contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Embedded Linux nears real time
Thursday, 16 September 2004, 09:46 GMT

With new kernel updates and multiple latency-reduction options, Linux has become a viable alternative for many real-time-embedded-system designs.

Although Linux has captured the imagination of embedded-device designers worldwide, commercial operating systems continue to dominate real-time applications. With a multiuser architecture, a non-pre-emptable kernel, and a scheduler based on fairness instead of priority, Linux forced developers to rewrite portions of it or install a second kernel to gain real-time features. Responding to these deficiencies, a dedicated Linux support community has recently delivered an updated kernel that incorporates many time-sensitive features and makes Linux suitable for a larger range of real-time applications.

Read More at Reed-Electronics

Back to main page


SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Kavado Announces Defiance Risk Management System (RMS) to Support Compliance Reporting for Web Applications Security
» The Middleburgh Telephone Company Chooses Motorola’s Multi-Service Access Platform to Deliver Next Generation Triple-Play Services
» Keynesis Ltd. Announces the Release of Lockngo Professional Version 3.0
» net.com Customises SHOUT Family to Deliver VoIP Migration Appliance (VMA)
» Free Vulnerability Scan Now Available for SANS Top 20 Quarterly Update
» WiFi Manager Integrates Support For DLINK, SMC, LINKSYS and Nomadix Wireless devic
More Articles
» Understanding Rich Internet Applications
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter