Home > Tracks > all tracks >

Zynq ® Ultrascale+™ delivers Deterministic Processing for Mixed Criticality Applications in Industrial, Automotive, and Aviation Markets

Presented by Dr. Giulio Corradi

Today's market requirements are forcing increased computational requirements across all embedded applications through the use of multi-core SoCs, while simultaneously requiring the preservation of legacy real-time code often developed decades ago for single core processors. Often, the performance limitations of real-time processors lead designers to consider and use application processors to achieve desired performance at expense of determinism and worst case execution time (WCET). This webinar describes how to use the ARM Cortex® A53 application processor cluster in Zynq® Ultrascale+™ to implement real-time asymmetric multiprocessing (RTAMP). This approach results in improving worst case execution time (WCET) and reducing latency by isolating and partitioning the cluster such that software developed for single cores can be reused. Demand for this solution is has skyrocketed in Industrial, Automotive and Avionics applications because software architects strongly prefer to use an application processing cluster like a set of single cores when executing real time code. Shared resources like the level 2 cache and memory controller guarantee performances on average, however worst case execution time is affected by interference amongst cores when accessing shared caches and memories. The combination of programmable logic technology and coloured lockdown concepts for shared cache management in conjunction with the open-source Jailhouse hypervisor make it possible to use Linux and bare-metal isolated applications running independently in the cluster. The overhead introduced by a hypervisor is also reduced, making the overall approach very lean.

Go to Session

2020 Embedded Online Conference Teaser

Presented by Stephane Boucher

This is it! The 2020 Embedded Online Conference is just around the corner and here's a short teaser.

Go to Session

Agile Embedded Software Design With Virtual Hardware

Presented by EMBEDDETECH

The process of designing embedded software is often an iterative process, progressing in lock-step with the custom hardware design. During a time of global pandemic and backlogged supply chains, getting functional hardware prototypes to work productively towards validated embedded software can be a challenge. In this demonstration, you will learn how you can combine virtual hardware with real-world peripherals to create a workflow that maximizes your productivity in embedded software design and validation.

Go to Session

Android Automotive

Presented by Karim Yaghmour

Android's use in the automotive industry has been silently increasing over the past few years. While Android's use in a car inherits quite a few things from classic Embedded Android, there are several automotive-related additions to the Android Open Source Project (AOSP) that are worth a closer look. This session will cover the Car System Service, the internal Car system APIs, the built-in Car Apps, the car-related HIDLs and car-related specific features such as Exterior View System, Vehicle Properties, Audio, Power Management, wear leveling and boot time optimizations.

Go to Session

Arm® Pelion™ Device Management with PSoC® 64 Secure MCUs

Presented by Cypress

In this demo, we will show how you can securely manage IoT devices with Arm's Pelion Device Management Platform using PSoC 64 Secure MCUs from Cypress Semiconductor, an Infineon Technologies company.

Go to Session

Battery life got you down? Use Joulescope!

Presented by Jetperch

Measuring energy consumption during product development is crucial, especially for battery-powered and always-on devices. Until recently, accurate measurement has been expensive, tedious, or error-prone.

Meet Joulescope, the most affordable and easy-to-use precision DC energy analyzer. In this session, Matt Liberty, the creator of Joulescope, demonstrates how to use this exciting, new USB-connected test instrument to measure the current, voltage, power, and energy of a target device. See how Joulescope makes it easy to iterate and improve battery life. Find out why so many engineers say Joulescope is now one of their favorite and most effective tools.

Go to Session

Best Practices for Developing Real-time Embedded Systems

Presented by Jacob Beningo

Development teams are always under pressure to deliver faster and at lower costs, but this is becoming more challenging as system complexity has risen exponentially with features for IoT and Machine Learning. The increased complexity can easily handcuff a development team and lead to not just longer development cycles with higher costs but also lower quality products.

In this session, we will explore best practices for developing real-time embedded systems that will help the modern developer stay on track and produce a quality product within their development cycle. We will explore best practices ranging from how to properly architect a system for scalability, how to manage a development cycle, secure and test a system. We will also discuss best practices for using frameworks and open source software.

Go to Session

Bridging the Gap of UI Design & Development

Presented by Antti Aaltonen

Presented by The QT Company

Demand to design and develop Interactive products is raising as they are coming more and more ubiquitous.
The presentation discusses what are the common pitfalls in product development and how to enable rapid, iterative product design while ensuring great user experience.

  • Designing look AND feel of the product
  • Validating and iterating the designs with real hardware
  • Speeding up the development process and reducing the need for writing specifications

Go to Session

Bringing Low Power, High Performance Audio and Voice to Market on the i.MX RT600 Crossover MCU

Presented by Brendon Slade

Presented by NXP

Join this session to learn how DSP Concept's Audioweaver tools and libraries can unleash the performance of NXP's new i.MX RT600 MCU, allowing audio designers to quickly implement designs from the algorithm level.

Go to Session

Causal Bootstrapping

Presented by Max Little

To draw scientifically meaningful conclusions and draw reliable statistical signal processing inferences of quantitative phenomena, signal processing must take cause and effect into consideration (either implicitly or explicitly). This is particularly challenging when the relevant measurements are not obtained from controlled experimental (interventional) settings, so that cause and effect can be obscured by spurious, indirect influences. Modern predictive techniques from machine learning are capable of capturing high-dimensional, complex, nonlinear relationships between variables while relying on few parametric or probabilistic modelling assumptions. However, since these techniques are associational, applied to observational data they are prone to picking up spurious influences from non-experimental (observational) data, making their predictions unreliable. Techniques from causal inference, such as probabilistic causal diagrams and do-calculus, provide powerful (nonparametric) tools for drawing causal inferences from such observational data. However, these techniques are often incompatible with modern, nonparametric machine learning algorithms since they typically require explicit probabilistic models. I this talk I'll describe causal bootstrapping, a new set of techniques we have developed for augmenting classical nonparametric bootstrap resampling with information about the causal relationship between variables. This makes it possible to resample observational data such that, if it is possible to identify an interventional relationship from that data, new data representing that relationship can be simulated from the original observational data. In this way, we can use modern statistical machine learning and signal processing algorithms unaltered to make statistically powerful, yet causally-robust, inferences.

