Virtual Events Archive

Sponsored by: BlackBerry QNX
Jan 28, 2021 11:00AM EDT (4 years, 10 months ago)
Insights from Embedded Computing Design’s 2020 Reader Survey 2020 represented an inflection point for many industries. The high-tech industry was no different. Historically, the annual Embedded Computing Design reader study tracks trends in electronics engineering ranging from the popularity o...
Sponsored by: LDRA, The Qt Company
Jan 21, 2021 9:00AM EDT (4 years, 10 months ago)
A new requirement for adherence to function safety or security standards can be a rude awakening for the uninitiated. There can be no half measures when applications are critical.   Requirements traceability, static analysis, dynamic coverage analysis, and unit/integration testing are deemed esse...
Sponsored by: Infineon
Jan 19, 2021 11:00AM EDT (4 years, 10 months ago)
At first glance, the move to eSIMs from removable SIMs looks like a deceptively simple replacement of one form factor for another. But this simple change requires a complicated infrastructure to support and more importantly, offers a profound new way for businesses to create new revenue streams and...
Sponsored by: Infineon Technologies
Dec 15, 2020 11:00AM EDT (4 years, 11 months ago)
The emerging IoT industry enables tremendous opportunities for companies to provide innovative products and services. But with great good there also can be great risk. Attacks, fraud, and sabotage are serious threats in the connected world.
Sponsored by: Microchip, Power Integrations, Texas Instruments
Dec 08, 2020 11:00AM EDT (4 years, 11 months ago)
The panelists on this engineering roundtable will present technical, performance, and design considerations when designing power converters using wide bandgap power semiconductors such as Silicon Carbide (SiC) and Gallium Nitride (GaN). Both device structures and optimized converter topologies (incl...
Sponsored by: Intel IoT Solutions Alliance
Dec 03, 2020 9:00AM EDT (5 years ago)
Digital transformation has taken on a new meaning, and a new urgency, in the face of the ongoing pandemic.
Sponsored by: IAR Systems
Dec 01, 2020 11:00AM EDT (5 years ago)
Whether your intended volume is 5000 or 500,000, the principles related to security are similar. And that holds true for your end application, as the $1000 end device can be just as vulnerable to nefarious activity as the $50,000 piece of industrial equipment.
Sponsored by: Cadence, DFI, ARM, Achronix, Lattice Semiconductor Corp.
Nov 19, 2020 11:00AM EDT (5 years ago)
Depending on your perspective, autonomous vehicles have been with us for quite some time, or they’re not even close to being here. The former is true in some cases where trials are being run for both passenger vehicles and for trucks. The latter is more the case when you look at mainstream driving d...
Sponsored by: Aetina, Nvidia
Nov 12, 2020 11:00AM EDT (5 years ago)
Let 5G Supercharge Your Edge-to-Cloud AI Connection Edge-based AI and 5G are two technologies in the spotlight. If we can combine their use, we can realize great gains. While Edge computing gains the benefits of low-latency, independence, and security, 5G can potentially keep these features intact w...
Sponsored by: Green Hills Software
Nov 10, 2020 8:00PM EDT (5 years ago)
Many cybersecurity techniques focus on securing the perimeter of critical computer systems and recovering in the event of failure. In this talk we'll take a new perspective on building safe and secure systems. This talk will: Take a holistic view of cybersecurity for automotive systems from the bott...
Sponsored by: Silicon Labs
Nov 10, 2020 5:30PM EDT (5 years ago)
This presentation will detail how security threats have changed and escalated, focusing more than ever on IoT. In addition, recent regulation like GDPR in Europe and SB-327 in California protect vulnerable data and privacy by placing more pressure on manufacturers to step up security best practices,...
Sponsored by: AbsInt GmbH
Nov 10, 2020 6:30PM EDT (5 years ago)
Static code analysis is a widely-used technique to demonstrate compliance to coding guidelines, such as MISRA C/C++ or SEI CERT C. Another aspect is to find critical programming defects, and even demonstrate their absence: abstract interpretation-based analyzers can guarantee to detect all code defe...
