Virtual Events Archive

Sponsored by: IAR, Texas Instruments, Qorvo, ADLINK
May 13, 2021 11AM EDT (3 years ago)
The pace of design in the automotive sector has picked up considerably, in just about every segment—from mission-critical engine control to the infotainment subsystem and everything in between. At the Automotive Technologies Virtual Conference, you’ll hear from experts that can cover five key areas...
Sponsored by: Acromag
Mar 31, 2021 11AM EDT (3 years, 1 month ago)
With the ARM processor cores and FPGA logic all on the same chip, a designer has the ability to do high performance embedded applications in a smaller footprint with multi-processor system on a chip performance. Agenda Topics: Types of Zynq Ultrascale+ Features of Acropack Zynq Ultrascale+ APZU Carr...
Sponsored by: QA Systems Ltd
Mar 23, 2021 1PM EDT (3 years, 2 months ago)
In this webinar QA Systems will discuss and demonstrate how the automated unit and integration testing tool Cantata can accelerate your safety standards compliance. We will see how embedded industry leaders employ the latest easy to use techniques for requirements tracing, automatic test case genera...
Sponsored by: Avnet
Mar 17, 2021 11AM EDT (3 years, 2 months ago)
Tiger Lake is the codename for Intel’s 11th generation of its Core Processors, designed specifically for high performance in mobile hardware. In this webinar Christian Engels, embedded innovation expert at Avnet, gives a primer on the new processors and the benefits they bring to embedded computing...
Sponsored by: SensiML, Neousys, Crystal Group, Inc.
Mar 10, 2021 2PM EDT (3 years, 2 months ago)
AI/machine learning can be a boon to the Edge of the IoT if implemented properly. That sounds easy, but it has the potential to be mystifying. With the compute power that’s now available at the Edge, most calculations can be handled locally. While that doesn’t eliminate Cloud interaction completely,...
Sponsored by: IAR Systems, Data I/O, Crypto Quantique
Mar 04, 2021 11AM EDT (3 years, 2 months ago)
We’ve come a long way when it comes to security. Unfortunately, we are not there yet. In fact, we may not even know where “there” is at this point. This panel of experts will look at what a designer/developer should know in order to ensure that his system checks the appropriate boxes when it comes t...
Sponsored by: ADLINK, Samtec, Kontron
Mar 02, 2021 11AM EDT (3 years, 2 months ago)
Developed under the auspices of PICMG, this new specification pushes the performance level for Computer-on-Modules (COMs) to levels not before seen. In this panel session, we will go through what’s actually in the new spec, and how you can make it work for you.
Sponsored by: Keyfactor
Feb 16, 2021 2PM EDT (3 years, 3 months ago)
From a security standpoint, early editions of connected vehicles had a rough start. Securing automobiles is hard – perhaps harder than just about any other device. This presentation will outline the unique security challenges that engineers face when securing connected vehicles, address the role...
Sponsored by: Digi International, NXP
Feb 11, 2021 11AM EDT (3 years, 3 months ago)
No matter how good your design is, if it’s not secure, it’s worthless. Security needn’t be a huge hurdle, but it does need to be considered from Day 1 of the design. That tact can make the process seamless, and also provide a simple upgrade path as new techniques become available. This webinar wi...
Sponsored by: LDRA, Intland Software
Feb 10, 2021 9AM EDT (3 years, 3 months ago)
In recent years, the amount of embedded software in automobiles has grown exponentially. At the same time, technologies such as artificial intelligence, machine learning, internet of things, and autonomous controls are being deployed to make cars ‘smarter’ while making it more challenging to ensure...
Sponsored by: RTI
Feb 09, 2021 11AM EDT (3 years, 3 months ago)
Technology is at the forefront of today’s two major revolutions in the Automotive industry – autonomous vehicles (AVs) and electric vehicles (EVs). It’s widely discussed how AVs will bring monumental change, but the rise of EVs and a software-defined architecture is arguably even more disruptive....
Sponsored by: BlackBerry QNX
Jan 28, 2021 11AM EDT (3 years, 3 months ago)
Insights from Embedded Computing Design’s 2020 Reader Survey 2020 represented an inflection point for many industries. The high-tech industry was no different. Historically, the annual Embedded Computing Design reader study tracks trends in electronics engineering ranging from the popularity o...
