Home > Tracks > all tracks >

Zynq ® Ultrascale+™ delivers Deterministic Processing for Mixed Criticality Applications in Industrial, Automotive, and Aviation Markets

Presented by Dr. Giulio Corradi

Today's market requirements are forcing increased computational requirements across all embedded applications through the use of multi-core SoCs, while simultaneously requiring the preservation of legacy real-time code often developed decades ago for single core processors. Often, the performance limitations of real-time processors lead designers to consider and use application processors to achieve desired performance at expense of determinism and worst case execution time (WCET). This webinar describes how to use the ARM Cortex® A53 application processor cluster in Zynq® Ultrascale+™ to implement real-time asymmetric multiprocessing (RTAMP). This approach results in improving worst case execution time (WCET) and reducing latency by isolating and partitioning the cluster such that software developed for single cores can be reused. Demand for this solution is has skyrocketed in Industrial, Automotive and Avionics applications because software architects strongly prefer to use an application processing cluster like a set of single cores when executing real time code. Shared resources like the level 2 cache and memory controller guarantee performances on average, however worst case execution time is affected by interference amongst cores when accessing shared caches and memories. The combination of programmable logic technology and coloured lockdown concepts for shared cache management in conjunction with the open-source Jailhouse hypervisor make it possible to use Linux and bare-metal isolated applications running independently in the cluster. The overhead introduced by a hypervisor is also reduced, making the overall approach very lean.

Go to Session

(Recording) Live Q&A Discussion - Pragmatic Methods to Decide Filter Requirements

Presented by Chris Bore

This is the live Q&A session for the talk given by Chris Bore and titled 'Pragmatic Methods to Decide Filter Requirements'

Go to Session

2020 DSP Online Conference Teaser

Presented by Stephane Boucher

This is it! The 2020 DSP Online Conference is just around the corner and here's a short teaser.

Go to Session

2020 Embedded Online Conference Teaser

Presented by Stephane Boucher

This is it! The 2020 Embedded Online Conference is just around the corner and here's a short teaser.

Go to Session

2020 IoT Online Conference Trailer

Presented by Stephane Boucher

The 2020 IoT Online Conference will be held on December 8 & 9.

Go to Session

Agile Embedded Software Design With Virtual Hardware

Presented by EMBEDDETECH

The process of designing embedded software is often an iterative process, progressing in lock-step with the custom hardware design. During a time of global pandemic and backlogged supply chains, getting functional hardware prototypes to work productively towards validated embedded software can be a challenge. In this demonstration, you will learn how you can combine virtual hardware with real-world peripherals to create a workflow that maximizes your productivity in embedded software design and validation.

Go to Session

Android Automotive

Presented by Karim Yaghmour

Android's use in the automotive industry has been silently increasing over the past few years. While Android's use in a car inherits quite a few things from classic Embedded Android, there are several automotive-related additions to the Android Open Source Project (AOSP) that are worth a closer look. This session will cover the Car System Service, the internal Car system APIs, the built-in Car Apps, the car-related HIDLs and car-related specific features such as Exterior View System, Vehicle Properties, Audio, Power Management, wear leveling and boot time optimizations.

Go to Session

Arm® Pelion™ Device Management with PSoC® 64 Secure MCUs

Presented by Cypress

In this demo, we will show how you can securely manage IoT devices with Arm's Pelion Device Management Platform using PSoC 64 Secure MCUs from Cypress Semiconductor, an Infineon Technologies company.

Go to Session

Attack IoT System Unknowns with Tracer Bullets

Presented by James Grenning

A blank page can be very intimidating, even for a Test-driven developer. Where do we start? Write a test, right? Not always.

I’ve heard TDD learners say: “I don’t know what my code needs to do, how can I write a test? I need to write some code first.” I used to make a flippant reply to that, like: “You don’t know what your code needs to do! How could you possibly start with the code! Tests describe what the code must do. How can you write the code if you don’t know what the code is supposed to do?”

Sometimes, it’s simply a matter of software with interface, boundaries and constraints understood or under your control. When it’s simply a matter of software, take some guidance from ZOMBIES! Start with the simplest cases (Zero an One) to get the Interface in place, generalize (to Many) and then make sure the anticipated Exceptional and Boundary cases are all covered with Simple test scenarios. ZOMBIES can really help, except when they can’t.

With my most recent green-field side-project, interacting with Commercial Off The Shelf hardware and software (COTS),I found that unknowns prevented me from writing tests. I totally get that helpless feeling (again) of not knowing what test to write! In Hexagonal Architecture (a.k.a. Ports and Adapters), we strive to separate the land where ZOMBIES rule and where we need something else. In the core of the hexagonal architecture, ZOMBIES rule, in the Adapters we need to discover what works.

In this session we’ll look at how ZOMBIES help sneak up on the solution. In the adapters we need a DIRECT approach to Determine, discover and Isolate Risk, and Encapsulate Current Technology. DIRECT helps isolate and understand things out of our control.

In this talk we’ll explore the challenges and risks developing a real-time water pressure measuring system. We’ll look at how to get to a walking skeleton of the product together by discovering what is needed to get this stack of technologies elements working together:

  • Analog to digital converter (ADC)
  • Serial peripheral interface (SPI)
  • Micro-controller
  • IoT radio
  • IoT mesh network
  • Little Linux box
  • Web-server
  • JSON and javascript driven browser.

In a multi-layered system like this there are unknowns hide at every boundary. We’ll look at how we address the unknowns DIRECTly, striving to get to where ZOMBIES can guide. Integration is considered from the beginning because that is where the risk is.

There are more risks than strictly technical risks. Business risk assessment will impact technical choices. If we can build it, will it be affordable and profitable? How do we track progress in the face of significant risk. We’ll look at both the technical approach and how to keep progress and risk mitigation visible.

Go to Session

Battery life got you down? Use Joulescope!

Presented by Jetperch

Measuring energy consumption during product development is crucial, especially for battery-powered and always-on devices. Until recently, accurate measurement has been expensive, tedious, or error-prone.

Meet Joulescope, the most affordable and easy-to-use precision DC energy analyzer. In this session, Matt Liberty, the creator of Joulescope, demonstrates how to use this exciting, new USB-connected test instrument to measure the current, voltage, power, and energy of a target device. See how Joulescope makes it easy to iterate and improve battery life. Find out why so many engineers say Joulescope is now one of their favorite and most effective tools.

Go to Session

Batteryless Sensing Systems Powered by Light

Presented by Andres Gomez

Over the last decade, energy harvesting has seen significant growth as different markets adopt green, sustainable ways to produce electrical energy. Even though costs have fallen, the embedded computing and internet-of-things community have not yet widely adopted energy harvesting-based solutions. This is partly due to a mismatch between power density in energy harvesters and electronic devices which, until recently, required a battery to be functional. This mismatch is especially accentuated in indoor environments, where there is comparably less primary energy available than in outdoor environments. In this talk, I will focus on photovoltaic harvesting, which has little requirements and a high energy density. Furthermore, I will present a design methodology based on source-load decoupling that can optimize energy flow in dynamic environments. To demonstrate its general applicability, I will present studies on the availability of indoor-based energy and a batteryless smartcard designed for efficient operation using only indoor lighting to sense environmental data and emit Bluetooth beacons.

Key Learning Points:

  • Energy Harvesting Technologies
  • Maximum Power Point Tracking for Photovoltaic Cells
  • Cold Start of Harvesting-Based Systems
  • Low Power System Design
  • Batteryless Sensing Systems

Go to Session

Best Practices for Designing IoT Edge Devices

Presented by Jacob Beningo

Development teams are always under pressure to deliver faster and at lower costs, but this is becoming more challenging as system complexity has risen exponentially with features for IoT and Machine Learning. The increased complexity can easily handcuff a development team and lead to not just longer development cycles with higher costs but also lower quality products.

In this session, we will explore best practices for developing real-time embedded systems that will help the modern developer stay on track and produce a quality product within their development cycle. We will explore best practices ranging from how to properly architect a system for scalability, how to manage a development cycle, secure and test a system. We will also discuss best practices for using frameworks and open source software.

Go to Session

Best Practices for Developing Real-time Embedded Systems

Presented by Jacob Beningo

Development teams are always under pressure to deliver faster and at lower costs, but this is becoming more challenging as system complexity has risen exponentially with features for IoT and Machine Learning. The increased complexity can easily handcuff a development team and lead to not just longer development cycles with higher costs but also lower quality products.

In this session, we will explore best practices for developing real-time embedded systems that will help the modern developer stay on track and produce a quality product within their development cycle. We will explore best practices ranging from how to properly architect a system for scalability, how to manage a development cycle, secure and test a system. We will also discuss best practices for using frameworks and open source software.

Go to Session

Bridging the Gap of UI Design & Development

Presented by Antti Aaltonen

Presented by The QT Company

Demand to design and develop Interactive products is raising as they are coming more and more ubiquitous.
The presentation discusses what are the common pitfalls in product development and how to enable rapid, iterative product design while ensuring great user experience.

  • Designing look AND feel of the product
  • Validating and iterating the designs with real hardware
  • Speeding up the development process and reducing the need for writing specifications

Go to Session

Bringing Low Power, High Performance Audio and Voice to Market on the i.MX RT600 Crossover MCU

Presented by Brendon Slade

Presented by NXP

Join this session to learn how DSP Concept's Audioweaver tools and libraries can unleash the performance of NXP's new i.MX RT600 MCU, allowing audio designers to quickly implement designs from the algorithm level.

Go to Session

Building a Global IoT Ecosystem of 120K IoT Developers

Presented by Wienke Giezeman

Wienke Giezeman will discuss the secrets behind the success of The Things Network and how they build a globally recognized IoT ecosystem

Go to Session

Causal Bootstrapping

Presented by Max Little

To draw scientifically meaningful conclusions and draw reliable statistical signal processing inferences of quantitative phenomena, signal processing must take cause and effect into consideration (either implicitly or explicitly). This is particularly challenging when the relevant measurements are not obtained from controlled experimental (interventional) settings, so that cause and effect can be obscured by spurious, indirect influences. Modern predictive techniques from machine learning are capable of capturing high-dimensional, complex, nonlinear relationships between variables while relying on few parametric or probabilistic modelling assumptions. However, since these techniques are associational, applied to observational data they are prone to picking up spurious influences from non-experimental (observational) data, making their predictions unreliable. Techniques from causal inference, such as probabilistic causal diagrams and do-calculus, provide powerful (nonparametric) tools for drawing causal inferences from such observational data. However, these techniques are often incompatible with modern, nonparametric machine learning algorithms since they typically require explicit probabilistic models. I this talk I'll describe causal bootstrapping, a new set of techniques we have developed for augmenting classical nonparametric bootstrap resampling with information about the causal relationship between variables. This makes it possible to resample observational data such that, if it is possible to identify an interventional relationship from that data, new data representing that relationship can be simulated from the original observational data. In this way, we can use modern statistical machine learning and signal processing algorithms unaltered to make statistically powerful, yet causally-robust, inferences.

Go to Session

Common cryptography mistakes for software engineers

Presented by Aljoscha Lautenbach

Most implementations of security mechanisms depend on cryptography, and yet, many vulnerabilities exist because cryptography is used incorrectly. This is partly due to lacking user-friendliness of cryptographic library API designs [1][2], and partly due to a lack of education in the developer community of the underlying mechanisms. As for the API design, we can only lobby for more user-focused design during library development and advocate user-friendly libraries. We can, however, try to improve the communal understanding of how to use cryptography securely. By way of examples, this talk will explore questions such as: What is an IV and why does it matter? Why does entropy matter? Which cipher mode is appropriate for my application? In essence, we highlight points to watch out for when implementing security mechanisms using cryptography.

[1] https://www.cl.cam.ac.uk/~rja14/shb17/fahl.pdf, Comparing the Usability of Cryptographic APIs, IEEE S&P 2017

[2] http://mattsmith.de/pdfs/DevelopersAreNotTheEnemy.pdf, Developers are not the enemy! The need for usable security APIs, IEEE S&P 2016

Go to Session

Comprehensive Cyber Hygiene of IoT Systems

Presented by John Gallagher

Security cameras are the most deployed “IoT” devices according to IT managers in a recent study by Spiceworks and Cradlepoint. Security of IoT devices is the highest concern of these IT managers. In addition, according to a recent Harvard Business Review survey of facilities managers, more than 60% of successful cyber attacks against organizations come through IoT building systems, with video surveillance the number 2 place for such attacks to be launched from. Despite the clear and urgent imperative for comprehensive cyber hygiene of physical security systems, it is not happening very quickly. There are both new processes that need to be added, and existing processes must become more automated. While many organizations are aware of the need to update firmware, they are not yet aware of other cyber hygiene capabilities like using TLS or 802.1x certificates at the device level, or having a comprehensive password management process. The learning objectives for this session will be to understand that comprehensive cyber hygiene must incorporate management of passwords, firmware, and certificates, and to best achieve that at scale.

Go to Session

Computer Vision on Arm

Presented by Arm

Computer vision, a type of artificial intelligence, enables computers to interpret and analyze the visual world, simulating the way humans see and understand their environment. Watch this video to learn more about computer vision for IoT applications, with an end-to-end proof-of-concept powered by Arm Cortex-A72, Ethos-N57 and Mali-C52 processors, and using the Arm NN software library.

Go to Session

Continuous Software Improvement with IoT Device Monitoring and Visual Trace Diagnostics

Presented by Dr. Johan Kraft

Presented by Percepio

Even the best developers cannot anticipate all the issues that may occur in deployed Internet of Things (IoT) devices: elusive software bugs, hardware glitches, algorithms that do not perform as well as intended, and user-interface issues. DevAlert enables continuous software improvement, so you can build flawless products through data-driven product improvements and the rapid resolution of remaining issues that would otherwise harm data integrity, device availability, battery life, and the overall user experience. Instead, IoT device monitoring and visual trace diagnostics adds an essential layer of defense to reduce support costs and increases sales revenue—and may even prevent accidents, product recalls and legal action.

Join Dr. Johan Kraft as he explores IoT device monitoring and remote diagnostics and demonstrates Percepio's DevAlert service.

Go to Session

Creating Advanced User Interfaces with STM32 Microcontrollers

Presented by Mike Hartmann

Presented by STMicroelectronics

In today's fast-paced and interactive world, it is necessary for technology to provide a simple and compelling experience to the end user.

Through advancements in graphics software frameworks and embedded technology and integration, this can be easily achieved with the STM32 microcontrollers. In this 2-hour hands-on workshop, you will be introduced to the STM32 Microcontrollers with advanced graphics technology. You will be introduced to graphics software frameworks and tools, and get hands-on experience using the STM32H7B3I-DK discovery kit with the latest STM32H7 microcontroller and the TouchGFX Designer tool.

Workshop Agenda:

  1. Advanced Graphics with STM32 Microcontrollers
  2. STM32 Graphics Software and Tools
  3. Hands-on: Quick Start with STM32H7B3I-DK Board
  4. STM32 Graphics Ecosystem and Support
  5. Hands-on: Custom Project Start with STM32 + TouchGFX

Note: The STM32H7B3I-DK board will be available at a discounted cost of $20.00 excluding shipping and handling fee to the first 100 registrants using a business email address. An email with a dedicated board link to Digi-Key Electronics website will be provided.

The materials for this workshop can be downloaded at:

https://www.dropbox.com/sh/gsvu5d8u6d9e4ga/AAC2chHAdj-q2SzmEJe5VRjUa?dl=0

Go to Session

Defending against Hackers: Exploit Mitigations and Attacks on Arm Cortex-A Devices

Presented by Maria "Azeria" Markstedter

With the proliferation of Arm-based mobile and IoT devices, exploit mitigations for Arm-based devices are often the front-line in defending these devices from hackers. For this reason it is important to understand how they work, and their limitations. This talk will look at the most common exploit mitigations available for C/C++ programs running on the Arm Cortex-A architecture and how these mitigations work under-the-hood to block certain categories of memory-corruption-based exploits. The aim of this talk is to educate developers on how hackers can bypass individual mitigations, and the importance of combining them to increase the level of security on these devices.

Go to Session

Deliver rich graphical UX without blowing your hardware costs

Presented by Aurindam Jana

Presented by The QT Company

Microcontrollers (MCUs) are ubiquitous in electronic appliances in consumer electronics, industrial automation, healthcare and the automotive industry, but the user experience of the user interfaces has been lagging behind. Users and operators expect smartphone-like user experiences with every screen they interact - a huge challenge for manufacturers to achieve. The desire to maintain existing supply chains and keeping the bill of materials low requires manufacturers to both improve the performance of their user interfaces while overcoming performance bottlenecks. Now, the most popular C++ development framework, Qt, is expanding its offering for the MCU market, with a new and lightweight implementation which enables the creation of high-performance user interfaces for the most low-end hardware. 

What will you learn during this session?

  • Display Resolutions supported by MCUs
  • Key considerations for graphics on MCUs
  • Deliver a smartphone-like User Interface with Qt
  • Memory footprint and performance indicators
  • Demos

Go to Session

Demo: Using Arm Cortex-M55 with Arm Keil MDK

Presented by Christopher Seidl

Presented by Arm

IoT and embedded developers can take advantage of an unprecedented uplift in energy-efficient machine learning and signal processing performance for next-generation voice, vision or vibration use cases with Arm's latest endpoint AI technologies; The Cortex-M55 processor, Arm's most AI-capable Cortex-M processor and the Ethos-U55, the industry's first micro neural microprocessor (microNPU) that's designed to work with Cortex-M processors.

These technologies can be developed in a unified software toolchain for the simplest and fastest development path for AI. Join this talk to be one the first to get started today to write optimized code for the exciting features these processors bring.

This video is a quick tutorial on Arm Cortex M55

Go to Session

Demo: Using Arm Cortex-M55 with Arm Keil MDK

Presented by Christopher Seidl

Presented by Arm

IoT and embedded developers can take advantage of an unprecedented uplift in energy-efficient machine learning and signal processing performance for next-generation voice, vision or vibration use cases with Arm's latest endpoint AI technologies; The Cortex-M55 processor, Arm's most AI-capable Cortex-M processor and the Ethos-U55, the industry's first micro neural microprocessor (microNPU) that's designed to work with Cortex-M processors.

These technologies can be developed in a unified software toolchain for the simplest and fastest development path for AI. Join this talk to be one the first to get started today to write optimized code for the exciting features these processors bring.

This video is a quick tutorial on Arm Cortex M55

Go to Session

Demystifying Beamformers

Presented by Paul Beckmann

Lately there has been a resurgence of interest in beamformers following the success of the Amazon Echo. This talk presents beamformers in a simple-to-understand and straightforward light. You'll understand how the number of microphones and geometry impacts performance. The importance of microphone matching and SNR, and even how to create steerable arrays. The talk has a minimum of math and an emphasis on practical applications. Although the focus is on audio, the techniques presented extend to other applications such as RF.

Go to Session

Developing embedded real-time applications with heterogeneous multiprocessing systems

Presented by Sergio Prado

There are a lot of embedded applications that have conflicting requirements like high throughput and data processing, responsive user interface, low-latency operations and determinism to handle hard real-time events. It is very hard (and most of the times impossible) to meet all these requirements with just a single processor.

A common approach to meet these conflicting requirements is using multiple heterogeneous processors, where a high-end processor takes care of general computing like network communication, user interface and data processing, and a low-end processor is responsible to handle low-latency and real-time events. This type of system is called Heterogeneous Multiprocessing System or HMP.

In this session, we will learn all the theory behind the development of embedded applications using heterogeneous multiprocessing systems and put into practice with hands-on demonstrations based on a board with a heterogeneous multicore SoC containing both a Cortex-A and a Cortex-M processor, capable of running multiple operating systems on the different cores.

In the hands-on demonstration, we will learn how to run an RTOS (FreeRTOS) in the Cortex-M processor to handle deterministic and real-time events and report them back to a full-featured OS (GNU/Linux) running on the Cortex-A. We will study how the communication between the cores works and use an implementation of the OpenAMP standard in the hands-on.

In this session, the attendees will understand how a heterogeneous multiprocessing system works and when to use it. They will also learn how to use a heterogeneous multicore SoC and run multiple operating systems on it, understanding how the communication between the cores are implemented in the hardware level, and learning how this communication is abstracted at the software level with the OpenAMP standard.

Go to Session

Developing for the IoT Using Secure-enabled NXP MCUs with TrustZone®-M Technology

Presented by Tomas Voda

Presented by NXP

In this session, you'll learn how Secure Thingz Embedded Trust provides lifecycle management of secrets and integrates with Secure Deploy for production programming of NXP's LPC55Sxx devices.

Go to Session

Developing Reusable Firmware for MCUs

Presented by Jacob Beningo

Once upon a time, firmware developers wrote code that was tightly coupled, spaghetti code that was fit for a single purpose and nothing else. That has changed! The ability to reuse embedded software has the potential to decrease time to market, decrease costs and prevent teams from reinventing the wheel.

In this session, we will explore how to develop reusable firmware for microcontroller-based systems. We will explore reusable and portable firmware best practices, software architecture, how to create abstractions and walk through an example. 

Go to Session

Developing Rugged IoT Devices by Integrating Off-the-Shelf Hardware

Presented by Sai Yamanoor

The availability of IoT hardware prototyping platforms (e.g.: an Arduino shield or the ‘Feather’ form factor) enables the construction of ‘quick and dirty’ prototypes. The effort required to convert the prototype into a product is of a higher magnitude. There are several factors to consider including product form factor, power options, target costs, etc. Problems in connected hardware development tend to surface either during the later phases of development or during pilot manufacturing of the product.

The talk is going to be structured around a hardware design example whose target unit cost is supposed to be sub $100. The following is discussed:

  • Utilizing rapid prototyping tools like 3D printing and a low-cost 24-hour turn-around PCB fab to effectively iterate hardware design
  • Criteria to consider for selecting off-the-shelf hardware for your product
  • Estimating product development costs to avoid surprises in your budget
  • Product lifecycle management including planning for hardware obsolescence & parts approaching end-of-life
  • Things to consider while integrating off-the-shelf hardware & third-party tools e.g.: recurring costs for cloud services, platform fee, billing structure, etc.

Go to Session

DSP in Phased Array 3D Imaging

Presented by Chris Bore

Phase is often the poor relation to magnitude in Fourier Transform analysis but can be the crucial measurement in some applications. Such is the case with phased array methods for imaging: in radar, security and medical imaging applications. The key to such applications is physics modelling and measurement of phase to reconstruct wave propagation and hence reconstruct 3D or 4D images of reflecting, refracting or scattering objects. This talk offers an overview of phased array imaging from the viewpoint of DSP, modelled as a 3D Fourier or Laplace Transform problem.

Go to Session

Easy CI/CD for Embedded IoT Devices

Presented by Dustin Reynolds

Continuous Integration and Continuous Delivery are a great fit for embedded IoT devices, and it has never been easier to get started with it. CI/CD lets you perform automated code quality and functionality tests against your firmware and software prior to it being deployed to your fleet.  

I will build a container-based CI/CD pipeline using Concourse CI using a popular IoT based embedded platform.  I will review the design of the CI/CD pipeline, showing all the details to build your own and conclude with a demo showing the full workflow from source code commit to automated update using the CI/CD pipeline.

Go to Session

Enabling Motor Control Across a Range of NXP MCUs with MCUXpresso and FreeMASTER Visualization Tools

Presented by Jaroslav Lepka

Presented by NXP

Join this session to explore the latest NXP motor control solutions, tools, and expert advice for creating cost-effective and energy-efficient motor control designs using NXP MCUs.

Go to Session

Enterprise Collaboration in Post-COVID world

Presented by Arun Rajasekaran

Digital transformation is accelerating the evolution of IoT-to-Cloud architecture. Technology innovation from Silicon to Software, that initially was intended for cloud computing is now fast making its way to the end-point devices at the edge of the network. As a result, the edge devices are in the cusp of becoming way more smarter than they have ever been to take collaboration to the next level. Video and Audio are collaboration’s key corner stone technologies. A combination of modern Machine Learning techniques and traditional signal-processing techniques are bound to change for good how we collaborate in the future.

Go to Session

Envisaging Real-time Industrial and Intelligent Applications leveraging the Edge AI Paradigm

Presented by Pethuru Raj Chelliah

There are a bevy of digital transformation technologies and tools emerging and evolving fast in the recent past in order to fulfill the digital life dream. The strategically imperative combination of edge/fog computing and artificial intelligence (AI) paradigms is being touted as the distinct innovation and disruption for enterprises to visualize and realize next-generation software services and applications. 

This talk is primarily intended to convey the latest trends and transitions happening in the edge/fog computing space, artificial intelligence(AI), the Internet of Things (IoT), block chain, digital twins, 5G, real-time and streaming data analytics, industry 4.5 vision, edge device monitoring, automated edge application deployment, governance, orchestration and management, etc.  There are AI chips exclusively to be used in edge devices to accelerate intelligent processing at edge. There are AI toolkits and platforms for facilitating edge intelligence. The proposed talk covers all these noteworthy developments in order to accentuate and articulate how the latest improvisations at chip, algorithm, and tool levels come handy in implementing and sustaining the relatively new field of edge AI. The talk also will cover the various industrial use cases such as smart factories, self-driving vehicles, robots-assisted surgeries, etc. out of the delectable technology clusters. 

Edge AI (alternatively termed as intelligent processing at edge, edge intelligence, intelligent edge or intelligence at edge) is being proclaimed as the next-generation technology paradigm to realize real-world intelligent applications and services for accelerating, augmenting and automating most of the industrial as well as people activities in real time. Capturing, cleansing and crunching edge device data in real-time can bring forth a number of real-time applications. Further on, with the increased usage of data analytics and AI toolkits in edge devices, business houses and commoners can gain hitherto unknown, sophisticated and situation-aware services. 

  1. The prominent topics to be discussed include
  2. Edge/Fog Computing
  3. The formation of Edge Device Clusters/Clouds
  4. Simplifying Edge Data Analytics
  5. 5G for Edge Computing
  6. The Emergence of AI-centric Chipsets
  7. Running AI Algorithms on Edge Devices
  8. Some Prominent Industry Use Cases using Edge AI

Go to Session

Exploring the Arm® TrustZone® Feature on LPC5500 Series MCUs

Presented by NXP

Arm TrustZone technology, available with the LPC5500 MCU series based on Arm® Cortex®-M33 core, provides the means to implement separation and access control to isolate trusted software and resources to reduce the attack on critical components. Watch this secure GPIO TrustZone example to better understand how to implement this feature within your design.

Go to Session

Five considerations when building secure IoT devices

Presented by Mohit Kedia

Presented by Arm

The ongoing Internet of Things (IoT) revolution is bringing online billions of devices, from fridges to traffic lights, connected and controllable from afar. Industry verticals like Utilities, Telecom, and other service providers encounter increasing security regulations, and a need to automate field equipment reading, billing, and service status updates.

Industry adoption of IoT is going to grow. For example, it is expected that there would be more than 2.5 Billion IoT devices in Power and Energy vertical by 2023. These IoT deployments are a growing target for cybercriminals; exposing individuals, their data and their privacy to risk if security is left unaddressed.  For example, 250,000 peoplein Ukraine were left without power when attackers used “Crash Override” malware to take control of power gridresulting in a shut down of 30 power substations. As a result, industries that deploy IoT will demand security that is integral to the devices and manageable through remote device management.

For device makers, this market trend underscores the need to ‘design in’ security into the devices.For example, an IoT device that has secure root of trust, remote authentication, over-the-air software patching capabilities, and other features that proactively mitigate security vulnerabilities. In order to minimize threats at each stage of a IoT device’s life cycle and to ensure security in every IoT deployment, we need to answer following key questions,

  • How to efficiently store the secrets such as device keys?
  • How to create secure processing environment for tiny IoT sensors?
  • How to ensure the data I communicate between the device and the cloud is private?
  • How to track abnormal behaviour of the device when it is compromised?
  • How to securely update the firmware of a device?

This session will present these considerations to help you identify the best approach to secure your devices for scalable IoT.

Go to Session

Flexible and Layered Embedded Firmware through Test Driven Development (TDD)

Presented by Alexopoulos Ilias

Recent years the software industry has developed different methodologies with camps to support them many of them claiming better quality of work and speed. Embedded real-time firmware due to it's challenges makes adoption of these tools more difficult as we need to test systems interacting with the hardware that have timing constraints. Not all methods work well or there is often the question if the effort is worth the benefit.

In this session we will discuss the application of TDD,

  • what is TDD and the difference with unit testing,
  • example application of the method,
  • how we can model the hardware registers transparently,
  • how to tackle challenges porting to different architectures,
  • using object oriented techniques for configurability
  • the benefits and pitfalls of the method,

The session will be based on actual application of the method on real medium scale bare-bones systems projects.

Go to Session

Frequency Domain Signal Processing

Presented by John Edwards

Frequency domain signal processing is not just about using the Fast Fourier Transform for calculating a power spectrum, it is also a very efficient method of processing signals compared to traditional time domain techniques. This presentation will describe several common frequency domain algorithms and show how they are used. Examples will include Frequency Domain Filtering, Time Delay Estimation and Interpolation; and more.

Go to Session

Get Started with TinyML

Presented by Jan Jongboom

TinyML is opening up incredible new applications for sensors on embedded devices, from predictive maintenance to health applications using vibration, audio, biosignals and much more! 99% of sensor data is discarded today due to power, cost or bandwidth constraints. 

This webinar introduces why ML is useful to unleash meaningful information from that data, how this works in practice from signal processing to neural networks, and walks the audience through hands-on examples of gesture and audio recognition using Edge Impulse.

What you will learn:

  • What is TinyML and why does it matter for real-time sensors on the edge
  • Understanding of the applications and types of sensors that benefit from ML
  • What kinds of problems ML can solve and the role of signal processing
  • Hands-on demonstration of the entire process: sensor data capture, feature extraction, model training, testing and deployment to any device

Go to Session

Getting Linux To Run On Your Custom Board

Presented by Mohammed Billoo

The ability of silicon vendors to pack more components and capability into a single silicon die has allowed these System On Chips (SoCs) to support Linux. In turn, developers have been able to quickly migrate their application to be deployed "to the edge" without significant rework. The main objective of this session is to provide embedded systems engineers an overview on the steps necessary to get Linux running on a custom board, issues they may face, and how to debug these issues. This session will provide an introduction to Linux and its value in embedded systems, and how it differs from "traditional" Linux that runs on desktops. This session will also discuss how Linux differs from other embedded software paradigms, such as "bare-metal" and RTOS-based application development.

Go to Session

Hardware Hacking: Hands-On

Presented by Colin O'Flynn

Designers releasing embedded devices need to understand what sort of hardware attacks they will face in the field. We will discuss how two different types of advanced attacks work: side channel power analysis and fault injection. Not limited to theory, we will demonstrate how they are used in practice and work through real products the attacks have been used on. Low-cost tools and open-source material will be highlighted, so the attendee can learn more details & even perform these attacks themselves.

Go to Session

Hawkbit and SWUpdate for OTA Updates of Linux IoT Devices

Presented by Mohammed Billoo

Linux-based IoT devices don't have a flat Flash structure that allows for a straightforward OTA update process. There are a multitude of bootloader, kernel, and root file system combinations that must be taken into consideration, along with the different failure modes. The combination of Hawkbit and SWUpdate aim to standardize the OTA update process for IoT devices running Linux. This session will provide an overview of Hawkbit and SWUpdate, the different components that can be updated, and the different failure modes that are supported. A case study will be presented to demonstrate how to set up Hawkbit and SWUpdate to support OTA updates for a Linux-based IoT device. Finally, ongoing work by the presenter to address current shortcomings will be discussed.

Go to Session

High Resolution Spectral Analysis Using Channelizers

Presented by Ric Losada

Modern spectral estimation is most often done using FFTs. Spectral windows are used to tradeoff spectral leakage for resolution (the ability to distinguish between spectral lines that are close to each other). Rectangular, flat-top, Hann, Kaiser windows (among others) are all commonly used, and each have their strengths and weaknesses. The window + FFT approach is called a (modified) periodograms and, when used in conjunction with overlapping and averaging, Welch’s method.

We discuss here an alternative to this approach using efficient polyphase-FFT filter banks (a.k.a. channelizers). Channelizers find wide application in wireless communications systems. The analysis filter bank can also be used for high resolution spectral analysis. The tradeoff between resolution and spectral leakage is much less of an issue with the channelizer approach. You’ll also get more stable and accurate peaks and a more consistent noise floor. Channelizers are the modern/digital equivalent of sweeping a narrow bandpass filter across the spectrum and computing the average power of its output. However, there is no sweeping required and no spectral window either.

Go to Session

How Agile is Changing the Face of Embedded Software Development

Presented by Niall Cooling

This presentation is ideal for anyone who is either new to Agile, considering using Agile or even has experience in working with Agile methodologies and practices with embedded software or firmware developments.

It will clarify the Agile landscape, covering both process based aspects, such as Scrum and various techniques, including Test Driven Development (TDD) and some of the underlying foundation principles, such as Continuous Integration (CI).

As part of the discussion, we shall look at some of the modern-day tools that help apply Agile techniques(e.g. Docker) and finally look ahead to the current gaps and where embedded systems offer particular challenges to the use of Agile techniques.

Go to Session

How LPWANs can help your IoT project

Presented by Pedro Bertoleti

LPWANs play a major role in IoT systems, making low energy demanding and long range communication range projects possible to be done. 
In this talk, LoRaWAN and SigFox LPWANs will be discussed. This discussion goes from its ground-basics (such as explaining what are LPWANs and what they're used for) to the details and differences of LoRaWAN and SigFox and real use cases of both LPWANs. 
Talk topics:

  • What is a LPWAN?
  • Common features of LPWANs
  • Why are LPWANs so important for IoT?
  • LoRa and LoRaWAN: overview
  • SigFox: overview
  • SigFox and LoRaWAN: classes and how to use each class
  • Key factors when choosing a LPWAN for your project
  • Real use cases: SigFox
  • Real use cases: LoRaWAN 

Go to Session

How to Accelerate your Career in Embedded Systems

Presented by Sam O'Leary

Moving forward in your career is harder than it used to be. People are changing jobs more regularly and no longer rely on traditional career paths to progress into higher-level positions. Understanding what is important to you and how to use those goals to progress professionally is often an underrated component of building a fulfilling career - even engineers, who are highly logical people, can sometimes neglect this way of thinking!

In this webinar, I will present a high-level overview of the embedded systems employment market, discussing how you can use this readily available information to help plan your career. In the second part, I will provide job searching and interview techniques, specifically tailored for embedded software and electronics engineers.

Go to Session

How to avoid end of life from NAND correctable errors

Presented by Thom Denholm

Presented by TUXERA

Flash media is fabulous for most use cases, but heavy reads can cause correctable errors. Linux flash file systems actually shorten the life of the media when dealing with these errors. How does this change with multiple bits per cell, including recent QLC NAND? What other sorts of media management can help get the most lifetime out of your flash media based device?

This talk will cover these sorts of problems and impacts in detail, from flash file systems to SSDs and other NAND flash-based media. While we can't speak to what the firmware in your devices are doing, we have an excellent knowledge of what they should be doing, and also detail the sorts of conversations a system designer should have with their flash media vendors.

Go to Session

How to Design a Multi-Technology Outdoor-Indoor Tracking Device

Presented by Nicolas Jordan

In this talk, we will introduce the start of the heart of technologies (BLE, Wifi, LoRaWAN…) to deploy a wide range of IoT tracking solutions while minimizing the Total Cost of Ownership (TCO) of IoT geolocation use cases.

With new generations of integrated low cost module, we will see how to allow engineering efforts focus on use cases, optimizing time-to-market and costs, by using less complex PCBs reducing certification risk and budget, as well as testing time and cost for mass production.

Go to Session

How to get started with Arm Cortex-M55 software development

Presented by Christopher Seidl

Presented by Arm

IoT and embedded developers can take advantage of an unprecedented uplift in energy-efficient machine learning and signal processing performance for next-generation voice, vision or vibration use cases with Arm's latest endpoint AI technologies; The Cortex-M55 processor, Arm's most AI-capable Cortex-M processor and the Ethos-U55, the industry's first micro neural microprocessor (microNPU) that's designed to work with Cortex-M processors.

These technologies can be developed in a unified software toolchain for the simplest and fastest development path for AI. Join this talk to be one the first to get started today to write optimized code for the exciting features these processors bring.

This talk will be a hands-on demo of the development flow available with Arm tools and will cover:

  • New architectural features of the Cortex-M55 processor
  • How to benchmark an application using Cycle Model
  • How to run the application on an FPGA prototyping board
  • How to optimize your code with Keil MDK debug features

Go to Session

How to Guarantee a Successful Outcome When Recruiting Technical Talent

Presented by Lance Harvie

Recruiting is the lifeblood of every company getting it right could make the difference between being great or just plain average.

What you will learn in this talk: (This only applies to technical recruiting)

  1. How to define the scope of your job requirements
  2. How to communicate these requirements to internal recruiters or agencies
  3. How to hire your internal recruiter or recruitment team
  4. How to assess your recruitment agency suppliers
  5. How to ensure you communicate with full transparency and a sense of urgency

Go to Session

How to Rapidly Develop IoT devices with Arm and AWS

Presented by Reinhard Keil

Presented by Arm

Arm Cortex-M processors have been shipped in more than 45 billion chips for a vast range of applications, from industrial sensors to wearables. This growth has exploded more so in the last few years due to the significant rise in connected products for diverse markets. AWS IoT provides broad and deep functionality, spanning the edge to the cloud, so customers can build IoT solutions for virtually any use case across a wide range of devices. With designers of IoT applications under extraordinary pressure to build innovative solutions quickly, affordably, and satisfy many design requirements, how can the IoT continue to scale across a growing number of use cases? The talk provides a tour of a simple path to developing secure Cortex-M based IoT devices with Arm and AWS, and how together, the collaboration provides choice and scalability for IoT developers.

Go to Session

How to Scale your LoRaWAN Deployment to 500,000+ devices

Presented by Johan Stokking

Johan will guide you through the basic concepts of LoRaWAN, show how easy it is to get started and how to avoid mistakes when scaling.

Go to Session

How to shorten the development time of an IoT product with the Zerynth Platform

Presented by Zerynth

By showing a power consumption demo, we wanted to introduce the Zerynth IoT toolchain and demonstrate how easy it is to IoT enable an application (consumer or industrial) with our tools. Thanks to the combined power of Zerynth OS and Zerynth Device Manager, you can substantially reduce the time to market needed to develop an IoT product.

In this demo, an edge device sends real-time power consumption data to the Cloud. Moreover, this is a Python embedded application running on Zerynth OS sending data points securely in real-time. Watch the video to learn more.

Go to Session

How to Train the Future IoT Workforce Remotely?

Presented by Don Wilcher

With Covid19 impacting hands-on learning at higher education and postsecondary institutions, undergraduates and postsecondary learners have no to limited access to engineering and technical instructional labs. How can instructional training in IoT be implemented remotely? In this Virtual Talk (VT), the spending cost of IoT products and the demand for a technology- oriented workforce needed will be presented. To meet this workforce demand, instructional strategies for learning IoT technologies remotely with low cost hardware development platforms will be discussed. Also, open source software tools to aid in creating IoT applications will be presented. Further, WiFi and Bluetooth (BT) development approaches will be compared along with alignment of hardware platforms. The specific hardware platforms to be discussed in this VT will include ESP32, ESP8266, the Raspberry Pi, Arduino Nano 33 BLE/Nano 33 BLE Sense, and the BBC micro:bit. In addition, WiFi and BT application concepts for sensing and control will be presented.

Go to Session

Implementing a Simultaneous Localization and Mapping (SLAM) system for Robotics/Unmanned Vehicles

Presented by Mike Anderson

As robotics and unmanned vehicles like drones start to proliferate, many developers find that they need a means of fixing the device to a specific location and then have the device navigate to a destination while avoiding obstacles. In addition, we frequently want the device to create a map of the surrounding area for future reference. In order to most efficiently accomplish these goals, we need to create a SLAM for the device. In this session, we will discuss the various approaches and requirements for 3D SLAMs and how they are constructed. We will address implementations ranging from autonomous cars down to robots based on platforms such as the Raspberry Pi.

Go to Session

In Search of the Fourth Wave

Presented by Allen Downey

When I was working on Think DSP, I encountered a small mystery.  As you might know:

  1.  A sawtooth wave contains harmonics at integer multiples of the fundamental frequency, and their amplitudes drop off in proportion to 1/f.  
  2. A square wave contains only odd multiples of the fundamental, but they also drop off like 1/f.  
  3. A triangle wave also contains only odd multiples, but they drop off like 1/f².

This pattern suggests that there is a fourth simple waveform that contains all integer multiples (like a sawtooth) and drops off like 1/f² (like a triangle wave).  Do you know what it is?

In this talk, I'll suggest three ways we can solve this mystery and show how to compute each of them using Python, NumPy, and SciPy.  This talk is appropriate for beginners in both DSP and Python.

Go to Session

Integrating NFC into your application: What you need to know

Presented by Dan Merino

Presented by STMicroelectronics

In this session we will show you how to overcome the most common design challenges in NFC integration to achieve optimal performance and fast time-to-market.

Near Field Communication (NFC) is a technology that uses magnetic field induction to enable contact-less data exchange between two compatible devices moved within close proximity to one another. While simple in concept, implementing a robust and high-performing NFC design can be daunting, as developers must first consider things like passing certifications, interoperability, shrinking size requirements, low power consumption, and development time.

In the session, we will start by exploring the most common NFC reader applications in today's fast-growing NFC market. We will discuss the principle design challenges faced by engineers, and how to resolve them using the ST25R3916 high-performance NFC universal reader.

This industry-leading device boasts a unique set of features including dynamic power output, automatic antenna tuning, noise suppression receiver, and low power wake up, which make it ideal for robust and efficient designs over a wide range of consumer and industrial NFC applications.

You will learn:

  • the main challenges of designing an NFC reader and how to overcome them
  • about the ST25R3916 high-performance NFC universal reader device
  • how to exploit the device's unique features to design a best-in-class solution

Go to Session

Introduction to an Open Approach for Low-Power IoT Development

Presented by Reinhard Keil

Presented by Arm

Today, embedded developers start with low-cost evaluation boards utilizing reference designs that are based on open source software. For rapid IoT device development, scaling of these reference designs to cost-optimized and resource-constrained, high-volume production is critical.

Go to Session

Introduction to Radio Frequency measurements for Cellular and Wireless Communication Systems

Presented by Ramakrishna Yellapantula

While the modulation and demodulation techniques described in the text books is perfect, in reality they are far from perfect. Due to the tolerance of different components used in manufacturing of Radio Frequency (RF) chipsets, we notice different impairments in the transmitted and received RF signals. In this presentation, we will introduce and discuss the RF measurements for Cellular and Wireless Communication Systems

Go to Session

IoT Fault Lines

Presented by Steve Branam

Steve will outline the fault lines in the elements of the IoT triad: the embedded devices, the frontend user applications, and the backend server applications.

These fault lines are a common source of problems during development, testing, deployment, operation, and maintenance of IoT products. The goal of the presentation is to heighten awareness of them to avoid nasty surprises, and present some strategies for managing and mitigating them.

Go to Session

IoT Hacks: Behind the Scenes

Presented by Joe Hopper

News reports of IoT breaches are now commonplace, with manufacturers often blaming end-user misconfigurations or 'sophisticated attacks'. This implies the victim customers and organizations were simply unlucky, but have you ever wondered exactly how these hacks occurred and what could have been done to prevent them?

Joe Hopper, a professional hacker for the Fracture Labs technology security company, will walk you through:

  • How hackers target the victim devices
  • How vulnerabilities are discovered
  • How the weaknesses are exploited
  • What could have been done to prevent the breaches in the first place

Go to Session

IoT Online Conference - Pre-Conference Orientation

Presented by Jacob Beningo

A short but useful live meeting on Zoom between attendees and conference organizers Jacob and Stephane. In this live zoom we will be sharing a few pointers to help attendees navigate and take full advantage of the IoT Online Conference.

Go to Session

IOT System Security Challenges

Presented by Subramaniam Ganesan

In this presentation, IOT embedded system security, software and hardware solutions, security threat due to WiFi/ RF communication, security threats due to advanced wireless sensors, over the air software updating, data routers with cloud-based computing are presented. Need for real time protection, secure protocols for communication, role of Hardware Security Modules (HSM) in IOT are also discussed. Software algorithms, modeling and testing are presented.

Go to Session

Isolating MCU hardware and firmware using TrustZone security technology

Presented by Bob Waskeiwicz

Presented by STMicroelectronics

In the IoT and connected device marketplace, device security is paramount to protect customer information and to prevent outside attacks.

The new STM32L5 series MCU based on ARM Cortex M33 core with TrustZone technology is part of the STM32Trust Security Ecosystem, where the TrustZone is a dynamic firewall providing hardware and software isolation to the system. Developers can isolate critical security firmware, authentication and private information from other parts of the device. The STM32L5 provides crypto accelerators for Public Key, AES, Hash and a True Random Number Generator and On-the-Fly Decrypt for external memories. The STM32L5 can provide secure boot with Root Secure Services and TF-M (ARM PSA compliant Trusted Firmware) with a unique boot entry, providing a secure framework to base the system on "Root of Trust". The new series further pushes the low power footprint of our already class leading devices while offering new peripherals (USB Type C & PD) and power management innovation allowing for a class leading 62uA/MHz current consumption.

You will learn:

  • The new features and peripherals in the STM32L5
  • Understand how to create a "Root of Trust" with the STM32L5 Security features
  • How to use STM32 Trusted Package Creator
  • How to interface to other ST products (NFC) for a digital signature verification application

Go to Session

Lessons Learned With Using Bluetooth Low Energy in Wearables

Presented by Jacky Cheung

The cost of integrating Bluetooth Low Energy (LE) into consumer electronics has dropped significantly over the years. With all the promising features introduced in Bluetooth 5.X, Bluetooth LE has become the de-facto connectivity solution for wearables.

This talk will present lessons learned with using Bluetooth Low Energy in wearable projects. It highlights some of the key design considerations and offers some practical tips on planning, implementation and debugging.

Go to Session

Leveraging Cryptography in Cyclone Programmer

Presented by PE Micro

Go to Session

Linux Kernel Security - Inside the Linux Security Modules (LSMs)

Presented by Vandana Salve

The Linux Security Module (LSM) framework provides a mechanism for various security checks to be hooked by new kernel extensions.

The primary users of the LSM interface are Mandatory Access Control (MAC) extensions which provide a comprehensive security policy. Examples include SELinux, Smack, Tomoyo, and AppArmor. In addition to the larger MAC extensions, other extensions can be built using the LSM to provide specific changes to system operation when these tweaks are not available in the core functionality of Linux itself.

The topic deep dives into the

  • Understanding LSMs,
  • Types of LSMs,
  • Architecture of LSM,
  • The various hooks and the functionality provided by these hooks

Go to Session

Live Discussion - Best Practices for Developing Real-time Embedded Systems

Presented by Jacob Beningo

Couldn't attend this zoom meeting? No worries, here's a recording.

Go to Session

Live Discussion - Bringing Low Power, High Performance Audio and Voice to Market on the i.MX RT600 Crossover MCU

Presented by Brendon Slade

Presented by NXP

This is your chance to chat with Brendon Slade, Director of the general purpose MCU Ecosystem team @ NXP, and Mike Vartanian, Director of Strategic Partnerships at DSP Concepts. Discussions will be centered around Audioweaver tools and the new i.MX RT600 MCU,

Go to Session

Live Discussion - Hardware Hacking: Hands-On

Presented by Colin O'Flynn

This is your chance to chat with Colin O'Flynn about Hardware Hacking

Make sure to watch Colin's talk: https://www.embeddedonlineconference.com/session/Hardware_Hacking_Hands_On

Go to Session

Live Discussion - What the FAQ is an FPGA

Presented by Clive "Max" Maxfield

This is your chance to chat with Max about FPGA's, Embedded Systems, Artificial Intelligence, Science Fiction, and any of your other burning questions.

Go to Session

Live Pre-Conference Orientation Meeting on Zoom

Presented by Stephane Boucher

Less than 15 minutes but could be useful to navigate and take full advantage of the conference.

Go to Session

Live Q&A - Attack IoT System Unknowns with Tracer Bullets

Presented by James Grenning

Live Q&A with James Grenning following his talk titled 'Attack IoT System Unknowns with Tracer Bullets'

Go to Session

Live Q&A - Batteryless Sensing Systems Powered by Light

Presented by Andres Gomez

Live Q&A with Andres Gomez following his talk titled 'Batteryless Sensing Systems Powered by Light'

Go to Session

Live Q&A - Best Practices for Designing IoT Edge Devices

Presented by Jacob Beningo

Live Q&A with Jacob Beningo following his talk titled 'Best Practices for Designing IoT Edge Devices'

Go to Session

Live Q&A - Building a Global IoT Ecosystem of 120K IoT Developers

Presented by Wienke Giezeman

Live Q&A with Wienke Giezeman, following his talk titled "Building a Global IoT Ecosystem of 120K IoT Developers"

Go to Session

Live Q&A - Comprehensive Cyber Hygiene of IoT Systems

Presented by John Gallagher

Live Q&A with John Gallagher following his talk titled 'Comprehensive Cyber Hygiene of IoT Systems'

Go to Session

Live Q&A - Continuous Software Improvement with IoT Device Monitoring and Visual Trace Diagnostics

Presented by Dr. Johan Kraft

Presented by Percepio

Live Q&A with Johan Kraft following his talk titled 'Continuous Software Improvement with IoT Device Monitoring and Visual Trace Diagnostics'

Go to Session

Live Q&A - Developing Rugged IoT Devices by Integrating Off-the-Shelf Hardware

Presented by Sai Yamanoor

Live Q&A with Sai Yamanoor following his talk titled 'Developing Rugged IoT Devices by Integrating Off-the-Shelf Hardware'

Go to Session

Live Q&A - Easy CI/CD for Embedded IoT Devices

Presented by Dustin Reynolds

Live Q&A with Dustin Reynolds following his talk titled 'Easy CI/CD for Embedded IoT '.

Go to Session

Live Q&A - Enterprise Collaboration in Post-COVID world

Presented by Arun Rajasekaran

Live Q&A with Arun Rajasekaran following his talk titled 'Enterprise Collaboration in Post-COVID world'

Go to Session

Live Q&A - Envisaging Real-time Industrial and Intelligent Applications leveraging the Edge AI Paradigm

Presented by Pethuru Raj Chelliah

Live Q&A with Pethuru Raj Chelliah following his talk titled 'Envisaging Real-time Industrial and Intelligent Applications leveraging the Edge AI Paradigm'

Go to Session

Live Q&A - Hawkbit and SWUpdate for OTA Updates of Linux IoT Devices

Presented by Mohammed Billoo

Live Q&A with Mohammed Billoo following his talk titled 'Hawkbit and SWUpdate for OTA Updates of Linux IoT Devices'

Go to Session

Live Q&A - How LPWANs can help your IoT project

Presented by Pedro Bertoleti

Live Q&A with Pedro Bertoleti following his talk titled 'How LPWANs can help your IoT project'

Go to Session

Live Q&A - How to Design a Multi-Technology Outdoor-Indoor Tracking Device

Presented by Nicolas Jordan

Live Q&A with Nicolas Jordan following his talk titled 'How to Design a Multi-Technology Outdoor-Indoor Tracking Device'

Go to Session

Live Q&A - How to Guarantee a Successful Outcome When Recruiting Technical Talent

Presented by Lance Harvie

Live Q&A with Lance Harvie following his talk titled 'How to Guarantee a Successful Outcome When Recruiting Technical Talent'

Go to Session

Live Q&A - How to Scale your LoRaWAN Deployment to 500,000+ devices

Presented by Johan Stokking

Live Q&A with Johan Stokking following his talk titled 'How to Scale your LoRaWAN Deployment to 500,000+ devices'

Go to Session

Live Q&A - How to Train the Future IoT Workforce Remotely?

Presented by Don Wilcher

Live Q&A with Don Wilcher following his talk titled 'How to Train the Future IoT Workforce Remotely?'

Go to Session

Live Q&A - IoT Fault Lines

Presented by Steve Branam

Live Q&A with Steve Branam following his talk 'IoT Fault Lines'

Go to Session

Live Q&A - IOT System Security Challenges

Presented by Subramaniam Ganesan

Live Q&A with Subramaniam Ganesan following his talk titled 'IOT System Security Challenges'

Go to Session

Live Q&A - LoRaWAN & NB-IoT Complementary Deployment: City of Kyiv Use Case

Presented by Olivier Hersent

Live Q&A with Oliver Hersent following his talk titled 'LoRaWAN & NB-IoT Complementary Deployment: City of Kyiv Use Case'

Go to Session

Live Q&A - Managing a Fleet of Global IoT Devices (The Easy Way)

Presented by David Tischler

Live Q&A with David Tischler following his talk titled 'Managing a Fleet of Global IoT Devices (The Easy Way)'

Go to Session

Live Q&A - Monitoring IoT Devices At Scale

Presented by Tyler Hoffman

Live Q&A with Tyler Hoffman following his talk titled 'Monitoring IoT Devices At Scale'

Go to Session

Live Q&A - Robust, Bare-Metal Security that works on any IoT Device

Presented by Shawn Prestridge

Live Q&A with Shawn Prestridge following his talk titled 'Robust, Bare-Metal Security that works on any IoT Device'.

Go to Session

Live Q&A - Server and Edge AI for Tackling IIoT Data Glut

Presented by Altaf Khan

Live Q&A with Altaf Khan following his talk titled 'Server and Edge AI for Tackling IIoT Data Glut'

Go to Session

Live Q&A - The IoT Business Case for Smart Cities & COVID19 Recovery

Presented by Catherine Caruana-McManus

Live Q&A with Catherine Caruana-McManus following her talk titled 'The IoT Business Case for Smart Cities & COVID19 Recovery'

Go to Session

Live Q&A - Tiny Machine Vision: behind the scenes

Presented by Lorenzo Rizzello

Live Q&A with Lorenzo Rizzello, following his talk titled 'Tiny Machine Vision: behind the scenes'

Go to Session

Live Q&A - Tips and Tricks for Developing Products using the ESP32

Presented by Jacob Beningo

Live Q&A with Jacob Beningo following his talk titled 'Tips and Tricks for Developing Products using the ESP32'

Go to Session

Live Q&A - Using Low Power Wide Area Networks For Industries with Minimal Total Cost Of Ownership And High Robustness

Presented by Burak Polat

Live Q&A with Burak Polat following his talk titled 'Using Low Power Wide Area Networks For Industries with Minimal Total Cost Of Ownership And High Robustness'

Go to Session

Live Q&A - Using Visual Trace Diagnostics to Uncover Hidden Issues

Presented by Dr. Johan Kraft

Presented by Percepio

Live Q&A with Johan Kraft, following his talk 'Using Visual Trace Diagnostics to Uncover Hidden Issues'

Go to Session

Live Q&A - Want to Reduce Power in Always-on IoT Devices? Analyze First

Presented by Tom Doyle

Live Q&A with Tom Doyle following his talk titled 'Want to Reduce Power in Always-on IoT Devices? Analyze First'

Go to Session

Live Q&A -Lessons Learned With Using Bluetooth Low Energy in Wearables

Presented by Jacky Cheung

Live Q&A with Jacky Cheung following his talk titled 'Lessons Learned With Using Bluetooth Low Energy in Wearables'

Go to Session

Live Q&A Discussion - Demystifying Beamformers

Presented by Paul Beckmann

Live Discussion with Paul Beckmann following his talk titled 'Demystifying Beamformers'

Go to Session

Live Q&A Discussion - DSP in Phased Array 3D Imaging

Presented by Chris Bore

13:04:53 From Michael Kirkhart : nanovna 13:05:12 From Leonard Dieguez : those are fairly low cost but also do not cover the frequency range 13:05:17 From Leonard Dieguez : the nano VNA 13:05:27 From Michael Kirkhart : The version 2 goes to 3 GHz. 13:05:39 From Michael Kirkhart : Not quite to 8 GHz, but getting closer. 13:05:54 From Leonard Dieguez : cool that is a good improvement. I would love to have one that goes to 8GHz 13:06:40 From Leonard Dieguez : do you know of a good link to get the version 2 , 3GHz version? 13:06:50 From shadasharif : Thank you

Go to Session

Live Q&A Discussion - Frequency Domain Signal Processing

Presented by John Edwards

This is a the live Q&A session for the talk given by John Edwards and titled 'Frequency Domain Signal Processing'

Go to Session

Live Q&A Discussion - High Resolution Spectral Analysis Using Channelizers

Presented by Ric Losada

Live Q&A Discussion with Ric Losada following his talk 'High Resolution Spectral Analysis Using Channelizers'

Go to Session

Live Q&A Discussion - In Search of the Fourth Wave

Presented by Allen Downey

Live Q&A session with Allen Downey, following his talk titled 'In Search of the Fourth Wave'

Go to Session

Live Q&A Discussion - Multirate Polyphase Filters and Filter Banks, (GREEN Technology, also known as DSP Magic)

Presented by Fredric J Harris

Live Q&A session with fred harris following his talk titled 'Multirate Polyphase Filters and Filter Banks'

Go to Session

Live Q&A Discussion - Prototyping DSP algorithms on real-world signals using MATLAB

Presented by Gabriele Bunkheila

Live Q&A Discussion with Gabriele Bunkheila following his talk 'Prototyping DSP algorithms on real-world signals using MATLAB'

Go to Session

Live Q&A Discussion - Signal processing in Vibration analysis

Presented by Christophe Blouet

Live Q&A Discussion with Christophe Blouet following his talk 'Signal processing in Vibration analysis'

Go to Session

Live Q&A Discussion - Signal Processing Techniques in Condition Monitoring and Control of Power Electronics Converters and Battery System

Presented by Maher Al-Greer

Live Q&A Discussion with Maher Al-Greer following his talk 'Signal Processing Techniques in Condition Monitoring and Control of Power Electronics Converters and Battery System'

Go to Session

Live Q&A Discussion - Spectrometer Signal Processing Systems for NASA Space Applications

Presented by Damon Bradley

Live Q&A Discussion with Damon Bradey following his talk 'Spectrometer Signal Processing Systems for NASA Space Applications'

Go to Session

Live Q&A Discussion - Things We Should Not Do In Future Radios

Presented by Fredric J Harris

Live Q&A session with fred harris following his talk titled 'Things We Should Not Do In Future Radios'

Go to Session

Live Q&A Discussion - Time-Frequency Spectra with the S-transform

Presented by Lalu Mansinha

Live Q&A Discussion with Lalu Masinha, following his talk titled 'Time-Frequence Spectra with the S-Transform'

Go to Session

Live Q&A Make your IoT device feel, hear and see things with TinyML

Presented by Jan Jongboom

Live Q&A with Jan Jongboom following his talk titled 'Make your IoT device feel, hear and see things with TinyML'

Go to Session

LoRaWAN & NB-IoT Complementary Deployment: City of Kyiv Use Case

Presented by Olivier Hersent

In this talk, we will explain how LoRaWAN and Cellular IoT (LTE-M/NB-IoT) complement each other to build horizontal IoT Platforms that can be used in a variety of use cases.

IoT use cases have wide requirements in terms of throughput, cost and battery lifetime, and no single radio access technology can address them completely. We will show how to address the need for a multi-technology LPWAN platform and present the example use case of the City of Kiev, which is already deploying this multi-technology network for the city and its own enterprise customers.

  • Key Learning / Audience Takeaway Points:
    • How LoRaWAN and Cellular IoT complement each other
    • Key enterprise use cases leveraging multi-technology platforms

Go to Session

Low-Power Algorithmic Approaches in DSP Implementations

Presented by Bryant Sorensen

Hearing aid signal processing is a challenging task because of the extreme low-power, highly-constrained cycle performance required. The audio signal processing is always on, and requires complex algorithms and computations. A typical hearing aid will have multi-band analysis and synthesis, automatic feedback cancellation, environment detection and action, automatic gain control, and user interface - and AI is arriving as well. In order to reconcile the two disparate requirements (complexity vs. low power & reduced cycles), various approaches are needed to achieve low power while still providing sophisticated calculations. In this talk, I will discuss a sampling of numerical methods, shortcuts, refactorings, and approximations which significantly lower power in DSP algorithms. This will be an overview which I hope sparks thinking to extend the presented concepts to other low-power algorithmic tasks. While the focus is on algorithms and computations, some of these topics will also touch on implications to HW design, HW vs. FW tradeoffs, and ASIP / programmable DSP core design.

Go to Session

Make your IoT device feel, hear and see things with TinyML

Presented by Jan Jongboom

Many IoT devices are very simple: just a radio sending raw sensor values to the cloud. But this limits the usefulness of a deployment. A sensor can send that it saw movement in front of it, but not what it saw. Or a sensor might notice that it's being moved around, but not whether it's attached to a vehicle or is just being carried around. The reason is simple: for knowing what happens in the real world you'll need lots of data, and sending all that data over your IoT network quickly drains your battery and racks up your network bill.

