers and malware.
About Green Hills SoftwareFounded in 1982, Green Hills Software is the largest independent vendor of embedded development solutions. In 2008, the Green Hills INTEGRITY-178B RTOS was the first and only operating system to be certified by NIAP (National Information Assurance Partnership comprised of NSA & NIST) to EAL 6+, High Robustness, the highest level of security ever achieved for any software product. Our open architecture integrated development solutions address deeply embedded, absolute security and high-reliability applications for the military/avionics, medical, industrial, automotive, networking, consumer and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom. Visit Green Hills Software at www.ghs.com.
Green Hills, the Green Hills logo, MULTI, INTEGRITY, Multivisor, INTEGRITY PC and TimeMachine are trademarks or registered trademarks of Green Hills Software in the U.S. and/or internationally. All other trademarks are the property of their respective owners.
Contact:
Green Hills Software
Barbel French
805-965-6044
bfrench@ghs.com
No comments:
Post a Comment