Go to Session

Common cryptography mistakes for software engineers

Presented by Aljoscha Lautenbach

Most implementations of security mechanisms depend on cryptography, and yet, many vulnerabilities exist because cryptography is used incorrectly. This is partly due to lacking user-friendliness of cryptographic library API designs [1][2], and partly due to a lack of education in the developer community of the underlying mechanisms. As for the API design, we can only lobby for more user-focused design during library development and advocate user-friendly libraries. We can, however, try to improve the communal understanding of how to use cryptography securely. By way of examples, this talk will explore questions such as: What is an IV and why does it matter? Why does entropy matter? Which cipher mode is appropriate for my application? In essence, we highlight points to watch out for when implementing security mechanisms using cryptography.

[1] https://www.cl.cam.ac.uk/~rja14/shb17/fahl.pdf, Comparing the Usability of Cryptographic APIs, IEEE S&P 2017

[2] http://mattsmith.de/pdfs/DevelopersAreNotTheEnemy.pdf, Developers are not the enemy! The need for usable security APIs, IEEE S&P 2016

Go to Session

Computer Vision on Arm

Presented by Arm

Computer vision, a type of artificial intelligence, enables computers to interpret and analyze the visual world, simulating the way humans see and understand their environment. Watch this video to learn more about computer vision for IoT applications, with an end-to-end proof-of-concept powered by Arm Cortex-A72, Ethos-N57 and Mali-C52 processors, and using the Arm NN software library.

Go to Session

Creating Advanced User Interfaces with STM32 Microcontrollers

Presented by Mike Hartmann

Presented by STMicroelectronics

In today's fast-paced and interactive world, it is necessary for technology to provide a simple and compelling experience to the end user.

Through advancements in graphics software frameworks and embedded technology and integration, this can be easily achieved with the STM32 microcontrollers. In this 2-hour hands-on workshop, you will be introduced to the STM32 Microcontrollers with advanced graphics technology. You will be introduced to graphics software frameworks and tools, and get hands-on experience using the STM32H7B3I-DK discovery kit with the latest STM32H7 microcontroller and the TouchGFX Designer tool.

Workshop Agenda:

  1. Advanced Graphics with STM32 Microcontrollers
  2. STM32 Graphics Software and Tools
  3. Hands-on: Quick Start with STM32H7B3I-DK Board
  4. STM32 Graphics Ecosystem and Support
  5. Hands-on: Custom Project Start with STM32 + TouchGFX

Note: The STM32H7B3I-DK board will be available at a discounted cost of $20.00 excluding shipping and handling fee to the first 100 registrants using a business email address. An email with a dedicated board link to Digi-Key Electronics website will be provided.

The materials for this workshop can be downloaded at:

https://www.dropbox.com/sh/gsvu5d8u6d9e4ga/AAC2chHAdj-q2SzmEJe5VRjUa?dl=0

Go to Session

Defending against Hackers: Exploit Mitigations and Attacks on Arm Cortex-A Devices

Presented by Maria "Azeria" Markstedter

With the proliferation of Arm-based mobile and IoT devices, exploit mitigations for Arm-based devices are often the front-line in defending these devices from hackers. For this reason it is important to understand how they work, and their limitations. This talk will look at the most common exploit mitigations available for C/C++ programs running on the Arm Cortex-A architecture and how these mitigations work under-the-hood to block certain categories of memory-corruption-based exploits. The aim of this talk is to educate developers on how hackers can bypass individual mitigations, and the importance of combining them to increase the level of security on these devices.

Go to Session

Deliver rich graphical UX without blowing your hardware costs

Presented by Aurindam Jana

Presented by The QT Company

Microcontrollers (MCUs) are ubiquitous in electronic appliances in consumer electronics, industrial automation, healthcare and the automotive industry, but the user experience of the user interfaces has been lagging behind. Users and operators expect smartphone-like user experiences with every screen they interact - a huge challenge for manufacturers to achieve. The desire to maintain existing supply chains and keeping the bill of materials low requires manufacturers to both improve the performance of their user interfaces while overcoming performance bottlenecks. Now, the most popular C++ development framework, Qt, is expanding its offering for the MCU market, with a new and lightweight implementation which enables the creation of high-performance user interfaces for the most low-end hardware. 

What will you learn during this session?

  • Display Resolutions supported by MCUs
  • Key considerations for graphics on MCUs
  • Deliver a smartphone-like User Interface with Qt
  • Memory footprint and performance indicators
  • Demos

Go to Session

Developing embedded real-time applications with heterogeneous multiprocessing systems

Presented by Sergio Prado

There are a lot of embedded applications that have conflicting requirements like high throughput and data processing, responsive user interface, low-latency operations and determinism to handle hard real-time events. It is very hard (and most of the times impossible) to meet all these requirements with just a single processor.

A common approach to meet these conflicting requirements is using multiple heterogeneous processors, where a high-end processor takes care of general computing like network communication, user interface and data processing, and a low-end processor is responsible to handle low-latency and real-time events. This type of system is called Heterogeneous Multiprocessing System or HMP.

In this session, we will learn all the theory behind the development of embedded applications using heterogeneous multiprocessing systems and put into practice with hands-on demonstrations based on a board with a heterogeneous multicore SoC containing both a Cortex-A and a Cortex-M processor, capable of running multiple operating systems on the different cores.

In the hands-on demonstration, we will learn how to run an RTOS (FreeRTOS) in the Cortex-M processor to handle deterministic and real-time events and report them back to a full-featured OS (GNU/Linux) running on the Cortex-A. We will study how the communication between the cores works and use an implementation of the OpenAMP standard in the hands-on.

In this session, the attendees will understand how a heterogeneous multiprocessing system works and when to use it. They will also learn how to use a heterogeneous multicore SoC and run multiple operating systems on it, understanding how the communication between the cores are implemented in the hardware level, and learning how this communication is abstracted at the software level with the OpenAMP standard.

Go to Session

Developing for the IoT Using Secure-enabled NXP MCUs with TrustZone®-M Technology

Presented by Tomas Voda

Presented by NXP

In this session, you'll learn how Secure Thingz Embedded Trust provides lifecycle management of secrets and integrates with Secure Deploy for production programming of NXP's LPC55Sxx devices.

Go to Session

Developing Reusable Firmware for MCUs

Presented by Jacob Beningo

Once upon a time, firmware developers wrote code that was tightly coupled, spaghetti code that was fit for a single purpose and nothing else. That has changed! The ability to reuse embedded software has the potential to decrease time to market, decrease costs and prevent teams from reinventing the wheel.

In this session, we will explore how to develop reusable firmware for microcontroller-based systems. We will explore reusable and portable firmware best practices, software architecture, how to create abstractions and walk through an example. 

Go to Session

Enabling Motor Control Across a Range of NXP MCUs with MCUXpresso and FreeMASTER Visualization Tools

Presented by Jaroslav Lepka

Presented by NXP

Join this session to explore the latest NXP motor control solutions, tools, and expert advice for creating cost-effective and energy-efficient motor control designs using NXP MCUs.

Go to Session

Exploring the Arm® TrustZone® Feature on LPC5500 Series MCUs

Presented by NXP

Arm TrustZone technology, available with the LPC5500 MCU series based on Arm® Cortex®-M33 core, provides the means to implement separation and access control to isolate trusted software and resources to reduce the attack on critical components. Watch this secure GPIO TrustZone example to better understand how to implement this feature within your design.

Go to Session

Five considerations when building secure IoT devices

Presented by Mohit Kedia

Presented by Arm

The ongoing Internet of Things (IoT) revolution is bringing online billions of devices, from fridges to traffic lights, connected and controllable from afar. Industry verticals like Utilities, Telecom, and other service providers encounter increasing security regulations, and a need to automate field equipment reading, billing, and service status updates.

Industry adoption of IoT is going to grow. For example, it is expected that there would be more than 2.5 Billion IoT devices in Power and Energy vertical by 2023. These IoT deployments are a growing target for cybercriminals; exposing individuals, their data and their privacy to risk if security is left unaddressed.  For example, 250,000 peoplein Ukraine were left without power when attackers used “Crash Override” malware to take control of power gridresulting in a shut down of 30 power substations. As a result, industries that deploy IoT will demand security that is integral to the devices and manageable through remote device management.

For device makers, this market trend underscores the need to ‘design in’ security into the devices.For example, an IoT device that has secure root of trust, remote authentication, over-the-air software patching capabilities, and other features that proactively mitigate security vulnerabilities. In order to minimize threats at each stage of a IoT device’s life cycle and to ensure security in every IoT deployment, we need to answer following key questions,

  • How to efficiently store the secrets such as device keys?
  • How to create secure processing environment for tiny IoT sensors?
  • How to ensure the data I communicate between the device and the cloud is private?
  • How to track abnormal behaviour of the device when it is compromised?
  • How to securely update the firmware of a device?

This session will present these considerations to help you identify the best approach to secure your devices for scalable IoT.

Go to Session

Flexible and Layered Embedded Firmware through Test Driven Development (TDD)

Presented by Alexopoulos Ilias

Recent years the software industry has developed different methodologies with camps to support them many of them claiming better quality of work and speed. Embedded real-time firmware due to it's challenges makes adoption of these tools more difficult as we need to test systems interacting with the hardware that have timing constraints. Not all methods work well or there is often the question if the effort is worth the benefit.

In this session we will discuss the application of TDD,

  • what is TDD and the difference with unit testing,
  • example application of the method,
  • how we can model the hardware registers transparently,
  • how to tackle challenges porting to different architectures,
  • using object oriented techniques for configurability
  • the benefits and pitfalls of the method,

The session will be based on actual application of the method on real medium scale bare-bones systems projects.

Go to Session

Get Started with TinyML

Presented by Jan Jongboom

TinyML is opening up incredible new applications for sensors on embedded devices, from predictive maintenance to health applications using vibration, audio, biosignals and much more! 99% of sensor data is discarded today due to power, cost or bandwidth constraints. 

This webinar introduces why ML is useful to unleash meaningful information from that data, how this works in practice from signal processing to neural networks, and walks the audience through hands-on examples of gesture and audio recognition using Edge Impulse.

