The new COM standard for High Performance Computing
The usage of standardized Computer-on-Modules in the embedded market shows a long history of success – the best example is COM Express®, the successful and worldwide leading standard for Computer-on-Modules since 2005.
Kontron is a global leader in embedded computing technology (ECT). As a part of technology group S&T, Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications. Kontron is a global leader in embedded computing technology (ECT). As a part of technology group S&T, Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications. Kontron, a maker of embedded computers, finalized its acquisition of Thales Computers in March. Both companies have U.S. Offices, and are heavily involved in real-time embedded computing for. WDL Systems distributes a full line of solutions for Industrial IoT and Edge Computing applications. Products include industrial PC systems, computer on modules, single board computers, industrial flash storage, 3D Printers, wireless data infrastructure, as well as measurement and automation.
However today the embedded market is facing new challenges.
Applications such as artificial intelligence, the upcoming 5G wireless standard come with enormous data hunger and require more computing power. This also requires new concepts for embedded computers: existing standards will no longer be sufficient to cope with the growing embedded market demands.
Leading manufacturers in the industry, such as Kontron, have set up a new working group in the PICMG standardization committee to make the COM standard fit for the future. Computer-On-Modules High Performance Computing - COM HPC - will be complementary to the existing COM Express® standard.
Learn more about the new COM standard: COM-HPC Introduction
Kontron Embedded Laptops Software
Kontron products 'Powered by SEC-Line' feature:
Kontron Embedded Laptops Wireless
Hardware Root Of Trust: all passwords, encryption keys and certificates within TPM
- TPM-based Secure Boot preventing device refactoring
- Measured boot using TPM hashing mechanism allowing Remote attestation
- AppProtect technology for software licensing
Complete router/firewall based on OpenWrt
- Control of device networking (wired, wireless, LTE, VPN)
- Remote management of configations via OpCenter
- Health monitoring engine, HIDS, etc.
Cyber Defense techniques
- Monitoring Access Control: AppArmor restritcs software to only known usage patterns, seriously limiting the impact of exploits.
- Host Intrusion Detection Service: OSSEC, intrusions detection, Blocking Brute Force Attacks.
Centralised management of all system settings
virtual machines support based on qemu
- standard computing vms : protect legacy unprotected payloads behind sec-line embedded firewall and router
- complex devops stacks : enclose dynamic payloads inside a vm and control their resource consumption
- intelligent network vms : direct management of modems can be given to such a vm, just like on bare metal implementations, bypassing sec-line firmware