Login   |   1.866.392.4897 |   sales@timesys.com        English Japanese German French Korean Chinese (Simplified) Chinese (Traditional)
Stay in your workflow with Command Line Interface for Timesys’ Embedded Board Farm

Stay in your workflow with Command Line Interface for Timesys’ Embedded Board Farm

 

 

Timesys’ Embedded Board Farm (EBF) lets you seamlessly access your hardware boards from anywhere as if it were right next to you. And we’ve just made it even easier and more convenient by adding our command line interface (CLI).

This provides embedded software engineers with two major benefits:

  1. Stay in your preferred workflow: the EBF CLI allows you to do all your work using your preferred tools (shell, emacs, vim, etc.) without opening a web browser. It allows you to easily open up remote serial debug sessions without having to look up networking information, as if the device was local. Just use your own terminal emulator with all of your preferred settings (colors, fonts, modifier keys, etc.).
  2. Automation: No more mundane steps to slow you down every time you build. You can easily write commands in a script and run a series of commands to automate your work.

    Want to see how? Take it from Kitty Drake:

The CLI provides access to these Embedded Board Farm functions for automation and integration with third-party tools like test automation frameworks like Fuego and CI systems like Jenkins:

  • Device Management
  • Console Access
  • Power Control
  • Hotplug Control
  • GPIO Access
  • Image Management
    • Netboot
    • SDCard Boot
    • USB Boot
  • SDCard and USB
    • Formatting and Partitioning
    • Backup
  • File Upload / Download from Device
  • Command Execution on Device
  • EBF Server File Management

Want to see how the CLI for EBF can enhance your remote work experience? Take a deeper dive into Timesys’ Embedded Board Farm here, and schedule a demo here: www.timesys.com/open-source-embedded/board-farm/#schedule-demo

 

Leah Simoncelli is the Digital & Community Engagement Manager at Timesys. Additionally, she runs a global pitch competition for hardware startups with Innovation Works, one of the most active seed stage investors in the country. She has over a decade of experience in marketing, management and communication and holds a BA from American University in Washington, DC.

About Timesys

Timesys has extensive experience with embedded system development and lifecycle management. Timesys has been instrumental in working with global leader semiconductor manufacturers with smart, quick and quality solutions for highly complex systems with accelerated product innovation and multiple product variants.

Evaluating vulnerability tools for embedded Linux devices

Evaluating vulnerability tools for embedded Linux devices

 

 

Monitoring and managing vulnerabilities in embedded Linux devices presents a unique set of needs that traditional IT vulnerability tools fail to address and result in wasted efforts chasing false positives and inefficiencies due to cumbersome workflows. After evaluating multiple IT cybersecurity tools, we at Timesys ended up creating a vulnerability management tool called Vigiles, which is optimized for embedded devices. This blog aims to share the lessons learned and how the right tool can bring your security maintenance cost down while improving the security posture of the device.

Continue reading “Evaluating vulnerability tools for embedded Linux devices” »

Best practices for triaging Common Vulnerabilities & Exposures (CVEs) in embedded systems: Top Three Questions Answered

Best practices for triaging Common Vulnerabilities & Exposures (CVEs) in embedded systems: Top Three Questions Answered

 

 

Keeping embedded system products secure requires ongoing, constant monitoring and management of Common Vulnerabilities and Exposures (CVEs) throughout the production lifecycle.

With the constant flood of CVEs reported each week, you need to have a process for understanding the exposure of your embedded system devices to cybersecurity exploits. It is important to see how CVEs apply to your product so you can quickly address the vulnerabilities that pose the greatest risk.

Continue reading “Best practices for triaging Common Vulnerabilities & Exposures (CVEs) in embedded systems: Top Three Questions Answered” »

Vulnerability management and triaging

Vulnerability management and triaging

 

 

With 300+ vulnerabilities being reported weekly in the US National Vulnerability Database (NVD), it is more challenging than ever to maintain the security of open source and third-party software used in embedded system products. One common approach to tackle the problem is to adopt a risk-based vulnerability management strategy in which vulnerabilities that pose the highest risk to your organization are remediated first. This blog outlines how to establish such an process as part of your software development lifecycle while keeping the maintenance cost and risk of exposure low.

Continue reading “Vulnerability management and triaging” »

Webinar with NXP: CVE triage best practices for efficient vulnerability mitigation

Webinar with NXP: CVE triage best practices for efficient vulnerability mitigation

 

 

Securing your embedded system devices is no longer just a final step in product development.

Security today must be a continuous process, a focus at every stage of your software development, release and maintenance cycles.

That’s because today’s vulnerability environment is radically different from the past. Hundreds of vulnerabilities that may or may not affect your products come to light every week.

Continue reading “Webinar with NXP: CVE triage best practices for efficient vulnerability mitigation” »

Vigiles Quick Start … because securing your products doesn’t have to be hard

Vigiles Quick Start … because securing your products doesn’t have to be hard

 

 

There is an old saying among cybersecurity vulnerability management practitioners:

The “good guys” have to get it right every time.

The “bad guys” have to get it right only once.

That means that the “good guys” — the security professionals whose mission is to keep corporate data safe — need to monitor, analyze and respond to every vulnerability that puts their systems, users and data at risk.

Continue reading “Vigiles Quick Start … because securing your products doesn’t have to be hard” »

Assessing CVE exposure and mitigation effort to reduce embedded system product cybersecurity risk

Assessing CVE exposure and mitigation effort to reduce embedded system product cybersecurity risk

 

 

Embedded system security has never been more important. Rising cyberattacks against embedded systems are increasingly putting devices and customers at risk of compromise.

Continue reading “Assessing CVE exposure and mitigation effort to reduce embedded system product cybersecurity risk” »

BSP Lifecycle Maintenance: Top Three Questions Answered

BSP Lifecycle Maintenance: Top Three Questions Answered

 

 

Security is critical throughout the lifetime of an embedded system. Continually changing threat environments, new deployment modes and third-party software updates mean that the BSP software for an embedded system device can no longer remain static and “frozen.”

Continue reading “BSP Lifecycle Maintenance: Top Three Questions Answered” »

Vigiles Enhancements: Software Composition Analysis (SCA) & CVE Mitigation for Stronger Embedded System Security

Vigiles Enhancements: Software Composition Analysis (SCA) & CVE Mitigation for Stronger Embedded System Security

 

 

A giant list of vulnerabilities does little to help you bring more secure products to market.

What matters is how you filter the list, triage the vulnerabilities, and mitigate the ones that pose the greatest risk.

That’s why the new enhancements to our Timesys Vigiles Security Monitoring & Management Service will enable you to develop more secure embedded system products today and maintain stronger product security throughout their lifecycles.

Continue reading “Vigiles Enhancements: Software Composition Analysis (SCA) & CVE Mitigation for Stronger Embedded System Security” »

Stop Chasing Vulnerability Ghosts: Why efficient vulnerability detection is essential to medical device security

Stop Chasing Vulnerability Ghosts: Why efficient vulnerability detection is essential to medical device security

 

 

To detect and correct vulnerabilities, eliminate false positives and prioritize the rest

Every embedded system device maker should want to make security a selling point, preventing breaches or exploits, not an embarrassment if a security problem occurs.

But nothing equals the liability and regulatory risk associated with medical devices.

Continue reading “Stop Chasing Vulnerability Ghosts: Why efficient vulnerability detection is essential to medical device security” »

Click to Hide Advanced Floating Content

Reduce Embedded System
Cybersecurity Risk