Archived Webcasts

Upcoming Webcasts

Sep
27
2020
Sponsored by: Wind River
8AM EDT (10 hours, 6 minutes ago)
Securing your device or system is a complete lifecycle effort. Threats must be actively monitored and resolutions must be implemented. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.
Sep
26
2020
Sponsored by: Wind River
8AM EDT (2 days, 10 hours ago)
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access. 
Sep
25
2020
Sponsored by: Wind River
8AM EDT (3 days, 10 hours ago)
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
Sep
24
2020
Sponsored by: Wind River
8AM EDT (4 days, 10 hours ago)
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
Sep
23
2020
Sponsored by: Wind River
8AM EDT (5 days, 10 hours ago)
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
Sep
22
2020
Sponsored by: Advantech Europe
2PM EDT (6 days, 4 hours ago)
Embedded Single Boards are the solutions-to-go to meet high performance IoT demands. Don't compromise for performance & board size: learn how to easily migrate actual and future application demands like Artificial Intelligence of Things and 5G connectivity using our tailored system approach with ou...
Sep
22
2020
Sponsored by: Wind River
8AM EDT (6 days, 10 hours ago)
Architecting a secure device starts well before the first line of code is written and ends only when the device is taken out of service. Learn how and where security is applied at different stages of the journey.
Sep
15
2020
Sponsored by: ACT, LCR Embedded Systems, nVent Schroff
2PM EDT (13 days, 4 hours ago)
Radar, electronic warfare, and intelligence, surveillance and reconnaissance (ISR) systems all depend heavily on superior signal processing solutions that often leverage commercial processors, graphics processors, FPGAs, etc. These devices provide unprecedented performance but also create headaches...
Sep
02
2020
Sponsored by: IAR Systems
11AM EDT (26 days, 7 hours ago)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...
Aug
26
2020
Sponsored by: IAR Systems
11AM EDT (1 month, 2 days ago)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Aug
19
2020
Sponsored by: IAR Systems
11AM EDT (1 month, 9 days ago)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...
Aug
18
2020
Sponsored by: Advantech
2PM EDT (1 month, 10 days ago)
AI is transforming industries like manufacturing, retail, smart cities, transportation, healthcare and more. Applications are moving towards edge computing to enable real-time decision making without the limitations of latency, cost, bandwidth, and power consumption. This trend has led to a rapid in...
Aug
12
2020
Sponsored by: IAR Systems
11AM EDT (1 month, 16 days ago)
Your IP is essentially the crown jewels of your design, if not your entire company. Hence, it’s vital to ensure that it remains secure. However, it’s not always obvious where the weak link in your protection chain resides. And there’s far more to it than the old adage of “monitor, detect, and respon...
Aug
05
2020
Sponsored by: IAR Systems
11AM EDT (1 month, 23 days ago)
Depending on your geography, or more specifically, the intended geography for your embedded design, the rules surrounding security may be different than other geographies. Different governments and other legislative bodies are continually changing the rules of the game. And again, depending on your...
Jul
23
2020
Sponsored by: BlackBerry QNX
11AM EDT (2 months, 5 days ago)
We are living in a world where devices are becoming more connected. And this opens the door to innovation and new business opportunities. But it also leaves device manufacturers and OEMs struggling to balance evolving market demands with staying ahead of the growing threat of cyberattacks and the p...
Jul
22
2020
Sponsored by: Arm
11AM EDT (2 months, 6 days ago)
With increasing signal processing requirements in various types of embedded systems, some companies designed chips that combine both a digital signal processor (DSP) and a general-purpose processor to address the processing demands. While this suits some high-performance devices where silicon area a...
Jul
21
2020
Sponsored by: Abaco Systems, Concurrent Technologies, Crystal Group, Wind River
11AM EDT (2 months, 7 days ago)
Innovation in today's military systems -- whether flight systems, cybersecurity, electronic warfare, radar, etc. -- often comes from leveraging commercial technology. This is very true when it comes artificial intelligence (AI) and machine learning (ML), game changers in many industries. Defense lea...
Jul
20
2020
Sponsored by: Innodisk Corporation
2PM EDT (2 months, 8 days ago)
One of the major factors of digital transformation is AIoT, which delivers intelligent connected systems that are capable of self-correcting. One of Innodisk’s products, InnoAge comes with a Microsoft Azure Sphere inside and is further integrated with Innodisk’s customized firmware, software, and ha...
Jul
15
2020
Sponsored by: Curtiss-Wright, Milpower Source
2PM EDT (2 months, 13 days ago)
The Army’s C4ISR/Electronic Warfare Modular Open Suite of Standards (CMOSS) initiative, launched by the Army Combat Capabilities Development Command (CCDC) C5ISR Center (formerly CERDEC), is a modular open systems architecture (MOSA) that essentially integrates multiple capabilities into one box for...
Jul
14
2020
Sponsored by: Connect Tech, NVIDIA
2PM EDT (2 months, 14 days ago)
The continuous battle when designing Edge AI and autonomous machines is balancing size, weight, power, and cost (SWaP-C) requirements. NVIDIA’s newest embedded platform opens possibilities for AI projects with unparalleled size vs. power capabilities. Join Connect Tech and NVIDIA’s embedded experts...
Jun
30
2020
Sponsored by: Lynx Software Technologies, RTI
2PM EDT (2 months, 28 days ago)
IoT systems tend to be thought of as a “clean slate” environment where historical systems have no bearing. This couldn’t be further from the truth when considering Industrial IoT. IIoT must be an extension of the existing industrial systems in order to enable a new business model without disrupting...
Jun
24
2020
Sponsored by: Annapolis Micro System, Epiq Solutions, Pentek, TE Connectivity
2PM EDT (3 months, 4 days ago)
Elements of the Sensor Open System Architecture (SOSA) technical standard are leveraging standards developed by the VITA Standards Organization, specifically VITA 65, also known as OpenVPX. VITA has also become a participating member of the SOSA Consortium along with the Air Force, Army, and Navy. T...
Jun
23
2020
Sponsored by: Wittenstein
11AM EDT (3 months, 5 days ago)
This webinar looks at how FreeRTOS is the ideal starting point for embedded applications, even those that target a safety critical application. Follow along at home with the NXP FRDM-K64F as we see the differences between FreeRTOS and the safety critical RTOS SAFERTOS®; why these differences are nec...
Jun
23
2020
Sponsored by: Intel IOT Solutions Alliance, Capsule Technologies, Medical Informatics Corp
2PM EDT (3 months, 5 days ago)
The pandemic presented new challenges for patient monitoring. Safety concerns and staff burdens shifted dramatically, creating a pressing need for inpatient telehealth strategies. As healthcare providers transition into a recovery phase, what can we learn from this experience?
Jun
17
2020
Sponsored by: GrammaTech, Wibu-Systems
2PM EDT (3 months, 11 days ago)
Untrustworthy software can have a significant impact on industrial systems. That impact could range from machine down time to lives being at stake? Do you want to bet your company’s assets on untrustworthy software over the complete lifecycle of your equipment? In this webinar, we will provide a hig...

Upcoming Webcasts