What you will learn:

  • What is TinyML and why does it matter for real-time sensors on the edge
  • Understanding of the applications and types of sensors that benefit from ML
  • What kinds of problems ML can solve and the role of signal processing
  • Hands-on demonstration of the entire process: sensor data capture, feature extraction, model training, testing and deployment to any device

Go to Session

Getting Linux To Run On Your Custom Board

Presented by Mohammed Billoo

The ability of silicon vendors to pack more components and capability into a single silicon die has allowed these System On Chips (SoCs) to support Linux. In turn, developers have been able to quickly migrate their application to be deployed "to the edge" without significant rework. The main objective of this session is to provide embedded systems engineers an overview on the steps necessary to get Linux running on a custom board, issues they may face, and how to debug these issues. This session will provide an introduction to Linux and its value in embedded systems, and how it differs from "traditional" Linux that runs on desktops. This session will also discuss how Linux differs from other embedded software paradigms, such as "bare-metal" and RTOS-based application development.

Go to Session

Hardware Hacking: Hands-On

Presented by Colin O'Flynn

Designers releasing embedded devices need to understand what sort of hardware attacks they will face in the field. We will discuss how two different types of advanced attacks work: side channel power analysis and fault injection. Not limited to theory, we will demonstrate how they are used in practice and work through real products the attacks have been used on. Low-cost tools and open-source material will be highlighted, so the attendee can learn more details & even perform these attacks themselves.

Go to Session

How Agile is Changing the Face of Embedded Software Development

Presented by Niall Cooling

This presentation is ideal for anyone who is either new to Agile, considering using Agile or even has experience in working with Agile methodologies and practices with embedded software or firmware developments.

It will clarify the Agile landscape, covering both process based aspects, such as Scrum and various techniques, including Test Driven Development (TDD) and some of the underlying foundation principles, such as Continuous Integration (CI).

As part of the discussion, we shall look at some of the modern-day tools that help apply Agile techniques(e.g. Docker) and finally look ahead to the current gaps and where embedded systems offer particular challenges to the use of Agile techniques.

Go to Session

How to Accelerate your Career in Embedded Systems

Presented by Sam O'Leary

Moving forward in your career is harder than it used to be. People are changing jobs more regularly and no longer rely on traditional career paths to progress into higher-level positions. Understanding what is important to you and how to use those goals to progress professionally is often an underrated component of building a fulfilling career - even engineers, who are highly logical people, can sometimes neglect this way of thinking!

In this webinar, I will present a high-level overview of the embedded systems employment market, discussing how you can use this readily available information to help plan your career. In the second part, I will provide job searching and interview techniques, specifically tailored for embedded software and electronics engineers.

Go to Session

How to avoid end of life from NAND correctable errors

Presented by Thom Denholm

Presented by TUXERA

Flash media is fabulous for most use cases, but heavy reads can cause correctable errors. Linux flash file systems actually shorten the life of the media when dealing with these errors. How does this change with multiple bits per cell, including recent QLC NAND? What other sorts of media management can help get the most lifetime out of your flash media based device?

This talk will cover these sorts of problems and impacts in detail, from flash file systems to SSDs and other NAND flash-based media. While we can't speak to what the firmware in your devices are doing, we have an excellent knowledge of what they should be doing, and also detail the sorts of conversations a system designer should have with their flash media vendors.

Go to Session

How to get started with Arm Cortex-M55 software development

Presented by Christopher Seidl

Presented by Arm

IoT and embedded developers can take advantage of an unprecedented uplift in energy-efficient machine learning and signal processing performance for next-generation voice, vision or vibration use cases with Arm's latest endpoint AI technologies; The Cortex-M55 processor, Arm's most AI-capable Cortex-M processor and the Ethos-U55, the industry's first micro neural microprocessor (microNPU) that's designed to work with Cortex-M processors.

These technologies can be developed in a unified software toolchain for the simplest and fastest development path for AI. Join this talk to be one the first to get started today to write optimized code for the exciting features these processors bring.

This talk will be a hands-on demo of the development flow available with Arm tools and will cover:

  • New architectural features of the Cortex-M55 processor
  • How to benchmark an application using Cycle Model
  • How to run the application on an FPGA prototyping board
  • How to optimize your code with Keil MDK debug features

Go to Session

How to Rapidly Develop IoT devices with Arm and AWS

Presented by Reinhard Keil

Presented by Arm

Arm Cortex-M processors have been shipped in more than 45 billion chips for a vast range of applications, from industrial sensors to wearables. This growth has exploded more so in the last few years due to the significant rise in connected products for diverse markets. AWS IoT provides broad and deep functionality, spanning the edge to the cloud, so customers can build IoT solutions for virtually any use case across a wide range of devices. With designers of IoT applications under extraordinary pressure to build innovative solutions quickly, affordably, and satisfy many design requirements, how can the IoT continue to scale across a growing number of use cases? The talk provides a tour of a simple path to developing secure Cortex-M based IoT devices with Arm and AWS, and how together, the collaboration provides choice and scalability for IoT developers.

Go to Session

Implementing a Simultaneous Localization and Mapping (SLAM) system for Robotics/Unmanned Vehicles

Presented by Mike Anderson

As robotics and unmanned vehicles like drones start to proliferate, many developers find that they need a means of fixing the device to a specific location and then have the device navigate to a destination while avoiding obstacles. In addition, we frequently want the device to create a map of the surrounding area for future reference. In order to most efficiently accomplish these goals, we need to create a SLAM for the device. In this session, we will discuss the various approaches and requirements for 3D SLAMs and how they are constructed. We will address implementations ranging from autonomous cars down to robots based on platforms such as the Raspberry Pi.

Go to Session

Integrating NFC into your application: What you need to know

Presented by Dan Merino

Presented by STMicroelectronics

In this session we will show you how to overcome the most common design challenges in NFC integration to achieve optimal performance and fast time-to-market.