How can we do better? In this talk we'll look at ways to draw conclusions from raw sensor data right on the device. From signal processing to running neural networks on the edge. It's time to add some brains to your IoT deployment. In this talk you'll learn:

  • What is TinyML, and how can your sensors benefit from it?
  • How signal processing can help you make your TinyML deployment more predictable, and better performing.
  • How you can start making your devices feel, hear and see things - all running in realtime on Cortex-M-class devices.
  • Hands-on demonstrations: from initial data capture from real devices, to building and verifying TinyML models, and to deployment on device

Go to Session

Managing a Fleet of Global IoT Devices (The Easy Way)

Presented by David Tischler

Low cost, readily-available devices like the Raspberry Pi, Jetson Nano, and BeagleBone products have made prototyping IoT projects extremely simple for developers.  Engineers can have functioning solutions quickly, without breaking the bank.  However, there is a very important step that is often overlooked when embarking on a new IoT project:  Device and Fleet Management.

While it’s cheap and easy to get started with IoT, once you exceed more than a handful of devices, and those devices are no longer on your desk, how do you continue to interact, manage, and maintain those devices?  How do you deploy updated applications to them, if the devices end up located all over the globe?  And how do you minimize downtime, or avoid traveling to the device to troubleshoot when things go wrong?

In this talk, we’ll take a look at best practices for IoT Fleet Management, introduce balenaCloud as one platform and methodology to help with this task, and cover some lessons learned maintaining fleets of IoT devices at scale.

More specifically, we will investigate:

  • Hardware selection
  • OS considerations
  • Workload segmentation
  • Containerization
  • Application updates
  • OS updates
  • Sample use-cases

Attendees will not need any specific knowledge or previous experience, but familiarity with Linux, Containers, and some Hardware fundamentals would be helpful to have.

Go to Session

Modern Embedded Software Goes Beyond the RTOS

Presented by Miro Samek

Some of the most difficult problems with real-time and embedded programing are related to concurrent code execution as well as code organization, which all too often degenerates into "spaghetti code". These problems are usually intermittent, subtle, hard-to-reproduce, hard-to-isolate, hard-to-debug, and hard-to-remove. They pose the highest risk to the project schedule.

This session presents a set of best practices of concurrent programming, which are collectively known as the active object (or actor) design pattern. In this pattern, applications are built from event-driven, non-blocking, asynchronous, encapsulated threads (active objects), with the internal behavior of each active object controlled by a state machine.

While active objects can be implemented manually on top of a traditional RTOS, a better way is to use an active object framework. You will see how this leads to inversion of control, enables architectural reuse, and allows the framework to automatically enforce the best practices.

In the second part, the session will introduce modern hierarchical state machines as the powerful "spaghetti reducers". You will see how state machines complement active objects and enable graphical modeling and automatic code generation.

The session will utilize hands-on demonstrations using EFM32 Pearl-Gecko ARM Cortex-M4 board, the QP/C real-time embedded framework and the QM modeling and code-generation tool.

Go to Session

Monitoring IoT Devices At Scale

Presented by Tyler Hoffman

I'd like to talk about how companies should think about and build out their IoT monitoring solutions using metrics. The differences between logs, metrics, and traces have been talked about at length in the software engineering space, but not for firmware. Using metrics to monitor a fleet of devices allows for assessing the health of thousands to millions of devices, even across groups of devices or firmware versions, all while keeping complexity, bandwidth, and power consumption to a minimum.

Takeaways:
  • Know how to think about and build a metrics library for gathering compressed and aggregated metrics on devices
  • Understand the differences between logs, metrics, and traces, and why using metrics is the best way to monitor fleets of devices post-deployment.
  • Know the next steps on how to ingest the data in a server under their control to do monitoring analysis.
  • Learn some formulas for calculating fleet health, such as expected battery life, crash free hours, and average connectivity per hour.

Go to Session

Multirate Polyphase Filters and Filter Banks, (GREEN Technology, also known as DSP Magic)

Presented by Fredric J Harris

Recently, someone posted a question on a DSP blog I visit occasionally. How does one design a very narrow bandwidth low pass filter? One version of the problem is a filter with 10 Hz wide pass band, a 10 Hz wide transition band, and a 1 kHz sample rate. Stopband attenuation >80 dB with passband ripple <0.01 dB. This a very bad combination: low transition bandwidth with high sample rate! I think students post their homework problems on the blog so I seldom volunteer to do their homework. I did however read the many suggestions posted on the blog submitted by regular subscribers to the blog. They were interesting to read but nothing clever and of limited value. Some were just plain silly, but to quote a famous line, “who am I to judge?” The consensus was that some problems are hard and require lots of resources, this is one of them! All it takes is lots of filter coefficients and lots of multiply and adds. 405 taps seemed to be about the right number. When I read one suggestion from someone I know at Westminster University in London, I simply had to throw my hat in the ring. It then became a game: how small could you make the filter and still satisfy the specifications? For a week I submitted daily solutions requiring fewer and fewer coefficients. I started at 38 M&A per input sample and I stopped when I reached 6 M&A per input sample!

The presentation will show how to build narrowband filters with more than an order of magnitude reduction of workload. The only requirement is that there be a large ratio of sample rate to bandwidth. Once we learn the simple trick to accomplish this reduction we pose the question, Can we achieve similar reduction in workload when there is not a large ratio of sample rate to bandwidth? The answer surprisingly is yes! We will share the recipe for the secret sauce so you too will know how wideband filters can also be implement with more than an order of magnitude workload reduction. How about an I-Q filter pair with 1400 taps per arm replaced with a resampling filter requiring only 100 real multiplies?

Go to Session

Mycropython Projects

Presented by Jacob Beningo

In this session, embedded systems consultant and author Jacob Beningo discusses MicroPython and how it is being used today to build products. Jacob also provides an overview of his new book MicroPython projects and demonstrates a gesture controller written completely in MicroPython.

Go to Session

Object Classification Techniques using the OpenMV Cam H7

Presented by Lorenzo Rizzello

Machine Learning for embedded systems has recently started to make sense: on-device inference reduces latency, costs and minimizes power consumption compared to cloud-based solutions. Thanks to Google TFLite Micro, and its optimized ARM CMSIS NN kernel, on-device inference now also means microcontrollers such as ARM Cortex-M processors.

In this session, we will examine machine vision examples running on the small and power-efficient OpenMV H7 camera. Attendees will learn what it takes to train models with popular desktop Machine Learning frameworks and deploy them to a microcontroller. We will take a hands-on approach, using the OpenMV camera to run the inference and detect objects placed in front of the camera.

Go to Session

Operating Systems for Embedded Applications

Presented by Colin Walls

Most modern embedded applications employ and operating system of some sort. We will look at how operating systems work - the scheduler and various services provided by an OS to the application code - and at the options open for OS selection. We will also compare the use of commercial, open source and in-house products.

Go to Session

Percepio DevAlert - IoT Device Monitoring and Diagnostics

Presented by Percepio

People often have problems with IoT devices due to software issues, and the developers are largely unaware. What if IoT device developers could be notified about real-world issues in IoT devices automatically and get detailed diagnostics on the very first occurrence? This is provided by Percepio DevAlert, a novel cloud service that gives real-world feedback about issues in the device software, that allows for rapid continuous improvement and for embracing DevOps in IoT device development. Learn from real-world usage and make a great product that beats the competition. This is a brief summary of the full presentation, found at https://percepio.com/devalert

Go to Session

Percepio Tracealyzer - Efficient Firmware Development with Visual Trace Diagnostics

Presented by Percepio

Learn how visual trace diagnostics can improve embedded software development. This is a short summary of the full presentation, found at https://percepio.com/tracealyzer

Go to Session

Practical Approach for High-End Embedded System Design

Presented by Khalil Rashid

Embedded system design is very challenging as it requires multi-disciplinary expertise in Hardware, Firmware and Software. Most of embedded systems developments ends up as a failed project or not delivering performance as planned initially.  

This can be address by proper planning and selection of suitable hardware and software components. Also design goals and parameters to consider a very important to be evaluated before starting project like:

  • Hardware Complexity
  • Software Complexity
  • Time to Market
  • Development Cost
  • Certifications
  • Functional Safety and Security
  • Feasible Solution

In this seminar, we will learn how to plan a complex Embedded System from hardware, firmware and software point of view. Furthermore, we will see how actually each part will be developed by utilizing Standard off the shelf components available. This makes design simple, cost effective, feature rich and most feasible for particular market. 

Go to Session

Pragmatic Methods to Decide Filter Requirements

Presented by Chris Bore

While digital filter design – given a filter specification - is very well covered in numerous works, the essential practical question of how to arrive at the filter specification from the application is largely ignored: so the practicing engineer is faced with a well developed design methodology, but very little information to guide in specifying what to design. Similarly, there is little information available to guide decisions on the hardware platforms that are suitable to implement such a specification – including balancing issues such as numeric precision, speed, cost and power consumption – to assess whether the requirement may be met in a cost effective way: so the practicing engineer has limited guidance in deciding whether the application requirement may be met at all given practical constraints. The result is that engineers have limited ability to quickly assess whether a filtering requirement can be met: and digital filters very often under- or over-perform and are often implemented on needlessly costly or power-hungry hardware platforms. This talk addresses these twin gaps in the filter designer’s toolbox and outlines, with specific methods and examples, how the specification for a digital filter may be arrived at from consideration of the application aim and requirement. It also describes, again with specific methods and examples, how to arrive at a specification for the hardware platform necessary to implement such a filter. It does not address the issue of designing such a filter, which is very well covered in numerous texts elsewhere.

Go to Session

Prototyping DSP algorithms on real-world signals using MATLAB

Presented by Gabriele Bunkheila

DSP engineers across Industry and Academia have long been familiar with writing MATLAB code for early algorithm exploration and signal analysis. In many situations, signal processing algorithms also need validation using real-world signals, which in turn often drives the need for real-time implementations.

In this talk, we discuss practical coding advice for creating real-time DSP prototypes directly using MATLAB programs.  The goal is to process real-world signals, such as signals streaming from audio devices or software-defined radios, but remove the complexity of hardware and real-time programming. Throughout the session, we use practical code examples, including digital filtering and other common signal processing tasks. Some programming experience will be beneficial, but it is not required. 

Go to Session

PYNQ: Using FPGA to Accelerate Python applications

Presented by Adam Taylor

PYNQ is an open source Python framework from Xilinx which enables Python developers to access the performance provided by programmable logic, traditionally in the realm of electronic engineers. Being able to access programmable logic from Python brings with it acceleration factors of 10x, 100x and beyond to applications. This session will introduce the PYNQ framework, before demonstrating a number of image processing and machine learning applications developed using the PYNQ framework, showcasing not only the performance boost but also the ease of use.

Go to Session

Qt for MCUs. Ultimate performance. Tiny footprint.

Presented by The QT Company

Qt for MCUs is a complete graphics framework and toolkit with everything you need to design, develop, and deploy GUIs on MCUs. Run your application on bare metal or a real-time operating system.

  • Smartphone-like UX
  • Reuse code across MCU/MPUs
  • Fast development with Qt’s tools and UI language

The demo features use cases for different industries.

Catch the ‘Smartphone-like user interface without compromising on performance’ session by Aurindam Jana or find out more about Qt for MCUs here: https://www.qt.io/qt-for-mcus

Go to Session

Reconfigurable Acceleration Platform: Harnessing FPGA Potential at the Edge

Presented by Efinix, Inc.

This presentation introduces Efinix’s Reconfigurable Acceleration Platform, which is an initiative that helps designers intuitively incorporate FPGAs into domain-specific compute applications. We show an edge vision SoC demonstration that illustrates how you can accelerate image processing functions using hardware/software co-design featuring a RISC-V processor. Additionally, we discuss an image classification accelerator from our partner PlumerAI.

Go to Session

Remote Debugging & Monitoring for IoT Devices at Scale

Presented by Memfault

In this demo, you'll see how Memfault collects performance data like battery level and connectivity information and provides engineers with actionable insights. When an error happens, Memfault sends your team all the information you need to fix it right away. No need to reproduce it or ship the device back to the office. By automating data extraction, deduplication, aggregation, and alerting, Memfault reduces the detection of issues to minutes or hours instead of days or weeks. 

Memfault's cloud-based firmware issue detection and resolution features dramatically reduce engineering and support overhead, enabling you to ship and manage thousands to millions of IoT devices with confidence.

