Upcoming Webcasts Calendar

View Archived Webcasts

Sep
28
2020
Sponsored by: Wind River
8AM EDT (10 hours, 18 minutes ago)
Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device. 
Sep
29
2020
Sponsored by: Intel IoT Solutions Alliance
11AM EDT (in 16 hours, 41 minutes)
Digital transformation projects have accelerated in 2020, specifically using Telemetry and Video Analytics. Organizations are challenged with a wide variety of options and multi-vendor deployments that lead to delays and challenges. Arrow and ADLINK have teamed up with Microsoft to streamline deploy...
Oct
08
2020
Sponsored by: Abaco, Elma, Pentek
2PM EDT (in 9 days, 19 hours)
As military radar, signals intelligence (SIGINT) and electronic warfare systems get more complex so does the associated signal integrity challenges. These signal integrity concerns didn't even exist 10-15 years ago. Today as signal density for connectors continues to get tighter as footprints get sm...
Oct
21
2020
Sponsored by: Infineon Technologies
11AM EDT (in 22 days, 16 hours)
As wireless charging begins to see wider adoption due to its convenience, the need for security becomes even more critical. Designing security into wireless devices enables a safe, reliable and convenient way to charge electronic devices. It also prevents overheating, counterfeits and other safety c...
Oct
22
2020
Sponsored by: Advantech
2PM EDT (in 23 days, 19 hours)
The current and future trends that will have a positive effect on C5ISR capabilities in mission critical systems. With the advent of edge computing and the benefits of 5G it is understood that emerging networks and data fusion will revolutionize battlefield information. Artificial intelligence, mach...
Oct
27
2020
Sponsored by: Blackberry QNX
11AM EDT (in 28 days, 16 hours)
Hypervisors create virtual machines that are well-insulated from external corruption and allow mixed systems with different safety requirements to run on the same system-on-a-chip (SoC).  But virtualization is rarely straightforward. Your virtualized guest’s operating system may have limited configu...
Nov
10
2020
Sponsored by: Cypress
4PM EDT (in 1 month, 12 days)
IoT device security requires a solid understanding of embedded hardware and software capabilities, cloud-based security, and knowledge of the changing security standards implemented by local governments and global industry bodies. Today’s IoT devices must also address a growing set of requirements t...
Nov
10
2020
Sponsored by: Trusted Computing Group
2PM EDT (in 1 month, 12 days)
In recent years, a rising tide of cyber-attacks on industrial systems have threatened safety and reliability. The world has learned that there is no industrial safety without cyber security. But during these same years, an international group of experts has developed a comprehensive standard for ind...
Nov
10
2020
Sponsored by: IAR Systems
11AM EDT (in 1 month, 12 days)
Embedded applications require security. No debate there. As companies try to meet the ongoing changes in IoT device legislation, they are discovering that legislation is actually the starting point. At the same time, there’s a growing need to both protect the IP and ensure that product integrity is...

View Archived Webcasts