SlideShare a Scribd company logo
Proprietary & Confidential
The Benefits of POSIX®
Proprietary & Confidential
The Benefits of POSIX ® (Summary)
1. POSIX® Helps to Avoid Vendor Lock-in
2. POSIX® APIs are Valuable, Stable and Publicly Available
3. POSIX® Tutorials & Examples Can be Easily Found Online
4. POSIX® Increases the Number of Experienced Engineers that Can Work on Your Projects
5. POSIX® Reduces Total Cost of Ownership (TCO)
6. POSIX® Reduces Time-to-Market (TTM)
Proprietary & Confidential
What Is POSIX®?
 The POSIX Standard is a document released by IEEE
 Describes a Portable Operating System Interface based on UNIX
 Defines application programming interface (API), command line shells, and utility interfaces
for software compatibility with variants of UNIX and other operating systems
 Popular and widely deployed
 Brings powerful set of features and capabilities for embedded application development
Following slides:
“What are the benefits of POSIX® to builders of complex safety- and security-
critical embedded software systems?”
Proprietary & Confidential
1. Avoid Vendor Lock-In
 Using any software API creates dependency
 Writing applications to proprietary APIs ties applications to vendor’s operating system (OS)
 Makes changing vendors difficult or, in some cases, impossible
 Don’t use a vendor’s OS if not absolutely necessary
 Some questions to ask yourself when you start using any proprietary APIs are:
o Is the OS suitable for the real-time needs of your embedded project?
o Does the OS support the next CPU architecture you want to use?
o Worst-case: Falling-out with your vendor once they’ve locked you into their proprietary APIs…
^These scenarios are not nearly as uncommon as they should be!
Proprietary & Confidential
2. APIs are Valuable, Stable and Publicly Available
 IEEE standard published by The Open Group and available online
 No need to rely on proprietary documentation from a single-source vendor
 Expertly designed and widely standardized to promote portability.
 Port application from OS to OS, system to system, and project to project—all while
maintaining the minimum amount of rework required.
 Well-designed (origins date back to birth C at Bell Labs) and has remained stable over time
Proprietary & Confidential
3. Tutorials & Examples Can be Easily Found Online
 POSIX®-based OSs are by far the most popular and widely deployed
 Online tutorials, examples, and explanations of when you might want to use certain APIs
are a boon to engineers that are not only new to POSIX® but to those familiar with
POSIX® as well
 Examples:
o How to fork-and-exec a process to run a new application
o How to use pthread_create() to create a new thread of execution in a multi-threaded application
o How to create and use a timer for an application’s heartbeat
o Etc.
Proprietary & Confidential
4. More Experienced Engineers for Projects
 Engineering experience is a major pain point for builders of complex embedded safety- and
security-critical software systems
 Linux is based on POSIX®
o POSIX® application development experience translates from one POSIX® family OS to another
o Lots of recent graduates and university students have experience with Linux
o Large pool of experienced engineers that already program for it
 Don’t use only a few experienced engineers that can use a given set of proprietary
operating system APIs
 Don’t wait while your new engineers learn those APIs, either
When you use POSIX® to build your applications, you gain the ability to leverage
both existing and new engineering talent faster
Proprietary & Confidential
5. Reduces Total Cost of Ownership (TCO)
 Lower TCO by maintaining leverage over your vendor (switching FROM proprietary):
o If you can avoid vendor lock-in by using POSIX®, then you are not beholden to an OS vendor for
your next project
o If you had written your application with their proprietary APIs, then the OS vendor has the
leverage—not you
 Lower TCO by leveraging portability (switching TO proprietary):
o Many organizations underestimate the hidden cost of open source software, but open source
software is anything but free
o If you find that the TCO of an open source OS is too high, then having written your applications
with POSIX® will enable you to more easily switch to a proprietary OS (where the support costs
are built into the business model)
Proprietary & Confidential
6. Reduces Time-to-Market (TTM)
 A proven set of APIs speeds development, reduces engineering costs
 If an engineer gets stuck on a problem, can always turn to a vast pool of available
resources to help solve the problem
 Staff your project more easily and in a shorter amount of time (start your project sooner—
and perhaps with less expensive engineers)
A greater degree of freedom and flexibility to switch OSs and vendors at your discretion, free
and easily accessible documentation, a vast knowledge base, boosted engineering expertise,
and reduced TTM & TCO are why POSIX® is so useful to builders of large and complex safety-
and security-critical embedded systems.
Proprietary & Confidential
Thank You

