Wind River | Date: 2015-09-29
A device, system, and method performs an adaptive simulation. The method performed by a similar includes receiving a release to be incorporated into a user device, the user device being a deployed device. The method includes receiving a profile of the user device, the profile being indicative of settings and usage information of the user device. The method includes generating a simulated user device corresponding to the user device, the simulated user device having a simulated profile corresponding to the profile. The method includes performing, by the simulator, a simulation for the release based upon the simulated user device and the simulated profile.
Wind River | Date: 2014-05-16
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor, the set of instructions, when executed by the processor, causing the processor to perform operations including mapping a memory area storing a segment of code for a kernel of the system during an initialization time of a system. The operations also include executing the segment of code during the initialization time. The operations also include unmapping a portion of the memory area for the kernel after the segment of code has been executed.
Wind River | Date: 2014-04-10
A non-transitory computer-readable storage medium storing a set of instructions that are executable by a processor. The set of instructions, when executed by one or more processors of a multi-processor computing system, causes the one or more processors to perform operations including initiating a first processor of the multi-processor computing system with an operating system image of an operating system, the operating system image including a predetermined object map, initiating a second processor of the multi-processor computing system with the operating system image, placing a plurality of system objects with corresponding processors according to the predetermined object map, receiving a triggering event causing a change to the predetermined object map and relocating one of the system objects to a different one of the processors based on the change to the predetermined object map.
Wind River | Date: 2014-11-26
The present invention provides systems and methods for authenticating a mobile communication device to a computer system of an automobile that does not require manual code entry, and thereby reduces the burden on the user, minimizes human errors, and provides the ability to utilize more complex digital keys an increase the security level of the connection. In particular, the systems and methods of the present invention generate a unique identifier corresponding to the automobile and locally transfer a message including or generated from this unique identifier to the mobile communication device without manual code entry.
Wind River | Date: 2013-02-11
A system includes a memory including a plurality of software applications. The plurality of software applications includes a first software application and a second software application. The system also includes a deterministic group comprising a first processing core. The first processing core executes a first resource monitor and the first software application. The system also includes a constrained group comprising a second processing core. The second processing core executes a second resource monitor and the second software application. The first resource monitor detects an insufficient access to resources by the first software application and sends an indication to the second resource monitor. The second resource monitor receives the indication and instructs the second processing core to modify execution of the second software application.
Wind River | Date: 2014-11-18
A method including mapping a first portion of a virtual memory containing code of an operating system for access by a processor; receiving a call for an entry point of the operating system; and mapping, after receiving the call, a second portion of the virtual memory containing data for executing entry point code associated with the entry point for access by the processor. The processor executing the operating system code is permitted to access only data from the first and second portions of the virtual memory.
Wind River | Date: 2015-09-17
A method and system encrypts data in a least privileged operating system. The method includes determining a first encryption scheme to be used with software code to be mapped to a virtual memory. The method includes mapping a first portion of the virtual memory with the software code for access by a processor using the first encryption scheme. The method includes receiving a call for an entry point of the operating system. The method includes determining a second encryption scheme to be used with the entry point when mapped to the virtual memory. The method includes mapping a second portion of the virtual memory for executing entry point code associated with the entry point for access by the processor using the second encryption scheme. The processor executing the software code is permitted to access only data from the first and second portions of the virtual memory.
Wind River | Date: 2015-02-24
A system and method for configuring a virtual computing environment to operate in direct interrupt mode; receiving a triggering event triggering a transition from direct interrupt mode to virtual interrupt mode; copying contents of a physical interrupt queue into a virtual interrupt queue; acknowledging vectors present in the physical interrupt queue; and transitioning the virtual computing environment to virtual interrupt mode. The system includes a processor for performing the steps of the method.
Wind River | Date: 2015-01-15
A system and method for dynamically processing data across a plurality of processor cores in a multi-core computing environment for breaking down incoming data traffic into a plurality of segments and dynamically distribute and re-distribute the segments on an ongoing basis so as to allocate the handling of data traffic in a resource efficient manner.
Wind River | Date: 2014-01-07
A method including selecting a prospective local port from a plurality of available local ports for a computing environment; determining a hash value based on the prospective local port, the hash value being further determined based on a hash value determination method of a network interface of the computing environment; determining whether the hash value results in incoming traffic being delivered to a selected one of a plurality of cores of the computing environment; and sending data relating to an application executed by the selected core over the network interface using the prospective local port, if the hash value results in incoming traffic being delivered to the selected core.