Near Field Communication (NFC) is a technology that uses magnetic field induction to enable contact-less data exchange between two compatible devices moved within close proximity to one another. While simple in concept, implementing a robust and high-performing NFC design can be daunting, as developers must first consider things like passing certifications, interoperability, shrinking size requirements, low power consumption, and development time.

In the session, we will start by exploring the most common NFC reader applications in today's fast-growing NFC market. We will discuss the principle design challenges faced by engineers, and how to resolve them using the ST25R3916 high-performance NFC universal reader.

This industry-leading device boasts a unique set of features including dynamic power output, automatic antenna tuning, noise suppression receiver, and low power wake up, which make it ideal for robust and efficient designs over a wide range of consumer and industrial NFC applications.

You will learn:

  • the main challenges of designing an NFC reader and how to overcome them
  • about the ST25R3916 high-performance NFC universal reader device
  • how to exploit the device's unique features to design a best-in-class solution

Go to Session

IoT Hacks: Behind the Scenes

Presented by Joe Hopper

News reports of IoT breaches are now commonplace, with manufacturers often blaming end-user misconfigurations or 'sophisticated attacks'. This implies the victim customers and organizations were simply unlucky, but have you ever wondered exactly how these hacks occurred and what could have been done to prevent them?

Joe Hopper, a professional hacker for the Fracture Labs technology security company, will walk you through:

  • How hackers target the victim devices
  • How vulnerabilities are discovered
  • How the weaknesses are exploited
  • What could have been done to prevent the breaches in the first place

Go to Session

Isolating MCU hardware and firmware using TrustZone security technology

Presented by Bob Waskeiwicz

Presented by STMicroelectronics

In the IoT and connected device marketplace, device security is paramount to protect customer information and to prevent outside attacks.

The new STM32L5 series MCU based on ARM Cortex M33 core with TrustZone technology is part of the STM32Trust Security Ecosystem, where the TrustZone is a dynamic firewall providing hardware and software isolation to the system. Developers can isolate critical security firmware, authentication and private information from other parts of the device. The STM32L5 provides crypto accelerators for Public Key, AES, Hash and a True Random Number Generator and On-the-Fly Decrypt for external memories. The STM32L5 can provide secure boot with Root Secure Services and TF-M (ARM PSA compliant Trusted Firmware) with a unique boot entry, providing a secure framework to base the system on "Root of Trust". The new series further pushes the low power footprint of our already class leading devices while offering new peripherals (USB Type C & PD) and power management innovation allowing for a class leading 62uA/MHz current consumption.

You will learn:

  • The new features and peripherals in the STM32L5
  • Understand how to create a "Root of Trust" with the STM32L5 Security features
  • How to use STM32 Trusted Package Creator
  • How to interface to other ST products (NFC) for a digital signature verification application

Go to Session

Leveraging Cryptography in Cyclone Programmer

Presented by PE Micro

Go to Session

Linux Kernel Security - Inside the Linux Security Modules (LSMs)

Presented by Vandana Salve

The Linux Security Module (LSM) framework provides a mechanism for various security checks to be hooked by new kernel extensions.

The primary users of the LSM interface are Mandatory Access Control (MAC) extensions which provide a comprehensive security policy. Examples include SELinux, Smack, Tomoyo, and AppArmor. In addition to the larger MAC extensions, other extensions can be built using the LSM to provide specific changes to system operation when these tweaks are not available in the core functionality of Linux itself.

The topic deep dives into the

  • Understanding LSMs,
  • Types of LSMs,
  • Architecture of LSM,
  • The various hooks and the functionality provided by these hooks

Go to Session

Low-Power Algorithmic Approaches in DSP Implementations

Presented by Bryant Sorensen

Hearing aid signal processing is a challenging task because of the extreme low-power, highly-constrained cycle performance required. The audio signal processing is always on, and requires complex algorithms and computations. A typical hearing aid will have multi-band analysis and synthesis, automatic feedback cancellation, environment detection and action, automatic gain control, and user interface - and AI is arriving as well. In order to reconcile the two disparate requirements (complexity vs. low power & reduced cycles), various approaches are needed to achieve low power while still providing sophisticated calculations. In this talk, I will discuss a sampling of numerical methods, shortcuts, refactorings, and approximations which significantly lower power in DSP algorithms. This will be an overview which I hope sparks thinking to extend the presented concepts to other low-power algorithmic tasks. While the focus is on algorithms and computations, some of these topics will also touch on implications to HW design, HW vs. FW tradeoffs, and ASIP / programmable DSP core design.

Go to Session

Modern Embedded Software Goes Beyond the RTOS

Presented by Miro Samek

Some of the most difficult problems with real-time and embedded programing are related to concurrent code execution as well as code organization, which all too often degenerates into "spaghetti code". These problems are usually intermittent, subtle, hard-to-reproduce, hard-to-isolate, hard-to-debug, and hard-to-remove. They pose the highest risk to the project schedule.

This session presents a set of best practices of concurrent programming, which are collectively known as the active object (or actor) design pattern. In this pattern, applications are built from event-driven, non-blocking, asynchronous, encapsulated threads (active objects), with the internal behavior of each active object controlled by a state machine.

While active objects can be implemented manually on top of a traditional RTOS, a better way is to use an active object framework. You will see how this leads to inversion of control, enables architectural reuse, and allows the framework to automatically enforce the best practices.

In the second part, the session will introduce modern hierarchical state machines as the powerful "spaghetti reducers". You will see how state machines complement active objects and enable graphical modeling and automatic code generation.

The session will utilize hands-on demonstrations using EFM32 Pearl-Gecko ARM Cortex-M4 board, the QP/C real-time embedded framework and the QM modeling and code-generation tool.

Go to Session

Mycropython Projects

Presented by Jacob Beningo

In this session, embedded systems consultant and author Jacob Beningo discusses MicroPython and how it is being used today to build products. Jacob also provides an overview of his new book MicroPython projects and demonstrates a gesture controller written completely in MicroPython.

Go to Session

Object Classification Techniques using the OpenMV Cam H7

Presented by Lorenzo Rizzello

Machine Learning for embedded systems has recently started to make sense: on-device inference reduces latency, costs and minimizes power consumption compared to cloud-based solutions. Thanks to Google TFLite Micro, and its optimized ARM CMSIS NN kernel, on-device inference now also means microcontrollers such as ARM Cortex-M processors.

In this session, we will examine machine vision examples running on the small and power-efficient OpenMV H7 camera. Attendees will learn what it takes to train models with popular desktop Machine Learning frameworks and deploy them to a microcontroller. We will take a hands-on approach, using the OpenMV camera to run the inference and detect objects placed in front of the camera.

Go to Session

Operating Systems for Embedded Applications

Presented by Colin Walls

Most modern embedded applications employ and operating system of some sort. We will look at how operating systems work - the scheduler and various services provided by an OS to the application code - and at the options open for OS selection. We will also compare the use of commercial, open source and in-house products.

Go to Session

Practical Approach for High-End Embedded System Design

Presented by Khalil Rashid

Embedded system design is very challenging as it requires multi-disciplinary expertise in Hardware, Firmware and Software. Most of embedded systems developments ends up as a failed project or not delivering performance as planned initially.  

This can be address by proper planning and selection of suitable hardware and software components. Also design goals and parameters to consider a very important to be evaluated before starting project like:

  • Hardware Complexity
  • Software Complexity
  • Time to Market
  • Development Cost
  • Certifications
  • Functional Safety and Security
  • Feasible Solution

In this seminar, we will learn how to plan a complex Embedded System from hardware, firmware and software point of view. Furthermore, we will see how actually each part will be developed by utilizing Standard off the shelf components available. This makes design simple, cost effective, feature rich and most feasible for particular market. 

Go to Session

PYNQ: Using FPGA to Accelerate Python applications

Presented by Adam Taylor

PYNQ is an open source Python framework from Xilinx which enables Python developers to access the performance provided by programmable logic, traditionally in the realm of electronic engineers. Being able to access programmable logic from Python brings with it acceleration factors of 10x, 100x and beyond to applications. This session will introduce the PYNQ framework, before demonstrating a number of image processing and machine learning applications developed using the PYNQ framework, showcasing not only the performance boost but also the ease of use.

Go to Session

Qt for MCUs. Ultimate performance. Tiny footprint.

Presented by The QT Company

Qt for MCUs is a complete graphics framework and toolkit with everything you need to design, develop, and deploy GUIs on MCUs. Run your application on bare metal or a real-time operating system.

  • Smartphone-like UX
  • Reuse code across MCU/MPUs
  • Fast development with Qt’s tools and UI language

The demo features use cases for different industries.

Catch the ‘Smartphone-like user interface without compromising on performance’ session by Aurindam Jana or find out more about Qt for MCUs here: https://www.qt.io/qt-for-mcus

Go to Session

Secure and Non-Secure application co-existence using TrustZone security technology

Presented by Bob Waskeiwicz

Presented by STMicroelectronics

This 2-hour hands-on workshop will use the STMicroelectronics NUCLEO-L552ZE-Q board to configure and activate the Cortex-M33 TrustZone to secure an application. A Blinky application will be used to demonstrate how the STM32L5 TrustZone can secure the peripherals and memory. The workshop will be divided into approximately 20-minute segments alternating between lecture and hands-on. The STM32CubeMX configuration tool will be used to configure the STM32L5 device and to generate the Blinky LED application code for secure and non-secure applications. No source code compiler or IDE is required as the pre-complied binaries will be provided. The STM32cube Programmer tool and the embedded STLINK/V3 will be used to load the binaries into the STM32L5 device.

Workshop Agenda (may change prior to event)

1.Overview of the STM32L5 and Cortex M33 Device
Hands-On: Configure and download a non-secure Blinky application

2. Overview of the TrustZone
Hands-On: Configure and download a secure Blinky application

3. Review the secure and Non-Secure application co-existence using TrustZone
Hands-On: Add the non-secure Blinky application to the trusted application.

4. Review the trustZone Faults and Regression
Hands-On: Change the non-secure Blinky application to attempt access to the secure LED.
Hands-On: Turnoff and mass erase the STM32L5 TrustZone.

The materials for this workshop can be downloaded at:

https://www.dropbox.com/sh/9r810zc8pjxg83e/AADBTOrcSGIJX43auwkT_ziya?dl=0

Go to Session

Secure Authentication for Any Core, Any Cloud

Presented by Xavier Bignalet

Presented by Microchip

During this session, you will learn about the implementation and logistic challenges to add a secure authentication in a system in the first part of the lecture. Then, you will be exposed to Microchip Trust Platform for the CryptoAuthentication and the problems are addressed to make secure authentication more accessible to the fragmented IoT market.

Go to Session

Secure Device Management for the Internet of Things

Presented by Gary Sugita

Presented by Cypress

According to IHS Markit research, the number of connected devices in the market will reach nearly 40 billion by the end of 2020. While these IoT devices can significantly improve everyday life, they come with increasing cybersecurity risks. In this session, attendees will learn how to safeguard their IoT device throughout its lifecycle, from production and provisioning through decommissioning and termination, with PSoC® 64 Secure MCUs.

Go to Session

Securing the IoT from Chip to Cloud:An Application Guide to Applying Platform Security Architecture (PSA) Principles

Presented by Jacob Beningo

With the explosive growth in the Internet of Things (IoT) and the number of devices soaring, security is critical maintain device integrity and protect user privacy.However, designing consistent security across connected devices can be a minefield to navigate and implementation can be costly.Using a smart door lock as an example, in this webinar, attendees will learn how to design security from the ground up using PSA principles and guidelines with a PSoC® 64 secure MCU from Cypress Semiconductor.

Attendees will walk away with the best practices to develop their own security solutions.In addition, the importance of secure device management throughout the IoT products lifecycle will also be reviewed.

Topics Covered in this Webinar Include:

  • Developing a threat model and Defining security counter measures
  • Maintaining asset security through hardware architecture and security IP
  • Implementing trusted boot and Secure application partitioning
  • Using Trusted Firmware-M to isolate security critical functionality from non-secure code
  • Leveraging the Arm Pelion Secure IoT Device Management Platform for full device lifecycle management (design, onboard, provision, secure, update, manage, etc.)

Go to Session

Simplifying integration of sensor data using NFC enabled Multi-Sensor Node

Presented by John Tran

Presented by STMicroelectronics

As NFC becomes ubiquitous, its applications range from mobile payment to sensor data logging. During this approximately 2 hour workshop, you will learn how to integrate NFC, sensors and a microcontroller to create an NFC Sensor node. This workshop will combine the STM32L031 low-power MCU, ST25DV NFC Dynamic Tag IC, HTS221 Humidity and Temperature Sensor, LPS22HB Barometer/Altimeter and LIS2DW12 3-axis accelerometer into the NFC Sensor node.

This workshop will cover the following topics:

  • Overview of NFC Technology
  • ST NFC Product Portfolio
  • ST Sensors Technology
  • Firmware and hardware structure
  • Using ST25R3911B NFC reader to read sensor data from the Sensor Tag.

The NFC hands-on will use the following kits and are available from our Distributors such as DigiKey or Mouser Electronics.

- ST25R3911B-DISCO (this is an NFC/RFID discovery board)
https://www.st.com/content/st_com/en/products/eval...

- STEVAL-SMARTAG1 (this is an NFC/RFIF evaluation board)
https://www.st.com/content/st_com/en/products/eval...

- CABLES USB A to Micro B

- CR2032 battery

Go to Session

Test-Driven Development for Embedded Software

Presented by James Grenning

You've heard about Test-Driven Development but have never tried it or don't quite get it. Test-Driven Development is an important design and problem solving technique that helps software developers improve product quality and the quality of their life. How? By preventing defects, protecting your code from unintended consequences, and giving you warning when your design starts to deteriorate.

In this presentation James describes the problems addressed by TDD. He will define TDD and show you a short example of TDD. He'll tell you some of the benefits you can expect from TDD as well as the challenges of applying TDD to embedded C and C++.

James Grenning is inviting you to a scheduled Zoom meeting.

Topic: TDD for Embedded Happy Hour Embedded Online Conference
Time: May 20, 2020 03:00 PM Eastern Time (US and Canada)
Every day, 2 occurrence(s)
May 20, 2020 03:00 PM
May 21, 2020 03:00 PM
Please download and import the following iCalendar (.ics) files to your calendar system.
Daily: https://us02web.zoom.us/meeting/tZYpce2ppjMrEtMuPJuyVD1AFYDeKiBVi3vc/ics?icsToken=98tyKuGqqj0uG9ydsRGARpwQBo_oLOvxiFxcj7dwiS_PFjllRlLXENtmN5l2Mu7Z

Join Zoom Meeting
https://us02web.zoom.us/j/82464188187?pwd=UEloazJyTklpZlFTRFFxVjNPdmlUQT09

Meeting ID: 824 6418 8187
Password: 031453
One tap mobile
+13017158592,,82464188187#,,1#,031453# US (Germantown)
+13126266799,,82464188187#,,1#,031453# US (Chicago)

Dial by your location
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 646 558 8656 US (New York)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
Meeting ID: 824 6418 8187
Password: 031453
Find your local number: https://us02web.zoom.us/u/kflJGFuSy

Go to Session

The 1-Hour Security Bootcamp

Presented by Shawn Prestridge

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

Go to Session

The Past, Present, and Future of Embedded Machine Learning

Presented by Pete Warden

Pete Warden, from Google's TensorFlow Lite Micro project, will be talking about how machine learning on embedding devices began, and where it's heading. ML has been deployed to microcontrollers and DSPs for many years, but until recently it has been a niche solution for very particular problems. As deep learning has revolutionized the analysis of messy sensor data from cameras, microphones, and accelerometers it has begun to spread across many more applications. He will discuss how voice interfaces are leading the charge for ML on low-power, cheap devices, and what other uses are coming. He'll also look into the future of embedded machine learning to try to predict how hardware, software and applications will be evolving over the next few years.

Go to Session

Timing Synchronization in Software Defined Radios (SDR)

Presented by Qasim Chaudhari

A Software Defined Radio (SDR) merges the two fields of digital communication and digital signal processing into an efficient implementation of transmitters and receivers. One outcome of this combination is an interesting perspective on how timing synchronization is performed in digital communication receivers. This session will explain the timing synchronization problem in both time and frequency domains and then discuss in detail a timing locked loop consisting of timing error detectors, loop filter, interpolation and interpolation control. Insights into the relation of timing synchronization with general receiver design will also be presented.