More Related Content

What's hot

Introduction to ARM LPC2148
Introduction to ARM LPC2148Introduction to ARM LPC2148
Introduction to ARM LPC2148
Veera Kumar
 
Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Linux vs Windows | Edureka
Linux vs Windows | EdurekaLinux vs Windows | Edureka
Linux vs Windows | Edureka
Edureka!
 
Unit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimizationUnit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimization
leenachandra
 
Unikernels, Multikernels, Virtual Machine-based Kernels
Unikernels, Multikernels, Virtual Machine-based KernelsUnikernels, Multikernels, Virtual Machine-based Kernels
Unikernels, Multikernels, Virtual Machine-based Kernels
Martin Děcký
 
LCD Theory and Working Principles
LCD Theory and Working PrinciplesLCD Theory and Working Principles
LCD Theory and Working Principles
Robo India
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
Osler, Hoskin & Harcourt LLP
 
OSS Governance
OSS GovernanceOSS Governance
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded SystemsSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
Arti Parab Academics
 
Real Time Operating System
Real Time Operating SystemReal Time Operating System
Real Time Operating System
Sharad Pandey
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Unit III ARM Interface and ARM Programming
Unit III ARM Interface and ARM Programming Unit III ARM Interface and ARM Programming
Unit III ARM Interface and ARM Programming
Dr. Pankaj Zope
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
Usman Tariq
 
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Javier Canovas
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
Raj Pratim Bhattacharya
 
Mining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software ChangesMining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software Changes
Thomas Zimmermann
 
Memory management in vx works
Memory management in vx worksMemory management in vx works
Memory management in vx worksDhan V Sagar
 
ESP32 WiFi & Bluetooth Module - Getting Started Guide
ESP32 WiFi & Bluetooth Module - Getting Started GuideESP32 WiFi & Bluetooth Module - Getting Started Guide
ESP32 WiFi & Bluetooth Module - Getting Started Guide
handson28
 
Arm architecture
Arm architectureArm architecture

What's hot (20)

Introduction to ARM LPC2148
Introduction to ARM LPC2148Introduction to ARM LPC2148
Introduction to ARM LPC2148
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux vs Windows | Edureka
Linux vs Windows | EdurekaLinux vs Windows | Edureka
Linux vs Windows | Edureka
 
Unit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimizationUnit7 & 8 performance analysis and optimization
Unit7 & 8 performance analysis and optimization
 
Unikernels, Multikernels, Virtual Machine-based Kernels
Unikernels, Multikernels, Virtual Machine-based KernelsUnikernels, Multikernels, Virtual Machine-based Kernels
Unikernels, Multikernels, Virtual Machine-based Kernels
 
Linux
Linux Linux
Linux
 
LCD Theory and Working Principles
LCD Theory and Working PrinciplesLCD Theory and Working Principles
LCD Theory and Working Principles
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
 
OSS Governance
OSS GovernanceOSS Governance
OSS Governance
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded SystemsSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Introduction to Embedded Systems
 
Real Time Operating System
Real Time Operating SystemReal Time Operating System
Real Time Operating System
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
Unit III ARM Interface and ARM Programming
Unit III ARM Interface and ARM Programming Unit III ARM Interface and ARM Programming
Unit III ARM Interface and ARM Programming
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
Mining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software ChangesMining Version Histories to Guide Software Changes
Mining Version Histories to Guide Software Changes
 
