SlideShare une entreprise Scribd logo
1  sur  10
Proprietary & Confidential
The Benefits of POSIX®
Proprietary & Confidential
The Benefits of POSIX ® (Summary)
1. POSIX® Helps to Avoid Vendor Lock-in
2. POSIX® APIs are Valuable, Stable and Publicly Available
3. POSIX® Tutorials & Examples Can be Easily Found Online
4. POSIX® Increases the Number of Experienced Engineers that Can Work on Your Projects
5. POSIX® Reduces Total Cost of Ownership (TCO)
6. POSIX® Reduces Time-to-Market (TTM)
Proprietary & Confidential
What Is POSIX®?
 The POSIX Standard is a document released by IEEE
 Describes a Portable Operating System Interface based on UNIX
 Defines application programming interface (API), command line shells, and utility interfaces
for software compatibility with variants of UNIX and other operating systems
 Popular and widely deployed
 Brings powerful set of features and capabilities for embedded application development
Following slides:
“What are the benefits of POSIX® to builders of complex safety- and security-
critical embedded software systems?”
Proprietary & Confidential
1. Avoid Vendor Lock-In
 Using any software API creates dependency
 Writing applications to proprietary APIs ties applications to vendor’s operating system (OS)
 Makes changing vendors difficult or, in some cases, impossible
 Don’t use a vendor’s OS if not absolutely necessary
 Some questions to ask yourself when you start using any proprietary APIs are:
o Is the OS suitable for the real-time needs of your embedded project?
o Does the OS support the next CPU architecture you want to use?
o Worst-case: Falling-out with your vendor once they’ve locked you into their proprietary APIs…
^These scenarios are not nearly as uncommon as they should be!
Proprietary & Confidential
2. APIs are Valuable, Stable and Publicly Available
 IEEE standard published by The Open Group and available online
 No need to rely on proprietary documentation from a single-source vendor
 Expertly designed and widely standardized to promote portability.
 Port application from OS to OS, system to system, and project to project—all while
maintaining the minimum amount of rework required.
 Well-designed (origins date back to birth C at Bell Labs) and has remained stable over time
Proprietary & Confidential
3. Tutorials & Examples Can be Easily Found Online
 POSIX®-based OSs are by far the most popular and widely deployed
 Online tutorials, examples, and explanations of when you might want to use certain APIs
are a boon to engineers that are not only new to POSIX® but to those familiar with
POSIX® as well
 Examples:
o How to fork-and-exec a process to run a new application
o How to use pthread_create() to create a new thread of execution in a multi-threaded application
o How to create and use a timer for an application’s heartbeat
o Etc.
Proprietary & Confidential
4. More Experienced Engineers for Projects
 Engineering experience is a major pain point for builders of complex embedded safety- and
security-critical software systems
 Linux is based on POSIX®
o POSIX® application development experience translates from one POSIX® family OS to another
o Lots of recent graduates and university students have experience with Linux
o Large pool of experienced engineers that already program for it
 Don’t use only a few experienced engineers that can use a given set of proprietary
operating system APIs
 Don’t wait while your new engineers learn those APIs, either
When you use POSIX® to build your applications, you gain the ability to leverage
both existing and new engineering talent faster
Proprietary & Confidential
5. Reduces Total Cost of Ownership (TCO)
 Lower TCO by maintaining leverage over your vendor (switching FROM proprietary):
o If you can avoid vendor lock-in by using POSIX®, then you are not beholden to an OS vendor for
your next project
o If you had written your application with their proprietary APIs, then the OS vendor has the
leverage—not you
 Lower TCO by leveraging portability (switching TO proprietary):
o Many organizations underestimate the hidden cost of open source software, but open source
software is anything but free
o If you find that the TCO of an open source OS is too high, then having written your applications
with POSIX® will enable you to more easily switch to a proprietary OS (where the support costs
are built into the business model)
Proprietary & Confidential
6. Reduces Time-to-Market (TTM)
 A proven set of APIs speeds development, reduces engineering costs
 If an engineer gets stuck on a problem, can always turn to a vast pool of available
resources to help solve the problem
 Staff your project more easily and in a shorter amount of time (start your project sooner—
and perhaps with less expensive engineers)
A greater degree of freedom and flexibility to switch OSs and vendors at your discretion, free
and easily accessible documentation, a vast knowledge base, boosted engineering expertise,
and reduced TTM & TCO are why POSIX® is so useful to builders of large and complex safety-
and security-critical embedded systems.
Proprietary & Confidential
Thank You

Contenu connexe

Tendances

Static partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-VStatic partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-VRISC-V International
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMwarertchandu
 
OpenWrt From Top to Bottom
OpenWrt From Top to BottomOpenWrt From Top to Bottom
OpenWrt From Top to BottomKernel TLV
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
LCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLinaro
 
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edgeTSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edgeAndrei Kholodnyi
 
Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!SebastienSEYMARC
 
An Introduction to PC-Lint
An Introduction to PC-LintAn Introduction to PC-Lint
An Introduction to PC-LintRalf Holly
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304Linaro
 
Linux on ARM 64-bit Architecture
Linux on ARM 64-bit ArchitectureLinux on ARM 64-bit Architecture
Linux on ARM 64-bit ArchitectureRyo Jin
 
The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)Atish Patra
 
Lcu14 107- op-tee on ar mv8
Lcu14 107- op-tee on ar mv8Lcu14 107- op-tee on ar mv8
Lcu14 107- op-tee on ar mv8Linaro
 
[Container Plumbing Days 2023] Why was nerdctl made?
[Container Plumbing Days 2023] Why was nerdctl made?[Container Plumbing Days 2023] Why was nerdctl made?
[Container Plumbing Days 2023] Why was nerdctl made?Akihiro Suda
 
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...How we got to 1 millisecond latency in 99% under repair, compaction, and flus...
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...ScyllaDB
 

Tendances (20)

QNX Sales Engineering Presentation
QNX Sales Engineering PresentationQNX Sales Engineering Presentation
QNX Sales Engineering Presentation
 
Static partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-VStatic partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-V
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMware
 
Open j9 jdk on RISC-V
Open j9 jdk on RISC-VOpen j9 jdk on RISC-V
Open j9 jdk on RISC-V
 
OpenWrt From Top to Bottom
OpenWrt From Top to BottomOpenWrt From Top to Bottom
OpenWrt From Top to Bottom
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
LCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted Firmware
 
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edgeTSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
 
Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!Admission controllers - PSP, OPA, Kyverno and more!
Admission controllers - PSP, OPA, Kyverno and more!
 
Embedded Linux
Embedded LinuxEmbedded Linux
Embedded Linux
 
An Introduction to PC-Lint
An Introduction to PC-LintAn Introduction to PC-Lint
An Introduction to PC-Lint
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
 
Linux on ARM 64-bit Architecture
Linux on ARM 64-bit ArchitectureLinux on ARM 64-bit Architecture
Linux on ARM 64-bit Architecture
 
The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)The future of RISC-V Supervisor Binary Interface(SBI)
The future of RISC-V Supervisor Binary Interface(SBI)
 
Qnx
QnxQnx
Qnx
 
Lcu14 107- op-tee on ar mv8
Lcu14 107- op-tee on ar mv8Lcu14 107- op-tee on ar mv8
Lcu14 107- op-tee on ar mv8
 
[Container Plumbing Days 2023] Why was nerdctl made?
[Container Plumbing Days 2023] Why was nerdctl made?[Container Plumbing Days 2023] Why was nerdctl made?
[Container Plumbing Days 2023] Why was nerdctl made?
 
QNX OS
QNX OSQNX OS
QNX OS
 
BeagleBone Black Booting Process
BeagleBone Black Booting ProcessBeagleBone Black Booting Process
BeagleBone Black Booting Process
 
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...How we got to 1 millisecond latency in 99% under repair, compaction, and flus...
How we got to 1 millisecond latency in 99% under repair, compaction, and flus...
 

Similaire à Benefits of POSIX® for Safety-Critical Embedded Systems

Moxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded ApplicationsMoxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded ApplicationsDigital River
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud ServicesSaurabh Gupta
 
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...OW2
 
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...Edge AI and Vision Alliance
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1G R VISHAL
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentIAEME Publication
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentiaemedu
 
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]Atmel Corporation
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferencematthew1001
 
Fast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWSFast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWSAmazon Web Services
 
Understanding the Cross OS Development Platform
Understanding the Cross OS Development PlatformUnderstanding the Cross OS Development Platform
Understanding the Cross OS Development PlatformMapuSoft
 
From Fish To Fishing Rod
From Fish To Fishing RodFrom Fish To Fishing Rod
From Fish To Fishing Rodchrisriceuk
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deploymentChristina Hoh
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deploymentF5NetworksAPJ
 
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
Cloudfoundry + K8S  :  Prendre le meilleur des deux mondesCloudfoundry + K8S  :  Prendre le meilleur des deux mondes
Cloudfoundry + K8S : Prendre le meilleur des deux mondesErwan Bornier
 

Similaire à Benefits of POSIX® for Safety-Critical Embedded Systems (20)

Moxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded ApplicationsMoxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded Applications
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud Services
 
Prasoon
PrasoonPrasoon
Prasoon
 
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
 
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
 
OSTS_White_Paper
OSTS_White_PaperOSTS_White_Paper
OSTS_White_Paper
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
 
Fast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWSFast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWS
 
Understanding the Cross OS Development Platform
Understanding the Cross OS Development PlatformUnderstanding the Cross OS Development Platform
Understanding the Cross OS Development Platform
 
From Fish To Fishing Rod
From Fish To Fishing RodFrom Fish To Fishing Rod
From Fish To Fishing Rod
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
Cloudfoundry + K8S  :  Prendre le meilleur des deux mondesCloudfoundry + K8S  :  Prendre le meilleur des deux mondes
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
 
Operator development made easy with helm
Operator development made easy with helmOperator development made easy with helm
Operator development made easy with helm
 
"Operator development made easy with Helm"
"Operator development made easy with Helm""Operator development made easy with Helm"
"Operator development made easy with Helm"
 
"Operator development made easy with Helm"
"Operator development made easy with Helm""Operator development made easy with Helm"
"Operator development made easy with Helm"
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Benefits of POSIX® for Safety-Critical Embedded Systems

  • 1. Proprietary & Confidential The Benefits of POSIX®
  • 2. Proprietary & Confidential The Benefits of POSIX ® (Summary) 1. POSIX® Helps to Avoid Vendor Lock-in 2. POSIX® APIs are Valuable, Stable and Publicly Available 3. POSIX® Tutorials & Examples Can be Easily Found Online 4. POSIX® Increases the Number of Experienced Engineers that Can Work on Your Projects 5. POSIX® Reduces Total Cost of Ownership (TCO) 6. POSIX® Reduces Time-to-Market (TTM)
  • 3. Proprietary & Confidential What Is POSIX®?  The POSIX Standard is a document released by IEEE  Describes a Portable Operating System Interface based on UNIX  Defines application programming interface (API), command line shells, and utility interfaces for software compatibility with variants of UNIX and other operating systems  Popular and widely deployed  Brings powerful set of features and capabilities for embedded application development Following slides: “What are the benefits of POSIX® to builders of complex safety- and security- critical embedded software systems?”
  • 4. Proprietary & Confidential 1. Avoid Vendor Lock-In  Using any software API creates dependency  Writing applications to proprietary APIs ties applications to vendor’s operating system (OS)  Makes changing vendors difficult or, in some cases, impossible  Don’t use a vendor’s OS if not absolutely necessary  Some questions to ask yourself when you start using any proprietary APIs are: o Is the OS suitable for the real-time needs of your embedded project? o Does the OS support the next CPU architecture you want to use? o Worst-case: Falling-out with your vendor once they’ve locked you into their proprietary APIs… ^These scenarios are not nearly as uncommon as they should be!
  • 5. Proprietary & Confidential 2. APIs are Valuable, Stable and Publicly Available  IEEE standard published by The Open Group and available online  No need to rely on proprietary documentation from a single-source vendor  Expertly designed and widely standardized to promote portability.  Port application from OS to OS, system to system, and project to project—all while maintaining the minimum amount of rework required.  Well-designed (origins date back to birth C at Bell Labs) and has remained stable over time
  • 6. Proprietary & Confidential 3. Tutorials & Examples Can be Easily Found Online  POSIX®-based OSs are by far the most popular and widely deployed  Online tutorials, examples, and explanations of when you might want to use certain APIs are a boon to engineers that are not only new to POSIX® but to those familiar with POSIX® as well  Examples: o How to fork-and-exec a process to run a new application o How to use pthread_create() to create a new thread of execution in a multi-threaded application o How to create and use a timer for an application’s heartbeat o Etc.
  • 7. Proprietary & Confidential 4. More Experienced Engineers for Projects  Engineering experience is a major pain point for builders of complex embedded safety- and security-critical software systems  Linux is based on POSIX® o POSIX® application development experience translates from one POSIX® family OS to another o Lots of recent graduates and university students have experience with Linux o Large pool of experienced engineers that already program for it  Don’t use only a few experienced engineers that can use a given set of proprietary operating system APIs  Don’t wait while your new engineers learn those APIs, either When you use POSIX® to build your applications, you gain the ability to leverage both existing and new engineering talent faster
  • 8. Proprietary & Confidential 5. Reduces Total Cost of Ownership (TCO)  Lower TCO by maintaining leverage over your vendor (switching FROM proprietary): o If you can avoid vendor lock-in by using POSIX®, then you are not beholden to an OS vendor for your next project o If you had written your application with their proprietary APIs, then the OS vendor has the leverage—not you  Lower TCO by leveraging portability (switching TO proprietary): o Many organizations underestimate the hidden cost of open source software, but open source software is anything but free o If you find that the TCO of an open source OS is too high, then having written your applications with POSIX® will enable you to more easily switch to a proprietary OS (where the support costs are built into the business model)
  • 9. Proprietary & Confidential 6. Reduces Time-to-Market (TTM)  A proven set of APIs speeds development, reduces engineering costs  If an engineer gets stuck on a problem, can always turn to a vast pool of available resources to help solve the problem  Staff your project more easily and in a shorter amount of time (start your project sooner— and perhaps with less expensive engineers) A greater degree of freedom and flexibility to switch OSs and vendors at your discretion, free and easily accessible documentation, a vast knowledge base, boosted engineering expertise, and reduced TTM & TCO are why POSIX® is so useful to builders of large and complex safety- and security-critical embedded systems.