« July 2013 | Main | September 2013 »

3 posts from August 2013

08/23/2013

A Turbo Shot of Java

Just as language use around the world constantly changes as time goes on, change is coming to the programming language sphere. A new era is coming in the world of computer programming, and in the embedded field, the old standards are falling to the wayside. Gone are the days of Assembly and C and here come the object-oriented C# and Java.

Our post in September 2012 highlighted the popularity of specific programming languages used on current projects. Only a few months later, VDC’s most current research highlights a growing trend toward Java use. While Java was used on projects by 22% of people polled in 2012, our most current data shows that Java use jumped to 28%.

Shotofjava

So what makes Java so popular for embedded systems and why is its adoption growing so rapidly?

One big factor in this growth is Oracle’s new focus on the embedded market with their Java Embedded Suite.  As recently as July 2013, Oracle increased the number of Java tools catered specifically to the embedded market with their updated Java Micro Edition Embedded product. Oracle is rapidly expanding their product line to cater to all types of embedded needs from resource-constrained micro-controllers to printers and televisions. As Nandini Ramani, Vice President of Java Development at Oracle, states in their July 2013 press release, “With the latest updates to our Java embedded product family, Oracle is continuing to deliver against customer requirements and key values to help drive increased growth and capabilities for connected M2M devices”. This broad applicability of Embedded Java is appealing for a programming language.

Java is also very attractive for embedded products due to its write-once-run-anywhere architecture. Since the embedded world is made up of so many different hardware platforms, an agnostic solution like Java Embedded makes it easy for programmers to write software for a wide variety of products. Efficiency is key, and Java helps makes embedded software development and rollout very efficient.

With its large base of 9 million developers, established use on billions of devices, a suite of products that caters to a wide range of embedded needs, and an architecture that can work anywhere once written, Java is becoming a very strong player in the embedded programming realm.

 

By Zach D. McCabe,

Research Assistant, M2M & Embedded Technology

08/19/2013

Trusteer Your Security to IBM: Acquisition Fortifies Security Portfolio

On August 15th, IBM (NYSE:IBM) announced it reached a deal to acquire Trusteer, a Boston-based software-security firm focusing on financial and enterprise cyberthreats. As part of the deal, IBM will absorb Trusteer’s R&D lab in Tel Aviv into its security organization. One major focal point for Trusteer is their mobile security product line, which focuses on preventing intrusion and data theft through enterprise-connected mobile devices.

Smartphones and tablets are becoming integral tools for large and small businesses alike. Mobile devices – like an iPhone equipped with the SalesForce app – are a huge benefit to employees and their employer by allowing them to work remotely and efficiently while away from the office, but these devices also introduce a new set of vulnerabilities into an organization’s security. Our data shows that a large number of these devices have exploitable security flaws that leave sensitive enterprise data vulnerable. A mobile device connected to an enterprise’s network provides a link into the organization that many aren’t adequately protecting.

This acquisition reinforces two key trends: security is an increasingly important factor for all organizations and more needs to be done to protect valuable data from theft. As the number of end-points an organization deals with increases, so does the risk for a security breach. IBM recognizes this and plans to use the Trusteer acquisition to improve its enterprise security products, but the same principles hold true in the embedded industry.

The embedded world is more connected than ever before and this trend continues to grow. Thinking back to famous malware threats such as Stuxnet infiltrating networked manufacturing platforms, it’s clear that inadequate protection of these systems is a major vulnerability to users of embedded software and hardware. Purchasing Trusteer highlights a developing industry trend: end-point protection is becoming a new priority for businesses, embedded or enterprise, in order to keep cyberthreats from harming their operations.

For more information on VDC’s research about security in the embedded industry, click here.

 

By Zach D. McCabe,

Research Assistant, M2M & Embedded Technology

08/14/2013

Groundbreaking Coverage of Connected Systems Security Market

VDC’s M2M Embedded Software & Tools Practice is pleased to announce the launch of the second edition of a groundbreaking research program that deeply explores the topic of security and the connected world.  Building upon our existing coverage of Security & The Internet of Things, this research will sort out hype from reality and help vendors, OEMs, and IT professionals alike understand exactly what is needed to secure next-generation connected systems. We recognize that there is an enormous amount of industry buzz around security, The Internet of Things, and connected systems.  But what are the unique requirements of industry-specific systems such as those used in hospitals and on factory floors? What types of security solutions are gaining traction with OEMs? What will be the most prominent internal and external risks to connected systems in the years to come? How are the roles of coding and process standards evolving to address security? What are the different technologies available to enterprises looking to launch secure applications, and what are the strengths and weaknesses of each?

We’ll be looking at these questions and many more in this study of Security & The Internet of Things.  Click here to learn more about this exciting new research program.