HARMAN's Device Virtualization enables the head unit to run both Operating Systems (OS) proposing large sets of features for infotainment and entertainment, performant and real-time operating systems for critical and Safety purposes, such as digital cluster or autonomous driving, on a single board.
HARMAN's Hypervisor is OS-agnostic, not tied to an OS. It had a very small footprint and highly designed for performance.
It allocates resources based on OS needs and pre-defined priorities.
Advanced Security Mechanisms HARMAN's Device Virtualization proposes a wide range of security mechanisms at all levels, whether it is at boot time. Inter-domain communication, communication between a secure world and a non-secure one. The domains run together on the same board while being isolated from each other.
HARMAN's Device Virtualization allows sharing hardware resources (Networks, graphics, multimedia, audio, camera) from isolated domains. It can also allow some exclusive access from a domain to specific hardware devices.
With the help of all ASIL B certified Hypervisor, the critical Guest Operating Systems continue working in native mode, while collocated with non-safety critical ones.
The Software Update Management capabilities of HARMAN helps Automotive OEMs and Suppliers to capitalize on the full business potential of connected cars by enhancing driver experience with rapid deployment of value-added in-vehicle services, minimizing costs through improved efficiency and a reduction in recalls.READ MORE
HARMAN Remote Vehicle Updating Service enables Over-the-Air (OTA) updates and management of the entire vehicle, from head unit to the smallest ECUs, and even includes those units with low processing and memory resources. The solution leverages its unique Smart Delta technology which reduces the file update package up to 99 percent.READ MORE
HARMAN Device Management & Settings capabilities are involved in the remote management, monitoring, analysis and configuration of connected devices. The set of functions and capabilities enables the System Administrator to actively monitor all connected devices while building and maintaining an accurate and valuable real-time database of these devices, their software configuration and their status.READ MORE
No matter how greatly security efforts are prioritized, vulnerabilities will always remain part of the equation. So, how do we achieve real-time intrusion detection and...READ MORE
A complex software enabled vehicle demanding an extreme level of configurability needs a system architecture which is flexible, scalable and configurable at run-time....READ MORE