{"id":1341,"date":"2004-10-21T00:00:00","date_gmt":"2004-10-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/metrowerks-drives-linux-towards-automotive-industry\/"},"modified":"2021-12-30T11:39:11","modified_gmt":"2021-12-30T11:39:11","slug":"metrowerks-drives-linux-towards-automotive-industry","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/metrowerks-drives-linux-towards-automotive-industry\/","title":{"rendered":"Metrowerks drives Linux towards automotive industry"},"content":{"rendered":"<p>Metrowerks, a provider of products for embedded developers, introduced Automotive Grade Linux (AGL), which will allow automotive companies to create navigation, hands-free phone and infotainment systems based on a customised version of the open-source operating system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michael O&#8217;Donnell, the director of transportation marketing at Metrowerks, said to ZDNet UK the company made changes to the Linux kernel, drivers and boot sequence to enhance its real-time capabilities, reduce power consumption and speed up boot time.<\/p>\n<p>AGL is not available for public download, but a development kit based on the customised operating system can be downloaded free of charge from the Metrowerks Web site.  &#8220;We haven&#8217;t posted AGL publicly as it won&#8217;t run without the development kit and it is custom built for only one piece of hardware.  We are working with standards bodies, and are hoping to get the Linux community behind AGL, so that a standardised version can be released in the future,&#8221; he said.<\/p>\n<p>The development kit, known as a Board Support Package (BSP), has been optimised for the Total5200 reference implementation &#8212; a development platform used by embedded developers to create prototypes of telematics systems.<\/p>\n<p>&#8220;By 2010 we expect about 40 percent of new cars to be telematics enabled.&#8221;<\/p>\n<p>http:\/\/uk.builder.com\/programming\/unix\/0,39026612,39221173,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1341","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1341"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1341\/revisions"}],"predecessor-version":[{"id":3828,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1341\/revisions\/3828"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}