Sponsored by: Veridify
Nov 10, 2020 6:00PM EDT (5 years ago)
We all know securing small devices in the IoT is hard, and the goal of many manufacturers is to secure and ‘manage’ a device from birth to retirement, creating even more security challenges. This talk will look at what makes securing low-resource IoT devices a challenge, with a specific focus on add...
Sponsored by: Imagination Technologies
Nov 10, 2020 6:30PM EDT (5 years ago)
Devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices add cost and complexity. It's an industry wide is...
Sponsored by: Premio
Nov 10, 2020 4:15PM EDT (5 years ago)
The convergence of IT with vulnerable OT has exposed the inherent weaknesses that can result in attacks on the industrial IoT. Such vulnerabilities include poorly-secured industrial systems. AI/ML provides hyperintelligent cybersecurity and threat mitigation for platforms based on Industry 4.0. To d...
Sponsored by: Kudelski Group
Nov 10, 2020 9:15PM EDT (5 years ago)
Protecting industrial equipment and technology from attacks and enabling new secure features and business models are critical to the success of IoT. But to do so requires careful, deliberate approaches to designing, running and sustaining robust security over time. What lessons can be learned from o...
Sponsored by: Wind River
Nov 10, 2020 9:00PM EDT (5 years ago)
Intelligent systems are notoriously hard to develop, and are becoming an ever-larger attack surface with their growing deployments in multi-layered architectures. Developers are struggling to respond to this increasing complexity, while being asked to deploy new technologies, such as AI, and staying...
Sponsored by: Sensory
Nov 10, 2020 9:30AM EDT (5 years ago)
Voice-enabled devices are everywhere. However, many of these devices today can be accessed and controlled by just about any user. There are obvious security risks associated with not limiting device access, especially when these devices are linked to various aspects of your business.
Sponsored by: Data I/O
Nov 10, 2020 6:00PM EDT (5 years ago)
The connected and autonomous vehicles are driving new architectural designs to ECUs that connect various subsystems together and expose them to the outside world over various networks. These advancements increase the risk of threat actors gaining access to the subsystems. This session examines found...
Sponsored by: Icon Labs
Nov 10, 2020 5:30PM EDT (5 years ago)
Effective IoT and connected device security begins with the device's initial design process including the device's various components. Each component and sub-assembly that is integrated into the final product must be secure and immune from cyberattack. To secure embedded devices, IoT and connected d...
Sponsored by: Arm
Nov 10, 2020 5:00PM EDT (5 years ago)
With IoT services relying on trusted data, it’s important that devices are designed with this in mind. But how do you design a secure product? In this session we’ll explore how to build-in security using threat modeling and careful component selection. We’ll outline different levels of security to g...
Sponsored by: IAR Systems
Nov 10, 2020 11:00AM EDT (5 years ago)
Embedded applications require security. No debate there. As companies try to meet the ongoing changes in IoT device legislation, they are discovering that legislation is actually the starting point. At the same time, there’s a growing need to both protect the IP and ensure that product integrity is...
Sponsored by: Maxim Integrated
Nov 10, 2020 7:00PM EDT (5 years ago)
Electronic content is proliferating in cars at astounding rates, especially as ADAS and Electric Vehicles become more widely available. With the increase of automotive electronics comes heightened vulnerability to various security compromises. This session will discuss several categories of security...
Sponsored by: Trusted Computing Group
Nov 10, 2020 2:00PM EDT (5 years ago)
In recent years, a rising tide of cyber-attacks on industrial systems have threatened safety and reliability. The world has learned that there is no industrial safety without cyber security. But during these same years, an international group of experts has developed a comprehensive standard for ind...
Sponsored by: Microchip
Nov 10, 2020 2:30PM EDT (5 years ago)
Developers of IoT solutions have faced major hurdles that protect against physical attacks and remote extraction. Today’s software-only security is wholly inadequate, but the superior approach of adding a secure element to each IoT device and configuring it for storing keys and handling cryptographi...