Archived E-casts and events in-progress

6 days ago

Panel Discussion: IoT - Designing, Connecting, and Securing your Things

There are many factors to consider when youre designing a device that needs to talk to the outside world, a phenomenon thats now commonly known as the Internet of Things. The first point to consider is your target market thatll also determine how deeply you need to be involved in the security discussions.
Presented by: ADLINK Technology, Echelon, Freescale, MultiTech Systems, NXP
 RECORDed
December 11th
2
pm  EST
Registration:  OPEN
Audio podcast: 
1 week ago

Breaking Through the 3.0GHz with the ARM(r) Cortex(r)-A53

The Cortex-A53 is one of the most power efficient processor from ARM capable of seamlessly supporting both 32-bit and 64-bit code. It finds application in a wide variety of markets from smart-phones and tablets to high performance enterprise and networking.
Presented by: ARM
 RECORDed
December 10th
1
pm  EST
Registration:  OPEN
Audio podcast: 
1 week ago

Three ways to ensure your automotive developers deliver secure, compliant, defect-free software

Developers in the automotive software supply chain are spending more time and effort -- and consequently money -- on the latter stages of development to get the product ready. These developers need to deliver code with less defects, applications secure from hacking vulnerabilities, and products that conform to critical safety and security standards.
Presented by: Rogue Wave
 RECORDed
December 10th
11
am  EST
Registration:  OPEN
Audio podcast: 
1 week ago

Managing SWaP in ISR Systems

Even in today's budget-constrained environment the Department of Defense is still funding Intelligence, Surveillance, and Reconnaissance (ISR) missions from payloads in Unmanned Aerial Vehicles (UAVs) to radar and maritime surveillance. All of these applications are driven by requirements for more and more signal processing performance and reduced Size, Weight, and Power (SWaP).
Presented by: Advanced Cooling Technologies, Curtiss-Wright, GE Intelligent Platforms, TE Connectivity
 RECORDed
December 4th
2
pm  EST
Registration:  OPEN
Audio podcast: 
4 weeks ago

Managing Avionics Safety Certification in UAS Platforms

Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.
Presented by: AdaCore, DDC-I, IBM
 RECORDed
November 19th
2
pm  EST
Registration:  OPEN
Audio podcast: 
4 weeks ago

Optimizing Performance and Lifecycle of Proprietary Systems Using Intel Architecture

Millions of embedded systems have been running silently for years, buried deep in companies across the world. Things are fine until age and EOL notices threaten to disrupt these working systems that still have value.
Presented by: Five9 Network Systems
 RECORDed
November 13th
2
pm  EST
Registration:  OPEN
Audio podcast: 
4 weeks ago

Four Keys to Securing Distributed Control Systems and the Industrial IoT

Control systems are at the core of critical infrastructure and industrial applications. These include the power grid, medical devices, manufacturing systems, transportation infrastructure, cars and defense systems.
Presented by: RTI
 RECORDed
November 13th
11
am  EST
Registration:  OPEN
Audio podcast: 
5 weeks ago

Internet of Things (IoT) Costs, Connectivity, Resources and Software

Embedded systems are becoming interconnected and accessible via the internet. Gartner Group estimates there will be nearly 26 billion devices that make up the Internet of Things by 2020.
Presented by: Mentor Graphics, RTI
 RECORDed
November 11th
2
pm  EST
Registration:  OPEN
Audio podcast: 
Last month

Accelerating Software Verification and Certification in an Agile Environment

How Agile can you be in a safety-critical software development environment? For safety-critical software developers working in an Agile development environment, meeting schedule and budget constraints is still a challenging endeavor due to the rigorous requirements of the safety standards and the associated documentation and qualification requirements. Presented by: Wind River, LDRA.
Presented by: Wind River, LDRA
 RECORDed
November 4th
2
pm  EST
Registration:  OPEN
Audio podcast: 
Last month

A Network Administrators Guide to Web App Security

Youve seen the headlines [Well-Known Company] With Global Presence Falls Victim To Hackers. These data breaches result in the theft of millions of names, passwords, credit card numbers, and other personal data.
Presented by: Incapsula
 RECORDed
October 29th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
Last month

Virtualization Redefined: Carrier-Grade Embedded Linux Virtualization with Docker

The presentation will provide an overview of the containers-based virtualization technologies, especially the Docker project. These technologies provide lightweight virtualization-like functionality that can be used in many Cloud and Virtualization use-cases alongside or instead of a hypervisor solution, such as KVM.
Presented by: MontaVista Software
 RECORDed
October 28th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
Last month

Balancing Software Requirements and Test Needs

Software test needs and software requirements are often perceived as a balance of yin and yang, where software requirements are thought to be the yin to software testings yang. While traditional software engineering often separates the software requirements and testing processes, best-in-class development mandates integration of testing with requirements.
Presented by: Vector Software, Polarion
 RECORDed
October 23rd
2
pm  EDT
Registration:  OPEN
Audio podcast: 
Last month

The Anatomy of IoT: Features, Functions, and Capability

Gartner Group forecasts the Internet of Things will include 26 billion units installed by 2020. Some are end user equipment.
Presented by: Echelon, Prism Tech, Telit, xively
 RECORDed
October 22nd
2
pm  EDT
Registration:  OPEN
Audio podcast: 
Last month

Enabling Embedded Security for the Internet of Things

The pervasive connectivity of the Internet of Things (IoT) exposes embedded devices to more security risks than ever before. As a result, safeguarding devices, data, and intellectual property becomes a key requirement embedded device manufacturers must meet to succeed in IoT.
Presented by: Wind River, Wibu Systems
 RECORDed
October 21st
2
pm  EDT
Registration:  OPEN
Audio podcast: 
2 months ago

Five Ways the Industrial Internet will Change the Oil and Gas Industry

Unconventional resources challenge the oil industry. Exploration and development of new sources of oil and gas require new sensors, analytics and processes.
Presented by: RTI
 RECORDed
October 16th
11
am  EDT
Registration:  OPEN
Audio podcast: