Archived E-casts and events in-progress

1 week ago

Pre-silicon Optimization of System Designs using the ARM CoreLink NIC-400 Interconnect

Gaining the tactical edge on the battlefield is becoming less about troop and tank deployments but more about who has the smartest sensors, best electronic warfare (EW) techniques, and the most accurate radar systems. Presented by: GE Intelligent Platforms, Pentek, Mercury Systems, Thermacore.
Presented by: GE Intelligent Platforms, Pentek, Mercury Systems, Thermacore
 RECORDed
September 11th
1
pm  EDT
Registration:  OPEN
Audio podcast: 
1 week ago

Exploring DiY: Platforms, Software, Tools, and Opportunity

Availability of low cost platforms for hobbyists and professional engineers alike have spurred a dramatic growth in innovation, software, and tools platforms for embedded systems. Open Source Projects and development tools are lining up to support a variety of DiY platforms.
Presented by: Avnet, Texas Instruments
 RECORDed
September 10th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
1 week ago

Safety Certification and Unmanned Aircraft

The United States Federal Aviation Administration (FAA) is beginning to open the national airspace unmanned aerial systems (UASs). The UAS commercial market is expected to some day dwarf what is already a multi-billion military marketplace for UAS technology.
Presented by: Esterel Technologies, IBM, LDRA, RTI
 RECORDed
September 9th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
1 week ago

Software Release and Deployment Process Crisis: Risks, Challenges, and Solutions

How much thought are you putting into your software release and deployment process? For companies taking an ad-hoc approach this process may be risking their company's future. A process that is prone to error, doesn't securely store artifacts needed for traceability, and is unable to reproduce and track fielded revisions can result in delays, confusion, bad customer experience and liability issues.
Presented by: IBM
 RECORDed
September 9th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
2 weeks ago

Point of Sale and credit card transaction security for embedded systems - critical compliance and threat mitigation techniques and solutions

Retail system breaches continue to grab headlines with millions of consumer records exploited and hundreds of lawsuits filed. What lessons have we learned from the most recent breaches such as Target, Niemen Marcus and others? What role can the OEM take to address future breaches? New PCI DSS v 3.
Presented by: Avnet, McAfee
 RECORDed
September 3rd
11
am  EDT
Registration:  OPEN
Audio podcast: 
4 weeks ago

How to Leverage Open Architectures for Existing Systems

Economic realities dictate that "new" distributed systems are almost never entirely new creations. Existing capabilities which cannot be readily duplicated at minimal cost are often necessary and even critical components of otherwise new systems.
Presented by: RTI
 RECORDed
August 21st
2
pm  EDT
Registration:  OPEN
Audio podcast: 
4 weeks ago

Meeting Today's IoT Device Challenges with Virtualization and Consolidation

From modernizing legacy systems to designing new industrial and consumer connected products spawned by the era of the Internet of Things (IoT), embedded developers are faced with new challenges for their devices where connectivity, scalability, security, and future-proofing are required along with the continual pressure to reduce costs, risks, and time-to-market. Presented by: Wind River

Speaker(s): Mark Hermeling (Director Product Management, Wind River)

.
Presented by: Wind River
 RECORDed
August 20th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
5 weeks ago

Protecting Your Car: Increasing Auto Software Security

The future of automotive will feature vehicle to vehicle communications for enhanced safety and the ability to integrate personal mobile devices into the car to provide improved information and a better entertainment experience. The benefits and convenience are significant but whats the impact of this increased connectivity? Is it possible for a security hole or rogue application on your cell phone to get into the power train in your car? What are the critical software security issues, best practices and mitigation techniques automotive developers need to know? Join us as embedded security experts discuss the unique requirements and security issues within an automotive environment.
Presented by: Electric Cloud, klocwork, Security Innovation
 RECORDed
August 12th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
Last month

Building a Customized Debug and Trace Solution for a Multi-Core SoC

Todays SoCs are ever increasing in complexity with features such as multiple cores, multiple clusters, heterogeneous compute, coherency, DVFS and multiple architectures. Traditional hardware debug solutions fail to address the entire SoC space and this is where a customized debug and trace solution targeted at your SoC is essential for hardware debug, software development and performance analysis.
Presented by: ARM
 RECORDed
July 24th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
2 months ago

Reducing SWaP in Embedded Systems with Small Form Factor Designs

Smaller, compact electronics are being required more and more for vetronics, avionics, unmanned system payloads, missile systems, command and control systems, radios, and other military applications. Mostly because modern processing technology enables system designers to replace legacy systems with as much as 10 times the performance in the same size footprint.
Presented by: Curtiss-Wright, Ecrin Systems, GE Intelligent Platforms, TE Connectivity
 RECORDed
July 16th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
2 months ago

26 Ways to Recover: Whos Afraid of Losing a VM?

There are many things that can go wrong in the modern data center today. When it comes to virtualized environments, what do you need to be able to restore? Just a file? Maybe an entire VM? What about a SQL record, email message or Linux application? Join Expert Rick Vanover from Veeam for this webinar to explain how restore options can deliver Availability for the Modern Data Center.
Presented by: Veeam
 RECORDed
July 15th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
2 months ago

Is Your Data Secure?

Odds are good that your data is extremely important to you. Now consider how one secures that data.
Presented by: RTI
 RECORDed
June 24th
11
am  EDT
Registration:  OPEN
Audio podcast: 
3 months ago

Managing the Risk of Meeting Embedded Software Certification Objectives

Many of the safety standards specify a number of objectives or requirements that need to be met. We will discuss these objectives and look at various ways in which they can be implemented and documented as well as highlighting the processes, procedures, risks and tools used to achieve safety-critical software certification.
Presented by: LDRA, Polarion
 RECORDed
June 19th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
3 months ago

Addressing Reliability and Service Outages in your Organization through an Effective Enterprise Architecture

Todays business services and operational components are typically distributed with no centralized repository which can result in prolonged service outages. Incorporating external vendor technology and managing integration of open source software can also cause service outages beyond the companys control if not managed properly.
Presented by: IBM
 RECORDed
June 18th
2
pm  EDT
Registration:  OPEN
Audio podcast: 
3 months ago

Connecting the Internet of Things - One Size Does Not Fit All

The Internet of Things (IoT) trend promises to connect the smallest of sensors, the broadest range of consumer electronics, to the largest of information delivery systems. As Internet connectivity has pushed its way down the complexity chain the price, performance, and bandwidth requirements for internet connecting these devices becomes a critical issue, as has the ever growing attack surface presented by the enormous number of unprotected and/or insecure devices.
Presented by: Echelon, RTI, Security Innovation, Silicon Labs
 RECORDed
June 17th
2
pm  EDT
Registration:  OPEN
Audio podcast: