Upcoming Webcasts Calendar

View Archived Webcasts

Jul
14
2020
Sponsored by: Connect Tech, NVIDIA
2PM EDT (in 4 days, 7 hours)
The continuous battle when designing Edge AI and autonomous machines is balancing size, weight, power, and cost (SWaP-C) requirements. NVIDIA’s newest embedded platform opens possibilities for AI projects with unparalleled size vs. power capabilities. Join Connect Tech and NVIDIA’s embedded experts...
Jul
15
2020
Sponsored by: Curtiss-Wright, Milpower Source
2PM EDT (in 5 days, 7 hours)
The Army’s C4ISR/Electronic Warfare Modular Open Suite of Standards (CMOSS) initiative, launched by the Army Combat Capabilities Development Command (CCDC) C5ISR Center (formerly CERDEC), is a modular open systems architecture (MOSA) that essentially integrates multiple capabilities into one box for...
Jul
21
2020
Sponsored by: Abaco Systems, Concurrent Technologies, Crystal Group, Wind River
11AM EDT (in 11 days, 4 hours)
Innovation in today's military systems -- whether flight systems, cybersecurity, electronic warfare, radar, etc. -- often comes from leveraging commercial technology. This is very true when it comes artificial intelligence (AI) and machine learning (ML), game changers in many industries. Defense lea...
Jul
23
2020
Sponsored by: BlackBerry QNX
11AM EDT (in 13 days, 4 hours)
We are living in a world where devices are becoming more connected. And this opens the door to innovation and new business opportunities. But it also leaves device manufacturers and OEMs struggling to balance evolving market demands with staying ahead of the growing threat of cyberattacks and the p...
Aug
05
2020
Sponsored by: IAR Systems
11AM EDT (in 26 days, 4 hours)
Depending on your geography, or more specifically, the intended geography for your embedded design, the rules surrounding security may be different than other geographies. Different governments and other legislative bodies are continually changing the rules of the game. And again, depending on your...
Aug
12
2020
Sponsored by: IAR Systems
11AM EDT (in 1 month, 2 days)
Your IP is essentially the crown jewels of your design, if not your entire company. Hence, it’s vital to ensure that it remains secure. However, it’s not always obvious where the weak link in your protection chain resides. And there’s far more to it than the old adage of “monitor, detect, and respon...
Aug
19
2020
Sponsored by: IAR Systems
11AM EDT (in 1 month, 9 days)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...
Aug
26
2020
Sponsored by: IAR Systems
11AM EDT (in 1 month, 16 days)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Sep
02
2020
Sponsored by: IAR Systems
11AM EDT (in 1 month, 23 days)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...

View Archived Webcasts