Edge AI: Finding the right Edge for your AI
It’s estimated there’ll be over 30 billion active IoT devices in 2025, up from 12 billion in 2020. This dramatic growth is mirrored in the demand for Edge AI. In our […]
For many applications, Linux is the most time and cost-effective choice for an embedded system – much more so than using an embedded RTOS that may lack the networking and device drivers support required.
But embedded Linux is considerably more complicated to use than most embedded RTOSs. It requires a specialist boot loader, such as uBoot, and a file system. It has complex configuration and hardening requirements, and typically needs an application environment and upgrade system.
Curious about Embedded Linux? Get in touch.
We’ve used embedded Linux on a range of architectures and in a variety of secure, reliable embedded products. Low-level tasks that we’ve implemented to meet real-time requirements include:
Many product implementations require custom Linux distributions and board support packages (BSP). Tools that we use every day include buildroot, yocto, open embedded, bitbake and more.
Curious about Embedded Linux? Get in touch.
The downside of the flexible and feature-rich environment that Linux offers is the many attack surfaces that it exposes. Embedded Linux devices are an attractive target for botnets and other cyberattacks.
Linux has numerous in-built security features. But silicon vendors usually supply their developer Linux environment or BSP with all features, developer tools and ‘root’ privileges enabled. This gives the developer maximum functionality, but it means reconfiguration and hardening must be done before a product can be deployed.
Configuring Linux requires finding the balance between the right level of security while enabling the features that the application needs. We’ve hardened the Linux systems in many premium consumer products that are deployed in their millions by major operators. Our configuration work includes:
When appropriate, we recommend using a security-enhanced version of Linux such as SELinux.
We can audit software for security and provide auditing and guidance on open-source software (OSS) licence requirements and use in projects, using tools such as Black Duck and Coverity.
Curious about Linux Security? Get in touch.
Linux enables a wide choice of user interface frameworks.
One of the most powerful frameworks is Qt. It provides extensive development tools for rapid user interface design, supports sophisticated features such as animations, and uses 3D acceleration. A C-based alternative to Qt is GTK+.
A popular alternative approach is to use a web-based environment, such as Flutter or React Native, or nodeJS combined with a preferred native graphics library – we’ve built and worked with all these environments.
For a truly web-centric approach, we can integrate a browser, such as the Chromium web engine included with Qt, or implement the WPE Webkit browser. Both browsers support a plugin framework that enables interaction with embedded features.
We provide support for all these user interface approaches – and more.
Our thoughts, ideas and views as well as in-depth technical papers. Explore our insights, get to market faster and make your digital ambitions a reality.
It’s estimated there’ll be over 30 billion active IoT devices in 2025, up from 12 billion in 2020. This dramatic growth is mirrored in the demand for Edge AI. In our […]
In the case of AI, big is not always better. This article explores the benefits of Edge AI and how to get started.
Consult Red and Skyworth collaborate to drastically cut costs and time to market for operators.
Send an enquiry below and a member of our friendly team will get back in touch with you shortly.