E-cast Schedule

2 days away

Where is COTS technology today?

Its been more than 20 years since then U. S.
Presented by: GE Intelligent Platforms, North Atlantic Industries, Pentek, United Electronic Industries
April 21st
11
am  EDT
Registration:  OPEN
4 days away

Blueprint for the Industrial Internet of Things

The development of the IIoT will be the most important transformation of our time. The basic technical premise is simple: that a common architecture can connect sensor to cloud, power to factory, and cities to medical services.
Presented by: RTI
April 23rd
12
pm  EDT
Registration:  OPEN
1 week away

Industrial Strength and Security: Protecting ICS Networks

Today it is impossible to imagine modern production networks without IP-based industrial Ethernet LANs. It is also well known that IP networks are vulnerable to security attacks, and Industrial Control Systems (ICS) have a huge installed base of equipment that is decades old and has little to no security protection.
Presented by: Freescale
April 28th
2
pm  EDT
Registration:  OPEN
1 week away

Leveraging Commercial Signal Processing for Unmanned ISR Sensor Payloads

Unmanned Aircraft Systems (UASs) are disruptive to the enemy just because they carry bombs, but also because of the intelligence, surveillance, and reconnaissance (ISR) their payloads provide to battlefield commanders. Many of these payloads are multi-mission, carrying sensors for radar, signals intelligence, multi-spectral, hyperspectral, etc.
Presented by: Curtiss-Wright, Mercury, Pentek
April 30th
11
am  EDT
Registration:  OPEN
1 week away

A Cost-effective Model-based Approach for the Development of ISO-26262 Compliant Automotive Safety-Related Embedded Software

Automotive manufacturers and their suppliers increasingly need to follow the objectives of ISO 26262, as it is now state-of-the art, and an ever increasing number of active and passive safety systems are developed within cars. This has increased the need to define a safe system development process.
Presented by: ANSYS, Esterel Technologies
April 30th
2
pm  EDT
Registration:  OPEN
2 weeks away

Sensor Data Collection for Logging and Analytics

In response to numerous opportunities for analyzing sensor data to guide more informed decisions, Freescale will examine data analytics as the science of examining raw data with the purpose of uncovering insights and drawing conclusions. Freescale will look at how analytics can be applied to raw sensor data, referred to as Sensor Data Analytics.
Presented by: Freescale
May 5th
2
pm  EDT
Registration:  OPEN
2 weeks away

Improving Transportation Safety, Efficiency, and the Customer Experience

Digital information has become the life blood of the transportation industry with networks of computers and sensors integral to nearly every aspect, including public transport, fleet management, surveillance, ticketing, and passenger information. But standing in the way of shared transportation information are the expense and isolation of vertically implemented solutions.
Presented by: Kontron and Intel
May 6th
11
am  EDT
Registration:  OPEN
2 weeks away

Avoid the Pitfalls in Designing a Multi-core Safety-Critical Avionics System

Multi-core processors open up a new realm of possibilities for increased performance and reduced size, weight and power. But, multi-core design has pitfalls and risks that must be addressed, and getting a multi-core avionics system certified is a major challenge.
Presented by: Wind River
May 7th
2
pm  EDT
Registration:  OPEN
4 weeks away

Managing SWaP in Military Embedded Systems

Military flight computers, vetronics systems, unmanned system payloads, missile systems, GPS devices, radios, etc. , are all trending smaller.
Presented by: CES, Curtiss-Wright, VadaTech
May 21st
2
pm  EDT
Registration:  OPEN
6 months away

IoT and M2M Safety and Security

The proliferation of connected devices coupled with network infrastructure advances have ushered in a new era of communication and machine-to-machine (M2M) automation in all industries. These advances bring significant risk - attacks on systems have become purpose-built - targeting specific machines in order to access unauthorized information or cause system failures.
Presented by: Echelon, Freescale, GrammaTech, RTI
1st Broadcast
October 21st
2
pm  EDT
Registration:  OPEN
  2nd Broadcast
just seconds later at:
2
pm  EDT
Registration:  OPEN