Archived E-casts and events in-progress

Yesterday

Agile, Continuous Practices and DevOps: How far can you go in Embedded Software Development?

Software development and methodologies are constantly evolving and incorporating agile, continuous practices, and DevOps can have profound effects. Effects can include a transformation not only in development methodologies, but also in how companies choose to organize themselves, how they view their business, and most significantly, how they deliver value to their customers.
Presented by: Wind River
 RECORDed
January 29th
2
pm  EST
Registration:  OPEN
Audio podcast: 
Yesterday

Two Approaches You Must Consider when Architecting Radar Systems

Modern radar systems must keep up with a rapidly changing threat environment, readily adapt to new technologies and be developed with smaller budgets. How do you architect your future radar systems to meet these challenging requirements? Presented by: RTI

Speaker(s): Dr.

Presented by: RTI
 RECORDed
January 28th
2
pm  EST
Registration:  OPEN
Audio podcast: 
1 week ago

USB Type-C: Will You Be Plugged In?

The new USB Type-C promises to revolutionize many types of equipment with its up to 100W of power for faster charging and support of new devices, small reversible connector that improves ease of use, blazing fast 10Gbits+ of bandwidth and the flexibility of video alternate modes. Industry leaders are likely to release the first products that utilize this technology mid-2015.
Presented by: Lattice Semiconductor
 RECORDed
January 20th
11
am  EST
Registration:  OPEN
Audio podcast: 
Last month

Panel Discussion: IoT - Designing, Connecting, and Securing your Things

There are many factors to consider when youre designing a device that needs to talk to the outside world, a phenomenon thats now commonly known as the Internet of Things. The first point to consider is your target market thatll also determine how deeply you need to be involved in the security discussions.
Presented by: ADLINK Technology, Echelon, Freescale, MultiTech Systems, NXP
 RECORDed
December 11, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
Last month

Breaking Through the 3.0GHz with the ARM(r) Cortex(r)-A53

The Cortex-A53 is one of the most power efficient processor from ARM capable of seamlessly supporting both 32-bit and 64-bit code. It finds application in a wide variety of markets from smart-phones and tablets to high performance enterprise and networking.
Presented by: ARM
 RECORDed
December 10, 2014
1
pm  EST
Registration:  OPEN
Audio podcast: 
Last month

Three ways to ensure your automotive developers deliver secure, compliant, defect-free software

Developers in the automotive software supply chain are spending more time and effort -- and consequently money -- on the latter stages of development to get the product ready. These developers need to deliver code with less defects, applications secure from hacking vulnerabilities, and products that conform to critical safety and security standards.
Presented by: Rogue Wave
 RECORDed
December 10, 2014
11
am  EST
Registration:  OPEN
Audio podcast: 
Last month

Managing SWaP in ISR Systems

Even in today's budget-constrained environment the Department of Defense is still funding Intelligence, Surveillance, and Reconnaissance (ISR) missions from payloads in Unmanned Aerial Vehicles (UAVs) to radar and maritime surveillance. All of these applications are driven by requirements for more and more signal processing performance and reduced Size, Weight, and Power (SWaP).
Presented by: Advanced Cooling Technologies, Curtiss-Wright, GE Intelligent Platforms, TE Connectivity
 RECORDed
December 4, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
2 months ago

Managing Avionics Safety Certification in UAS Platforms

Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.
Presented by: AdaCore, DDC-I, IBM
 RECORDed
November 19, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
2 months ago

Optimizing Performance and Lifecycle of Proprietary Systems Using Intel Architecture

Millions of embedded systems have been running silently for years, buried deep in companies across the world. Things are fine until age and EOL notices threaten to disrupt these working systems that still have value.
Presented by: Five9 Network Systems
 RECORDed
November 13, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
2 months ago

Four Keys to Securing Distributed Control Systems and the Industrial IoT

Control systems are at the core of critical infrastructure and industrial applications. These include the power grid, medical devices, manufacturing systems, transportation infrastructure, cars and defense systems.
Presented by: RTI
 RECORDed
November 13, 2014
11
am  EST
Registration:  OPEN
Audio podcast: 
2 months ago

Internet of Things (IoT) Costs, Connectivity, Resources and Software

Embedded systems are becoming interconnected and accessible via the internet. Gartner Group estimates there will be nearly 26 billion devices that make up the Internet of Things by 2020.
Presented by: Mentor Graphics, RTI
 RECORDed
November 11, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
2 months ago

Accelerating Software Verification and Certification in an Agile Environment

How Agile can you be in a safety-critical software development environment? For safety-critical software developers working in an Agile development environment, meeting schedule and budget constraints is still a challenging endeavor due to the rigorous requirements of the safety standards and the associated documentation and qualification requirements. Presented by: Wind River, LDRA.
Presented by: Wind River, LDRA
 RECORDed
November 4, 2014
2
pm  EST
Registration:  OPEN
Audio podcast: 
3 months ago

A Network Administrators Guide to Web App Security

Youve seen the headlines [Well-Known Company] With Global Presence Falls Victim To Hackers. These data breaches result in the theft of millions of names, passwords, credit card numbers, and other personal data.
Presented by: Incapsula
 RECORDed
October 29, 2014
2
pm  EDT
Registration:  OPEN
Audio podcast: 
3 months ago

Virtualization Redefined: Carrier-Grade Embedded Linux Virtualization with Docker

The presentation will provide an overview of the containers-based virtualization technologies, especially the Docker project. These technologies provide lightweight virtualization-like functionality that can be used in many Cloud and Virtualization use-cases alongside or instead of a hypervisor solution, such as KVM.
Presented by: MontaVista Software
 RECORDed
October 28, 2014
2
pm  EDT
Registration:  OPEN
Audio podcast: 
3 months ago

Balancing Software Requirements and Test Needs

Software test needs and software requirements are often perceived as a balance of yin and yang, where software requirements are thought to be the yin to software testings yang. While traditional software engineering often separates the software requirements and testing processes, best-in-class development mandates integration of testing with requirements.
Presented by: Vector Software, Polarion
 RECORDed
October 23, 2014
2
pm  EDT
Registration:  OPEN
Audio podcast: