How Do You Troubleshoot Data Corruption?

In the world of embedded computing, data-related failures are unfortunately part of being in business. Even with the right hardware, software and development, frustrating and costly failures can occur. But when issues do surface, many companies don’t possess the right tools to troubleshoot the challenges they run into.
Automotive | Posted In: Automotive
| Comments (0)


Survey Says: Protecting Data is a Concern in Embedded

We recently conducted a survey on the state of data security for embedded developers and the projects they are working on as a way to gauge the security concerns of the industry. We wanted to get developers’ opinions on everything related to embedded security, including how they are keeping data secure, if they foresee future projects requiring more security and which security risks they consider are the most important.
Security | Posted In: Security
| Comments (0)


On the Road Again: Datalight Heads to Embedded World

The theme of this year’s Embedded World show in Nuremberg, Germany (Feb. 23-25) is “We Are the Internet of Things” and we couldn’t be more excited to demonstrate how Datalight embodies this sentiment. We will once again be co-located with our partner Logic Technology in Hall 4, Stand 108, alongside some of the most innovative software and tools purveyors in the industry.
Security||Events | Posted In: Security, Events
| Comments (0)


Explaining OverlayFS – What it Does and How it Works

Union file systems are a creative solution to allow a virtual merge of multiple folders, while keeping their actual contents separate. The Overlay file system (OverlayFS) is one example of these, though it is more of a mounting mechanism than a file system. Brought into the Linux kernel mainline with version 3.18, OverlayFS allows you to overlay the contents (both files and directories) of one directory onto another. The source directories can be on different volumes and can even be different file systems, which creates an interesting mechanism for allowing temporary modification of read-only files and folders.
Technology||Linux | Posted In: Technology, Linux
| Comments (2)


Security Options in Embedded Designs

A few months ago, the US Department of Health and Human Services defined a data breach as “a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.” Avoiding this means controlling network traffic, access to the device and applications, and protecting the data in storage.
Security | Posted In: Security
| Comments (0)


CES 2016 – Hot Topics You May Have Missed

CES showcases amazing innovations, and this year the hot topics were wearable technology, automotive technology, smart home, and drones. As devices gain greater functionality and have to handle more data, the need for power failsafe file systems like Reliance Edge become more important.
Events||News||Consumer||Automotive | Posted In: Events, News, Consumer, Automotive
| Comments (0)


Myth Busting: Using a Write Cache to Improve Performance Means Sacrificing Data Integrity

Perhaps the most widely held belief about write caching is that it makes a system unreliable. Something along the lines of "Data written to a cache instead of to the media will be lost on an unexpected power interruption, leaving the system in a damaged state and rendering data useless." There are a variety of options busting this myth.
Reliability||Performance | Posted In: Reliability, Performance
| Comments (1)


Myth Busting: SSDs are Faster than SDs – or Are They?

At the request of a customer in the banking machines segment, Datalight recently completed an investigation of some performance differences they were seeing between SD and SSD on their embedded target. The findings left us scratching our head a bit.
VxWorks||Windows Embedded||Performance | Posted In: VxWorks, Windows Embedded, Performance
| Comments (0)


File Systems Big and Small

The embedded systems market is extraordinarily diverse. Virtually any electronic device that is not a desktop computer or an enterprise data center behemoth is under the “embedded system” umbrella. With such variation in form factor, use case, price point and processing need it should come as no surprise that data storage needs differ as well.
Microcontrollers||News | Posted In: Microcontrollers, News
| Comments (0)


Root Cause Analysis: The Quest for Zero Defects

Today automotive OEMs—and by extension, their suppliers—are being held to a standard that demands absolute answers whenever a component or system fails. The safeguards built in and care taken in developing these systems is high and failures are a rare occurrence, only small fractions of a percentage.
Automotive||Reliability||Support | Posted In: Automotive, Reliability, Support
| Comments (0)