From: Military & AeroSpace Electronics
COMMENT - As you read down you find out it is Green Hills Software and INTEGRITY Global Systems who are the eager suppliers of this War Technology. " David Kleidermacher, chief technology officer of Green Hills Software and Integrity Global Security LLC in Santa Barbara, Calif., is involved in “a firestorm of activity surrounding virtualization, and adding the ability to run Linux and Android on top of [Green Hills’] RTOS. In many ways, this is the future of the RTOS -- being able to handle mixed criticality requirements that include security, safety, and real-time critical applications alongside increasing requirements for rich multimedia and connectivity, app stores, GUIs, etc.”"
The present direction for war has turned war-based corporations into the equivilent of small nations who, in exact parallel with the de Rothschilds, are making money from both sides. "Why don't you guys fight?" said the scraggy Dan O'Dowd from the sidelines, smiling at the huge profits accruing to him personally.
March 30, 2012
Posted by Courtney Howard
TECHNOLOGY FOCUS, 30 March 2012. The adoption of secure real-time operating system (RTOS) software and related embedded computing security software tools for military embedded systems continues to grow, driven by increased security threats and concerns, real and perceived.
Many pundits agree that the need for information security, especially for critical and classified data, as well as the computing and data storage systems on which it resides, has never been greater. Industry has responded with myriad innovations designed to deliver security and protection at not only the system level, but also at the embedded, component level.
“There is no single architecture, product, or capability that can protect against a continuously evolving threat landscape,” cautions Chip Downing, senior director of Aerospace & Defense at Wind River in Alameda, Calif. “Today’s connected systems need to integrate a wide range of capabilities to achieve continuous security in hostile network environments. Layered, proven security components, along with capabilities to update these system components, need to be integrated to enable continuous application and service availability, while maintaining the required security capability.” Much More