Sponsored by: LDRA, The Qt Company
Jan 21, 2021 9AM EDT (3 years, 4 months ago)
A new requirement for adherence to function safety or security standards can be a rude awakening for the uninitiated. There can be no half measures when applications are critical.   Requirements traceability, static analysis, dynamic coverage analysis, and unit/integration testing are deemed esse...
Sponsored by: Infineon
Jan 19, 2021 11AM EDT (3 years, 4 months ago)
At first glance, the move to eSIMs from removable SIMs looks like a deceptively simple replacement of one form factor for another. But this simple change requires a complicated infrastructure to support and more importantly, offers a profound new way for businesses to create new revenue streams and...
Sponsored by: Infineon Technologies
Dec 15, 2020 11AM EDT (3 years, 5 months ago)
The emerging IoT industry enables tremendous opportunities for companies to provide innovative products and services. But with great good there also can be great risk. Attacks, fraud, and sabotage are serious threats in the connected world.
Sponsored by: Microchip, Power Integrations, Texas Instruments
Dec 08, 2020 11AM EDT (3 years, 5 months ago)
The panelists on this engineering roundtable will present technical, performance, and design considerations when designing power converters using wide bandgap power semiconductors such as Silicon Carbide (SiC) and Gallium Nitride (GaN). Both device structures and optimized converter topologies (incl...
Sponsored by: Intel IoT Solutions Alliance
Dec 03, 2020 9AM EDT (3 years, 5 months ago)
Digital transformation has taken on a new meaning, and a new urgency, in the face of the ongoing pandemic.
Sponsored by: IAR Systems
Dec 01, 2020 11AM EDT (3 years, 5 months ago)
Whether your intended volume is 5000 or 500,000, the principles related to security are similar. And that holds true for your end application, as the $1000 end device can be just as vulnerable to nefarious activity as the $50,000 piece of industrial equipment.
Sponsored by: Cadence, DFI, ARM, Achronix, Lattice Semiconductor Corp.
Nov 19, 2020 11AM EDT (3 years, 6 months ago)
Depending on your perspective, autonomous vehicles have been with us for quite some time, or they’re not even close to being here. The former is true in some cases where trials are being run for both passenger vehicles and for trucks. The latter is more the case when you look at mainstream driving d...
Sponsored by: Aetina, Nvidia
Nov 12, 2020 11AM EDT (3 years, 6 months ago)
Let 5G Supercharge Your Edge-to-Cloud AI Connection Edge-based AI and 5G are two technologies in the spotlight. If we can combine their use, we can realize great gains. While Edge computing gains the benefits of low-latency, independence, and security, 5G can potentially keep these features intact w...
Sponsored by: IAR Systems
Nov 10, 2020 11AM EDT (3 years, 6 months ago)
Embedded applications require security. No debate there. As companies try to meet the ongoing changes in IoT device legislation, they are discovering that legislation is actually the starting point. At the same time, there’s a growing need to both protect the IP and ensure that product integrity is...
Sponsored by: Trusted Computing Group
Nov 10, 2020 2PM EDT (3 years, 6 months ago)
In recent years, a rising tide of cyber-attacks on industrial systems have threatened safety and reliability. The world has learned that there is no industrial safety without cyber security. But during these same years, an international group of experts has developed a comprehensive standard for ind...
Sponsored by: Microchip
Nov 10, 2020 2PM EDT (3 years, 6 months ago)
Developers of IoT solutions have faced major hurdles that protect against physical attacks and remote extraction. Today’s software-only security is wholly inadequate, but the superior approach of adding a secure element to each IoT device and configuring it for storing keys and handling cryptographi...
Sponsored by: Cypress
Nov 10, 2020 4PM EDT (3 years, 6 months ago)
IoT device security requires a solid understanding of embedded hardware and software capabilities, cloud-based security, and knowledge of the changing security standards implemented by local governments and global industry bodies. Today’s IoT devices must also address a growing set of requirements t...
Sponsored by: Silicon Labs
Nov 10, 2020 5PM EDT (3 years, 6 months ago)
This presentation will detail how security threats have changed and escalated, focusing more than ever on IoT. In addition, recent regulation like GDPR in Europe and SB-327 in California protect vulnerable data and privacy by placing more pressure on manufacturers to step up security best practices,...