To chat directly with Francois and the other Memfault engineers or request a full demo of the Memfault platform, visit https://go.memfault.com/iot-online-conference-2020

Go to Session

Robust, Bare-Metal Security that works on any IoT Device

Presented by Shawn Prestridge

Are you looking to enable security on your IoT device but don’t really know where to start? This is the session for you! We will delve into the elements you need in an embedded design to establish security and explain why the components are necessarily. We will cover the differences between poor, “good enough”, and robust security and explain what you need to do to up your security game in your IoT device in simple, easy-to-follow steps. We will explain how to use a crypto toolbox to establish security fundamentals like: safe-and-secure boot, encrypted and authenticated communication, encrypted data storage, exploit detection/prevention, and more. Start your security journey here!

Go to Session

Secure and Non-Secure application co-existence using TrustZone security technology

Presented by Bob Waskeiwicz

Presented by STMicroelectronics

This 2-hour hands-on workshop will use the STMicroelectronics NUCLEO-L552ZE-Q board to configure and activate the Cortex-M33 TrustZone to secure an application. A Blinky application will be used to demonstrate how the STM32L5 TrustZone can secure the peripherals and memory. The workshop will be divided into approximately 20-minute segments alternating between lecture and hands-on. The STM32CubeMX configuration tool will be used to configure the STM32L5 device and to generate the Blinky LED application code for secure and non-secure applications. No source code compiler or IDE is required as the pre-complied binaries will be provided. The STM32cube Programmer tool and the embedded STLINK/V3 will be used to load the binaries into the STM32L5 device.

Workshop Agenda (may change prior to event)

1.Overview of the STM32L5 and Cortex M33 Device
Hands-On: Configure and download a non-secure Blinky application

2. Overview of the TrustZone
Hands-On: Configure and download a secure Blinky application

3. Review the secure and Non-Secure application co-existence using TrustZone
Hands-On: Add the non-secure Blinky application to the trusted application.

4. Review the trustZone Faults and Regression
Hands-On: Change the non-secure Blinky application to attempt access to the secure LED.
Hands-On: Turnoff and mass erase the STM32L5 TrustZone.

The materials for this workshop can be downloaded at:

https://www.dropbox.com/sh/9r810zc8pjxg83e/AADBTOrcSGIJX43auwkT_ziya?dl=0

Go to Session

Secure Authentication for Any Core, Any Cloud

Presented by Xavier Bignalet

Presented by Microchip

During this session, you will learn about the implementation and logistic challenges to add a secure authentication in a system in the first part of the lecture. Then, you will be exposed to Microchip Trust Platform for the CryptoAuthentication and the problems are addressed to make secure authentication more accessible to the fragmented IoT market.

Go to Session

Secure Device Management for the Internet of Things

Presented by Gary Sugita

Presented by Cypress

According to IHS Markit research, the number of connected devices in the market will reach nearly 40 billion by the end of 2020. While these IoT devices can significantly improve everyday life, they come with increasing cybersecurity risks. In this session, attendees will learn how to safeguard their IoT device throughout its lifecycle, from production and provisioning through decommissioning and termination, with PSoC® 64 Secure MCUs.

Go to Session

Securing the IoT from Chip to Cloud:An Application Guide to Applying Platform Security Architecture (PSA) Principles

Presented by Jacob Beningo

With the explosive growth in the Internet of Things (IoT) and the number of devices soaring, security is critical maintain device integrity and protect user privacy.However, designing consistent security across connected devices can be a minefield to navigate and implementation can be costly.Using a smart door lock as an example, in this webinar, attendees will learn how to design security from the ground up using PSA principles and guidelines with a PSoC® 64 secure MCU from Cypress Semiconductor.

Attendees will walk away with the best practices to develop their own security solutions.In addition, the importance of secure device management throughout the IoT products lifecycle will also be reviewed.

Topics Covered in this Webinar Include:

  • Developing a threat model and Defining security counter measures
  • Maintaining asset security through hardware architecture and security IP
  • Implementing trusted boot and Secure application partitioning
  • Using Trusted Firmware-M to isolate security critical functionality from non-secure code
  • Leveraging the Arm Pelion Secure IoT Device Management Platform for full device lifecycle management (design, onboard, provision, secure, update, manage, etc.)

Go to Session

Server and Edge AI for Tackling IIoT Data Glut

Presented by Altaf Khan

Cloud-based IIoT servers are receiving too much data, far too frequently, from an increasing number of edge devices. We present a complementary pair of AI solutions for reducing the data sent from the sensor and for efficiently processing it when it reaches the cloud server. The AI deployed at the sensor intelligently extracts insights from raw data with the help of inexpensive microcontrollers while operating on µWs of battery power. The server-side AI translates the insights received from a multitude of edge devices into decisions rapidly while employing a minimum of resources. The result is a low-latency, high-throughput cloud-based IIoT system.

Go to Session

Signal processing in Vibration analysis

Presented by Christophe Blouet

In the field of rotating machinery, the vibration are widely used to measure health, detect failing parts, improve efficiency or increase life duration of engines and all rotating parts attached. The talk will go through some techniques used and their goals.

Go to Session

Signal Processing Techniques in Condition Monitoring and Control of Power Electronics Converters and Battery System

Presented by Maher Al-Greer

There are several fundamental challenges in condition monitoring, fault detection, and control of power electronics converters and Li-Ion batteries. These are linked to the computation complexity of the signal processing algorithms, suitability for on-line and real-time implementation, cost of implementation, ability to deal with rapid real-time changes, etc.

Advanced signal processing algorithms have been found to provide superior condition monitoring, system identification, and state estimation solutions to tackle the aforementioned issues with fast dynamic performance, cost-effective solution, high accuracy prediction, good tracking ability to system changes.     

This talk offers basic theory and some recent advances of innovative signal processing algorithms for condition monitoring and control of power converters and batteries. The talk covers different system identification and parameter estimation of power converters, adaptive signal processing algorithms for on-line modelling and estimation of power converters, parametric/ non-parametric system identification, remaining useful prediction, and sate of health estimation of Lithium-Ion batteries. This talk is intended for researchers and engineers in the area of signal processing and artificial intelligence to explore new applications of signal processing algorithms in power electronics applications and battery management systems, and for postgraduate students in these fields.

Go to Session

Simplifying integration of sensor data using NFC enabled Multi-Sensor Node

Presented by John Tran

Presented by STMicroelectronics

As NFC becomes ubiquitous, its applications range from mobile payment to sensor data logging. During this approximately 2 hour workshop, you will learn how to integrate NFC, sensors and a microcontroller to create an NFC Sensor node. This workshop will combine the STM32L031 low-power MCU, ST25DV NFC Dynamic Tag IC, HTS221 Humidity and Temperature Sensor, LPS22HB Barometer/Altimeter and LIS2DW12 3-axis accelerometer into the NFC Sensor node.

This workshop will cover the following topics:

  • Overview of NFC Technology
  • ST NFC Product Portfolio
  • ST Sensors Technology
  • Firmware and hardware structure
  • Using ST25R3911B NFC reader to read sensor data from the Sensor Tag.

The NFC hands-on will use the following kits and are available from our Distributors such as DigiKey or Mouser Electronics.

- ST25R3911B-DISCO (this is an NFC/RFID discovery board)
https://www.st.com/content/st_com/en/products/eval...

- STEVAL-SMARTAG1 (this is an NFC/RFIF evaluation board)
https://www.st.com/content/st_com/en/products/eval...

- CABLES USB A to Micro B

- CR2032 battery

Go to Session

Spectrometer Signal Processing Systems for NASA Space Applications

Presented by Damon Bradley

For many NASA Space Science Instruments flown aboard various spacecraft, digital spectrometers are a very common instrument class. These instruments are used for a vast array of scientific monitoring and observational applications, such as detecting organic compounds on distant planetary satellites in the solar system, measuring solar plasma interaction with the surface of our own Moon, monitoring geophysical parameters here on Earth, and determining the composition of exoplanet atmospheres several light years away. In particular, these instruments process signals arising from a vast swath of the radio spectrum, covering frequencies from near DC all the way up to sub-mm THz frequencies. Moreover, these systems must operate under extreme conditions of temperature and radiation environment, while also performing efficient computation under severe power constraints. This talk will cover practical implementation of digital spectrometers for these space applications, as well as some of the statistical signal processing methods used for detecting various phenomena in-orbit for particular Earth-observing instruments.

Go to Session

Test-Driven Development for Embedded Software

Presented by James Grenning

You've heard about Test-Driven Development but have never tried it or don't quite get it. Test-Driven Development is an important design and problem solving technique that helps software developers improve product quality and the quality of their life. How? By preventing defects, protecting your code from unintended consequences, and giving you warning when your design starts to deteriorate.

In this presentation James describes the problems addressed by TDD. He will define TDD and show you a short example of TDD. He'll tell you some of the benefits you can expect from TDD as well as the challenges of applying TDD to embedded C and C++.

James Grenning is inviting you to a scheduled Zoom meeting.

Topic: TDD for Embedded Happy Hour Embedded Online Conference
Time: May 20, 2020 03:00 PM Eastern Time (US and Canada)
Every day, 2 occurrence(s)
May 20, 2020 03:00 PM
May 21, 2020 03:00 PM
Please download and import the following iCalendar (.ics) files to your calendar system.
Daily: https://us02web.zoom.us/meeting/tZYpce2ppjMrEtMuPJuyVD1AFYDeKiBVi3vc/ics?icsToken=98tyKuGqqj0uG9ydsRGARpwQBo_oLOvxiFxcj7dwiS_PFjllRlLXENtmN5l2Mu7Z

Join Zoom Meeting
https://us02web.zoom.us/j/82464188187?pwd=UEloazJyTklpZlFTRFFxVjNPdmlUQT09

Meeting ID: 824 6418 8187
Password: 031453
One tap mobile
+13017158592,,82464188187#,,1#,031453# US (Germantown)
+13126266799,,82464188187#,,1#,031453# US (Chicago)

Dial by your location
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 646 558 8656 US (New York)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
Meeting ID: 824 6418 8187
Password: 031453
Find your local number: https://us02web.zoom.us/u/kflJGFuSy

Go to Session

The 1-Hour Security Bootcamp

Presented by Shawn Prestridge

Presented by IAR Systems

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

Go to Session

The 10 Minute Embedded GUI App Development with Crank Software's Storyboard

Presented by Crank Software

A 10 minute Storyboard overview demo with Nik Schultz, Crank Software Field Application Engineer.

Crank Storyboard, a GUI design and development tool, accelerates embedded GUI development, embraces GUI design change, and maximizes GUI flexibility. It provides product teams with a streamlined, parallel workflow enabling them to collaboratively work together when creating user interfaces.

To learn more about Crank Software, visit: https://www.cranksoftware.com/

To see Crank Storyboard in action, download a free trial here: https://info.cranksoftware.com/free-trial

Go to Session

The IoT Business Case for Smart Cities & COVID19 Recovery

Presented by Catherine Caruana-McManus

This session will highlight the leading IoT use cases for Smart Cities and Industries using the global standard LoRaWAN. The session will also highlight the findings of the COVID19 Pedestrian Index, a research collaboration between Meshed, the University of Wollongong and 24 Local Government Authorities in Australia and the ways in which they are using pedestrian counting solutions to inform targeted stimulus for economic, social and cultural recovery from the global pandemic.

Go to Session

The Journey Towards a Secure Industrial IoT Network

Presented by Vikram Sharma

Protecting industrial operations against cyber threats is a very specific challenge. As industrial organizations connect more devices, enable more remote access, and build new applications, the airgap between IT and OT networks erodes and the IDMZ falls short of being sufficient. 

Enhancing the security of your industrial network will not happen overnight. This session will present a phased and pragmatic approach where each phase builds the foundation for the next so that you can mature your OT security strategy at your own pace and lay the ground for a converged IT/OT security architecture.

What you will learn in this session:

  • What information is needed to build an industrial network that is secure by design
  • What are the key security technologies that must be deployed immediately to secure your industrial operations
  • How to add OT to your existing IT security tools and what are the benefits of doing so
  • How to demonstrate value to both IT and OT teams and embark all stakeholders in this journey to maximize your chances of success.

Go to Session

The Past, Present, and Future of Embedded Machine Learning

Presented by Pete Warden

Pete Warden, from Google's TensorFlow Lite Micro project, will be talking about how machine learning on embedding devices began, and where it's heading. ML has been deployed to microcontrollers and DSPs for many years, but until recently it has been a niche solution for very particular problems. As deep learning has revolutionized the analysis of messy sensor data from cameras, microphones, and accelerometers it has begun to spread across many more applications. He will discuss how voice interfaces are leading the charge for ML on low-power, cheap devices, and what other uses are coming. He'll also look into the future of embedded machine learning to try to predict how hardware, software and applications will be evolving over the next few years.

