Home > Speakers >

Shawn Prestridge

Shawn Prestridge has served as Senior Field Application Engineer at IAR Systems since 2008 and became the US FAE Team Leader in 2019; he has been in the software industry since 1993. Before joining IAR Systems he worked as Embedded Hardware/Software Engineer and with Embedded Development. Shawn holds a BS in Electrical Engineering, a BS in Mathematics, an MS in Electrical Engineering, an MS in Software Engineering and a PhD in Electrical Engineering specializing in Quantum Cryptography, all with Southern Methodist University in Dallas.

Why Should I Care About CI/CD?

Status: Available Now

Continuous Integration and Continuous Deployment (CI/CD) are all the rage today…but what does it actually mean and what can it really do for you? In this session, we’re going to talk about how it differs from traditional embedded development and what advantages CI/CD can give you, all backed up by research. We will show you how it can easily help you improve code quality and why, helping you to foreshorten your time-to-market. We’ll also tell you who all the major players are in CI/CD and finish the session by showing you how you can quickly get into the CI/CD game!

Go to Session


Live Q&A - Why Should I Care About CI/CD?

Status: Available Now

Live Q&A with Shawn Prestridge for the talk titled Why Should I Care About CI/CD?

Go to Session


The 1-Hour Security Bootcamp (2020)

Status: Available Now

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

Go to Session