Memory management in vx works
Memory management in vx worksMemory management in vx works
Memory management in vx works
 
ESP32 WiFi & Bluetooth Module - Getting Started Guide
ESP32 WiFi & Bluetooth Module - Getting Started GuideESP32 WiFi & Bluetooth Module - Getting Started Guide
ESP32 WiFi & Bluetooth Module - Getting Started Guide
 
Arm architecture
Arm architectureArm architecture
Arm architecture
 

Similar to The Benefits of POSIX

Moxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded ApplicationsMoxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded Applications
Digital River
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud ServicesSaurabh Gupta
 
Prasoon
PrasoonPrasoon
Prasoon
Prasoon
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
WSO2
 
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
OW2
 
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
Edge AI and Vision Alliance
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1
G R VISHAL
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentiaemedu
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentIAEME Publication
 
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel Corporation
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
matthew1001
 
Fast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWSFast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWS
Amazon Web Services
 
Understanding the Cross OS Development Platform
Understanding the Cross OS Development PlatformUnderstanding the Cross OS Development Platform
Understanding the Cross OS Development Platform
MapuSoft
 
From Fish To Fishing Rod
From Fish To Fishing RodFrom Fish To Fishing Rod
From Fish To Fishing Rod
chrisriceuk
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
F5NetworksAPJ
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
Christina Hoh
 
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
Cloudfoundry + K8S  :  Prendre le meilleur des deux mondesCloudfoundry + K8S  :  Prendre le meilleur des deux mondes
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
Erwan Bornier
 
Operator development made easy with helm
Operator development made easy with helmOperator development made easy with helm
Operator development made easy with helm
ConSol Consulting & Solutions Software GmbH
 
"Operator development made easy with Helm"
"Operator development made easy with Helm""Operator development made easy with Helm"
"Operator development made easy with Helm"
ConSol Consulting & Solutions Software GmbH
 

Similar to The Benefits of POSIX (20)

Moxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded ApplicationsMoxa white paper---Using Sample Code to Develop Embedded Applications
Moxa white paper---Using Sample Code to Develop Embedded Applications
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud Services
 
Prasoon
PrasoonPrasoon
Prasoon
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
Choosing the right business model and license - OW2con'19, June 12-13, 2019, ...
 
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
“Open Standards Unleash Hardware Acceleration for Embedded Vision,” a Present...
 
OSTS_White_Paper
OSTS_White_PaperOSTS_White_Paper
OSTS_White_Paper
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
Atmel - Next-Generation IDE: Maximizing IP Reuse [WHITE PAPER]
 
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conferenceIBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
IBM MQ Light @ Capitalware's MQTC 2.0.1.4 conference
 
Fast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWSFast, Secure Deployments with Docker on AWS
Fast, Secure Deployments with Docker on AWS
 
Understanding the Cross OS Development Platform
Understanding the Cross OS Development PlatformUnderstanding the Cross OS Development Platform
Understanding the Cross OS Development Platform
 
From Fish To Fishing Rod
From Fish To Fishing RodFrom Fish To Fishing Rod
From Fish To Fishing Rod
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
Cloudfoundry + K8S  :  Prendre le meilleur des deux mondesCloudfoundry + K8S  :  Prendre le meilleur des deux mondes
Cloudfoundry + K8S : Prendre le meilleur des deux mondes
 
Operator development made easy with helm
Operator development made easy with helmOperator development made easy with helm
Operator development made easy with helm
 
"Operator development made easy with Helm"
"Operator development made easy with Helm""Operator development made easy with Helm"
"Operator development made easy with Helm"
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