Go to Session

Tips and Tricks for Avoiding and Fixing Real-Time Issues

Presented by Olaf Schmidt

Today embedded systems are made up of a large number of hardware parts, SoC, CPU and networks. On the software side many layers of large software stacks, API and applications are used. The complexity of the systems is ever increasing. Most people set their focus on getting the multitude of functional requirements done. Functional requirements are what the customers sees in the first line.

But, hey, there are also temporal requirements in many use cases. Users expect a certain reaction time of their system. They don't care about complexity, well defined interfaces or big amounts of data being transferred. Press a button and immediately see a light switch on. In an autonomous vehicle the required time from recognizing an obstacle to making the decision to turning the steering wheel is only milliseconds. The requirements describe end-to-end timing in many cases. Data coming from an input has to be at output within a certain time. We call the data flow "event chain".

This talk will take you on a journey through a model-based approach. Using a model to design the system and its timing behavior has the big advantage, that it can be used in simulation. The simulation runs the model and shows the timing behavior of all components, busses, scheduling, end-to-end timing and so on. It is possible to try out different scenarios quickly and find the best configuration. In the talk we will look at both the system view and the device view. They have to be synchronized and contribute to the overall user experience. On the way timing requirements are formalized, evaluated and violation is reported. Timing requirements for individual parts of the systems like cores and software components can be derived from the model and simulation.

After determining the best configuration teams will spread out and start the implementation. Trace files, that contain the timing of the implementation are taken. The traces are tested against the timing requirements already defined in the design step. The adherence to all timing requirements can be check upon every step in the projects. Upcoming problems are found early.

Join me in the exciting journey of flashing the light of a car within the expected time.

Go to Session

Tuxera Reliance Edge power-failsafe file system demo

Presented by TUXERA

This demonstration shows how power interruption causes failures in the FAT file system. Tuxera's Reliance family of file systems - including Reliance Edge and Reliance EdgeNAND - is incorruptible under the same conditions. Reliance Edge™ is a small-footprint IoT embedded file system designed to capture and preserve decision-quality data. A transactional file system, Reliance Edge protects critical system and user data from corruption, specifically for systems where power loss may occur. It works with a broad array of storage media including: eMMC, SD/MMC, NVRAM, USB mass storage, and SATA (or PATA) disks, and with a wide variety of real-time operating systems.

Go to Session

Voice-enabled IoT devices, everywhere

Presented by Brian Clinton

Presented by Arm

Following the success of Voice Assistant over Smart Speaker, a new breed of voice-enable devices are services are being developed which will enable massive dissemination of voice activation services, everywhere. Smart home, smart health and Industrial applications are some of the first that will benefit with deployment through smart home appliances, health assistants and smart manufacturing. This talk goes through a case study of a constrained IoT voice assistant implementation on an ultra low power, lost cost device. It describes the hardware and software functional blocks that is needed in order to perform voice recognition in harsh audio environments. It shows the benchmarks of analog front end processing and Keyword Spotting in the system. It explains the communication and security services integration, from the root of trust to cloud communication. Finally, it analyses what the future of voice and accompanying services and devices will look like what solutions will be needed.

Go to Session

What the FAQ is an FPGA

Presented by Clive "Max" Maxfield

A lot of people design embedded systems. Some of them are the hardware design engineers who create the boards. Others are the software developers who program the boards. The one thing that most of them have in common (apart from mutual distrust of each other) is that they predominantly use microcontrollers (MCUs) as the primary processing element in their designs.

Most of them have heard of FPGAs, but all they typically know is that these devices can be programmed to perform different functions -- they don't know how. Similarly, most of them have heard about languages like Verilog and VHDL, but all they typically know is that FPGA designers use these languages to capture the design -- they don't know how these hardware description languages (HDLs) differ from programming languages like C/C++.

In this presentation, engineer, writer, and communicator Max The Magnificent (a legend in his own lunchtime) will rend the veils asunder and reveal all. Max says that we will be leaping from topic to topic with the agility of young mountain goats, so he urges attendees to dress appropriately.

Go to Session

Why MISRA Matters!

Presented by Andrew Banks

Presented by LDRA

In this talk, Andrew Banks will discuss the importance of the static analysis in general, and the MISRA C/C++ Guidelines in particular, within Verification and Validation ("V&V") activities.

It will showcase common pitfalls that MISRA seeks to help avoid, and rationale behind some of the guidelines, while introducing the recent Amendment 2 to MISRA C:2012.

The presentation will also highlight why it is important to analyse and release "production" code.

Go to Session

Working with custom ISA extensions in RISC-V

Presented by IAR Systems

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session

Working with custom ISA extensions in RISC-V

Presented by IAR Systems

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session

You've Got the Power. Manage it Wisely.

Presented by Matt Liberty

No customer wants to change or recharge batteries.  This talk explores the techniques and methods to develop products that wisely consume only the energy that they need.  Following a quick review of current, voltage, power, and energy, this session will cover:

  1. The techniques used to budget for energy consumption during the initial product design
  2. The equipment and methods used to measure voltage, current, power & energy
  3. The common ways of reducing energy consumption in your product after you have hardware and software. These techniques span both hardware and software.

Energy management applies to nearly all battery-powered products including mobile phones, toys, and Internet of Things end node.  Even always-on mains powered devices are concerned with power consumption to meet energy regulations, reduce cost, and consume less energy.  This talk will help you develop better, more energy-efficient products.

Go to Session

Register

By checking this box, you agree to our privacy policy.
By checking this box, you agree to receive more information from Embedded Online Conference and its sponsors.