Feeds

IBM digs in with Eclipse for weapons

It's... 'complex'

Protecting against web application threats using SSL

IBM Rational has released an Eclipse-based tools package taking the unit back to its roots serving embedded software in an area it's calling “complex” systems – otherwise known as weapons systems.

Launching the clumsily titled Rational System Development Solution (SDS) IBM put it more euphemistically, of course. "In the aerospace and defense industry, for example, the net-centric environment of the battlefield requires manufacturers to create products that deliver advanced capabilities to the front lines fast," IBM said

The same tools could, of course, be equally well be used in other industries where there is a demand for resilient software - such as automotive. The emphasis in embedded system is on reliability and robustness, and the SDS portfolio reflects this.

The suite, following Red Hat's JBoss Eclipse announcement on Monday, includes the Eclipse-based IBM Rational Systems Developer and IBM Rational Software Modeler design and development tools that use Unified Modeling Language (UML) 2.1 to help build high-quality software. Both products have been upgraded to support the UML Profile for DoDAF and MoDAF (UPDM) standards. Specified by the Object Management Group (OMG), UPDM aims to define a common language to describe software architectures.

The SDS also includes the IBM Rational Test Real-Time to enable developers to ensure the quality and reliability of real-time and embedded systems, and to comply with industry standards such as DO-178B, MISRA and Defense Standard 00-55 and solutions. IBM Rational said Test Real-Time combines static analysis with component testing and runtime analysis across multiple host and target platforms including C, C++, Ada and Java J2SE.

IBM is taking a renewed focus on embedded systems these days, as evidenced by its proposed acquisition of Telelogic. Completion of the Telelogic deal is under review by the European Union and completion was expected this month but is now delayed indefinitely.

The two companies were working on rival proposals for UPDM - one based on SysML and one on UML - until earlier this year when the two were combined.®

The next step in data security

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.