The Benefits of POSIX

  • 1. Proprietary & Confidential The Benefits of POSIX®
  • 2. Proprietary & Confidential The Benefits of POSIX ® (Summary) 1. POSIX® Helps to Avoid Vendor Lock-in 2. POSIX® APIs are Valuable, Stable and Publicly Available 3. POSIX® Tutorials & Examples Can be Easily Found Online 4. POSIX® Increases the Number of Experienced Engineers that Can Work on Your Projects 5. POSIX® Reduces Total Cost of Ownership (TCO) 6. POSIX® Reduces Time-to-Market (TTM)
  • 3. Proprietary & Confidential What Is POSIX®?  The POSIX Standard is a document released by IEEE  Describes a Portable Operating System Interface based on UNIX  Defines application programming interface (API), command line shells, and utility interfaces for software compatibility with variants of UNIX and other operating systems  Popular and widely deployed  Brings powerful set of features and capabilities for embedded application development Following slides: “What are the benefits of POSIX® to builders of complex safety- and security- critical embedded software systems?”
  • 4. Proprietary & Confidential 1. Avoid Vendor Lock-In  Using any software API creates dependency  Writing applications to proprietary APIs ties applications to vendor’s operating system (OS)  Makes changing vendors difficult or, in some cases, impossible  Don’t use a vendor’s OS if not absolutely necessary  Some questions to ask yourself when you start using any proprietary APIs are: o Is the OS suitable for the real-time needs of your embedded project? o Does the OS support the next CPU architecture you want to use? o Worst-case: Falling-out with your vendor once they’ve locked you into their proprietary APIs… ^These scenarios are not nearly as uncommon as they should be!
  • 5. Proprietary & Confidential 2. APIs are Valuable, Stable and Publicly Available  IEEE standard published by The Open Group and available online  No need to rely on proprietary documentation from a single-source vendor  Expertly designed and widely standardized to promote portability.  Port application from OS to OS, system to system, and project to project—all while maintaining the minimum amount of rework required.  Well-designed (origins date back to birth C at Bell Labs) and has remained stable over time
  • 6. Proprietary & Confidential 3. Tutorials & Examples Can be Easily Found Online  POSIX®-based OSs are by far the most popular and widely deployed  Online tutorials, examples, and explanations of when you might want to use certain APIs are a boon to engineers that are not only new to POSIX® but to those familiar with POSIX® as well  Examples: o How to fork-and-exec a process to run a new application o How to use pthread_create() to create a new thread of execution in a multi-threaded application o How to create and use a timer for an application’s heartbeat o Etc.
  • 7. Proprietary & Confidential 4. More Experienced Engineers for Projects  Engineering experience is a major pain point for builders of complex embedded safety- and security-critical software systems  Linux is based on POSIX® o POSIX® application development experience translates from one POSIX® family OS to another o Lots of recent graduates and university students have experience with Linux o Large pool of experienced engineers that already program for it  Don’t use only a few experienced engineers that can use a given set of proprietary operating system APIs  Don’t wait while your new engineers learn those APIs, either When you use POSIX® to build your applications, you gain the ability to leverage both existing and new engineering talent faster
  • 8. Proprietary & Confidential 5. Reduces Total Cost of Ownership (TCO)  Lower TCO by maintaining leverage over your vendor (switching FROM proprietary): o If you can avoid vendor lock-in by using POSIX®, then you are not beholden to an OS vendor for your next project o If you had written your application with their proprietary APIs, then the OS vendor has the leverage—not you  Lower TCO by leveraging portability (switching TO proprietary): o Many organizations underestimate the hidden cost of open source software, but open source software is anything but free o If you find that the TCO of an open source OS is too high, then having written your applications with POSIX® will enable you to more easily switch to a proprietary OS (where the support costs are built into the business model)
  • 9. Proprietary & Confidential 6. Reduces Time-to-Market (TTM)  A proven set of APIs speeds development, reduces engineering costs  If an engineer gets stuck on a problem, can always turn to a vast pool of available resources to help solve the problem  Staff your project more easily and in a shorter amount of time (start your project sooner— and perhaps with less expensive engineers) A greater degree of freedom and flexibility to switch OSs and vendors at your discretion, free and easily accessible documentation, a vast knowledge base, boosted engineering expertise, and reduced TTM & TCO are why POSIX® is so useful to builders of large and complex safety- and security-critical embedded systems.