View in browser
elisa.techwp-contentuploadssites75201810logo_elisa-1

The ELISA Project hosted at The Linux Foundation aims to make it easier for companies to build and certify Linux-based safety-critical applications – systems whose failure could result in loss of human life, significant property damage or environmental damage.

Join us at OSSNA, Vancouver + Virtual

Several ELISA community members will be sharing their work at Open Source Summit North America taking place in Vancouver and virtually June 10-12. Don't miss these sessions below if you're involved in the intersection between safety and open source development.

  • ELISA Mini Summit: project overview, automotive and aerospace use cases, discovering kernel subsystems in use, and more.  
  • How Do You Know You're Done - After a Security Fix? Kate Stewart, The Linux Foundation & Pete Brink, UL Solutions
  • Reproducible Multi Element System Composition with Linux, Xen & Zephyr - Philipp Ahmann, Robert Bosch GmbH
  • A Development Environment for DO-178C Level D Certified Linux - Chuck Wolber, The Boeing Company

For additional sessions with safety-critical considerations, please go here.

Add ELISA Mini Summit to OSSNA

Safety-Critical Software Summit at EOSS

As open source is found more and more in safety-critical applications, the need to evaluate open source software that meets safety standards has increased. The Safety-Critical Software Summit, part of Embedded Open Source Summit (EOSS), taking place in Prague and virtually, June 27-30, gathers safety experts and open source developers to enable and advance the use of open source in safety-critical applications. 

  • EOSS schedule is live including almost 10 sessions in the dedicated safety-critical track.
  • Several safety-critical track speakers are ELISA community members from The Boeing Company, Codethink, Intel, Robert Bosch GmbH, The Linux Foundation, and more.  
Register to attend EOSS >>
ELISA CI blog

CI enablement for easier collaboration

Do you know that the ELISA Project has enabled Continuous Integration (CI) to make it easier for others to onboard to the project, to experience deliverables from the various working groups, and to make the work reproducible and more dependable.  In this post, Philipp Ahmann and Sudip Mukherjee write about how CI has been enabled using the Automotive Working Group use case as an example.

Read more about ELISA CI >>
ELISA tracing blog

Discovery kernel subsystems used by a workload

The ELISA Medical Devices Working Group set out to identity methodology to discover system resources necessary to build and run workload and document the process. The result, the workload-tracing guide, authored by Shuah Khan and Shefali Sharma, is intended to be used as a guide on how to gather fine-grained information on the resources in use by workloads using strace.

  • The guide has also been put into practice with the Automotive Working Group use case analysis focusing on safety critical display rendering.
  • The guide has been upstreamed and is now available in Linux 6.3 release.
Check out workload-tracing guide >>

Missed any talks? 

  • ELISA at FOSDEM (watch the video on demand)
  • Tell-Tale Mysteries: ELISA and Needlefish in the Functional-Safety Hollow (session slides are available for download)
  • And more video content on the ELISA YouTube channel

Open invitation - get involved and start contributing

Get Involved in ELISA Community

 As an open source project, ELISA welcomes contributors globally to participate in the project community and collaborate with others to bridge the gap between functional safety and Linux kernel development velocity in order to advance open source in safety-critical systems. There are a variety of ways to participate and contribute including:

  • Join our mailing lists
  • Attend community meetings
  • Contribute to documentation
  • Collaborate in Working Groups
  • Meet Us at Events
Website
Email
Twitter
LinkedIn
YouTube

This email was sent by: ELISA

548 Market St, PMB 57274, San Francisco, CA 94104-5401, United States

Subscription Center