Go to Session

Things We Should Not Do In Future Radios, (Future Designs Should Not Include Past Mistakes)

Presented by Fredric J Harris

Wireless technology is a shining example of a disruptive innovation that has changed society in remarkable ways. The innovation has altered how people communicate, how people access information, how people are entertained, and how people conduct and schedule their social lives. Every human activity advances and grows through a number of influences. One is experience, one is market forces, another is effective education, and yet another is common wisdom. Common wisdom is entrenched perspectives and levels of understanding accepted by the community as guide posts of the process. In fact there are many examples to be found in the wireless community of common wisdom being faulty. Samuel Clemens’ comment “It ain’t what you don’t know that gets you in trouble, it’s what you know for sure that just ain’t so” The wireless community is not free of entrenched faulty common wisdom which is passed on to successive practitioners of the art. Universities are just as liable as industry for not examining and questioning common wisdom. In this presentation we examine the evolution of wireless technology from the early days through now and show how a number of wisdoms can be shown to not be wise but never-the-less have become entrenched in the fabric of our wireless technology

Go to Session

Time-Frequency Spectra with the S-transform

Presented by Lalu Mansinha

Most interesting data series consist of signal and noise series that are usually non-stationary, i.e. the properties fluctuate with time.Fourier analysis (FT) of the whole time series provides the spectrum of the whole time series, but is not capable of showing the time variation of the spectrum.The S-transform, also known as the Stockwell Transform (ST), uses a scalable, translating Gaussian window to determine the local spectrum at every point on the time series.The local spectrum supplements the local temporal information in the time series, and aids in the detection of onsets and cessations of events.For a N point time series, the output of the FT is a N point complex spectrum; the output of ST is a N x N, 2D time-frequency matrix, giving a N point spectrum at every point on the time series.Since the original time series contains only N points, the additional N2 - N points is a measure of the non-independent, redundant information computed for the ST.The redundancy is useful in presenting the similarities in the neighbouring local spectra and contributes to the visual continuity and smoothness to the 2-D time-frequency spectrum. The computation and storage of N2 - N additional points is a major drag on the usage of ST. Several approaches to reducing the computational burden are presented.Local spectra aids in analysis of 1D data. In images, the 2D local spectra aids in definition of texture and image segmentation.For 3 and 4 colour images, Trinion ST and Quaternion ST have been defined.In use since 1997, ST has found applications in numerous disciplines, including medical data series and images; power quality disturbance; atmospheric physics; exploration geophysics etc.The ST has been implemented in ARM and Raspberry Pi processors by several researchers.

This presentation is introductory, for the interested practitioner.Mathematical content will be at the absolute minimum.

Go to Session

Timing Synchronization in Software Defined Radios (SDR)

Presented by Qasim Chaudhari

A Software Defined Radio (SDR) merges the two fields of digital communication and digital signal processing into an efficient implementation of transmitters and receivers. One outcome of this combination is an interesting perspective on how timing synchronization is performed in digital communication receivers. This session will explain the timing synchronization problem in both time and frequency domains and then discuss in detail a timing locked loop consisting of timing error detectors, loop filter, interpolation and interpolation control. Insights into the relation of timing synchronization with general receiver design will also be presented.

Go to Session

Tiny Machine Vision: behind the scenes

Presented by Lorenzo Rizzello

Tiny devices, like the ones suitable for low-power IoT applications, are now capable of extracting meaningful data from images of the surrounding environment.

Machine vision algorithms, even Deep Learning powered ones, need only a few hundred kilobytes of ROM and RAM to run. But what are the optimizations involved to execute on constrained hardware? What is it possible to do, and how does it really work?

In this session, we will focus on the capabilities that are available for Cortex-M microcontrollers, starting from the user-friendly environment provided by EdgeImpulse to train and deploy Machine Learning models to the OpenMV Cam H7+.

We will guide attendees through the process using a straightforward example that illuminates inner workings so that attendees can get a grasp on technologies and frameworks. Attendees will walk away understanding the basic principles and be able to apply them not just to the Cortex-M but beyond.

Go to Session

Tips and Tricks for Avoiding and Fixing Real-Time Issues

Presented by Olaf Schmidt

Today embedded systems are made up of a large number of hardware parts, SoC, CPU and networks. On the software side many layers of large software stacks, API and applications are used. The complexity of the systems is ever increasing. Most people set their focus on getting the multitude of functional requirements done. Functional requirements are what the customers sees in the first line.

But, hey, there are also temporal requirements in many use cases. Users expect a certain reaction time of their system. They don't care about complexity, well defined interfaces or big amounts of data being transferred. Press a button and immediately see a light switch on. In an autonomous vehicle the required time from recognizing an obstacle to making the decision to turning the steering wheel is only milliseconds. The requirements describe end-to-end timing in many cases. Data coming from an input has to be at output within a certain time. We call the data flow "event chain".

This talk will take you on a journey through a model-based approach. Using a model to design the system and its timing behavior has the big advantage, that it can be used in simulation. The simulation runs the model and shows the timing behavior of all components, busses, scheduling, end-to-end timing and so on. It is possible to try out different scenarios quickly and find the best configuration. In the talk we will look at both the system view and the device view. They have to be synchronized and contribute to the overall user experience. On the way timing requirements are formalized, evaluated and violation is reported. Timing requirements for individual parts of the systems like cores and software components can be derived from the model and simulation.

After determining the best configuration teams will spread out and start the implementation. Trace files, that contain the timing of the implementation are taken. The traces are tested against the timing requirements already defined in the design step. The adherence to all timing requirements can be check upon every step in the projects. Upcoming problems are found early.

Join me in the exciting journey of flashing the light of a car within the expected time.

Go to Session

Tips and Tricks for Developing Products using the ESP32

Presented by Jacob Beningo

The ESP32 Wi-Fi / Bluetooth module has found its way into not only hobbyist applications but also professional IoT devices. This low-cost device with its open source software and strong ecosystem has many interesting characteristics that make it extremely attractive for use in a design. In this session, we are going to look at the nuances of designing products using the ESP32 and provide tips and tricks for successfully launching a product with it.

Topics covered in the session include:

  • How to select the right ESP32 module
  • Partitioning the Wi-Fi and Bluetooth capabilities with application software
  • Advanced processor features, multiplexing and other capabilities
  • How to leverage the open source software ecosystem
  • Hardware design tips and tricks

Go to Session

Tuxera Reliance Edge power-failsafe file system demo

Presented by TUXERA

This demonstration shows how power interruption causes failures in the FAT file system. Tuxera's Reliance family of file systems - including Reliance Edge and Reliance EdgeNAND - is incorruptible under the same conditions. Reliance Edge™ is a small-footprint IoT embedded file system designed to capture and preserve decision-quality data. A transactional file system, Reliance Edge protects critical system and user data from corruption, specifically for systems where power loss may occur. It works with a broad array of storage media including: eMMC, SD/MMC, NVRAM, USB mass storage, and SATA (or PATA) disks, and with a wide variety of real-time operating systems.

Go to Session

Using Low Power Wide Area Networks For Industries with Minimal Total Cost Of Ownership And High Robustness

Presented by Burak Polat

Low power wide area networking technologies enable users to use low cost, battery-powered sensors from long communication distances with minimal service and setup requirements. This accelerates industrial digitalization efforts by lowering down the cost of IoT for enterprises, it also creates an enormous opportunity for better industrial AI. However, due to the very nature of those technologies and the current hardware ecosystem, there are some important aspects that users need to be aware of such as hardware management, network optimization, and overall system modeling. Burak will talk about the fundamentals of using low-cost networking and IoT technologies for industrial requirements.

Go to Session

Using Visual Trace Diagnostics to Uncover Hidden Issues

Presented by Dr. Johan Kraft

Presented by Percepio

Embedded IoT software is often multi-threaded, event driven, and resource constrained. This increases the difficulty of IoT software development and calls for better means for debugging, beyond the limited scope of traditional debugging tools.

Software event tracing can improve IoT software development by providing a timeline of the overall software activity. This is very useful information for debugging, profiling and for finding software design flaws. Tracing can be performed entirely in software and remain active over long durations. It can even be used in deployment.

However, tracing produces lots of repetitive data. When debugging, you need to find a small number of anomalies. This can be like searching for needles in a haystack.

The human brain is visual and excels at pattern recognition. Visual trace diagnostics makes it possible to leverage this capability to make the anomalies stand out. This builds on software event tracing, but refines the data into a rich, meaningful model and visual overviews that makes it easy to spot anomalies. The result is quick, intuitive comprehension, even for large traces. This approach is invaluable in system-level debugging and for finding software design flaws.

Join Dr. Johan Kraft as he explores visual trace diagnostics and presents real-world examples of its use in locating and solving hidden software issues.

Go to Session

Voice-enabled IoT devices, everywhere

Presented by Brian Clinton

Presented by Arm

Following the success of Voice Assistant over Smart Speaker, a new breed of voice-enable devices are services are being developed which will enable massive dissemination of voice activation services, everywhere. Smart home, smart health and Industrial applications are some of the first that will benefit with deployment through smart home appliances, health assistants and smart manufacturing. This talk goes through a case study of a constrained IoT voice assistant implementation on an ultra low power, lost cost device. It describes the hardware and software functional blocks that is needed in order to perform voice recognition in harsh audio environments. It shows the benchmarks of analog front end processing and Keyword Spotting in the system. It explains the communication and security services integration, from the root of trust to cloud communication. Finally, it analyses what the future of voice and accompanying services and devices will look like what solutions will be needed.

Go to Session

Want to Reduce Power in Always-on IoT Devices? Analyze First

Presented by Tom Doyle

Hundreds of millions of portable smart speakers are listening for a wake word. Millions more acoustic event-detection devices are listening for window breaks, baby cries or dog barks. Consumers appreciate how easy it is to use their always-on listening devices – but the battery drain that results from continuously processing all sounds in their environment? Not so much. 

The problem is that this massive number of battery-powered IoT devices are notoriously power-inefficient in the way that they handle sound data. Relying on the age-old “digitize-first” system architecture, these devices digitize all the incoming sensor data as soon as they enter the device; then the data are processed for relevance, and in some cases, sent to the cloud for further analysis and verification. Since 80-90% of all sound data are irrelevant in most always-listening IoT devices, the digitize-first approach wastes significant battery life.

This session will show attendees how an “analyze first” edge architecture that uses analogML at the front end of an always-listening device eliminates the wasteful digitization and processing of irrelevant data, to deliver unprecedented power-saving and data efficiency in IoT devices. 

Session attendees will:

  • Understand that while most of today’s machine learning is implemented digitally, machine learning can also be implemented in ultra-low-power programmable analog blocks (analogML) so that feature extraction and classification can be performed on a sensor’s native analog data.  
  • Understand that the power problem for IoT devices is really a problem of the device treating all data as equally important and that determining which data are important earlier in the signal chain — while the data are still analog — reduces the amount of data that are processed through higher-power digital components. This approach saves up to 10x in system power in IoT devices.
  • Learn how to integrate this new analogML edge architecture with sensors and MCUs from leading semiconductor suppliers into current and next-generation IoT devices.

Go to Session

What the FAQ is an FPGA

Presented by Clive "Max" Maxfield

Presented by Microchip

A lot of people design embedded systems. Some of them are the hardware design engineers who create the boards. Others are the software developers who program the boards. The one thing that most of them have in common (apart from mutual distrust of each other) is that they predominantly use microcontrollers (MCUs) as the primary processing element in their designs.

Most of them have heard of FPGAs, but all they typically know is that these devices can be programmed to perform different functions -- they don't know how. Similarly, most of them have heard about languages like Verilog and VHDL, but all they typically know is that FPGA designers use these languages to capture the design -- they don't know how these hardware description languages (HDLs) differ from programming languages like C/C++.

In this presentation, engineer, writer, and communicator Max The Magnificent (a legend in his own lunchtime) will rend the veils asunder and reveal all. Max says that we will be leaping from topic to topic with the agility of young mountain goats, so he urges attendees to dress appropriately.

Go to Session

Why MISRA Matters!

Presented by Andrew Banks

Presented by LDRA

In this talk, Andrew Banks will discuss the importance of the static analysis in general, and the MISRA C/C++ Guidelines in particular, within Verification and Validation ("V&V") activities.

It will showcase common pitfalls that MISRA seeks to help avoid, and rationale behind some of the guidelines, while introducing the recent Amendment 2 to MISRA C:2012.

The presentation will also highlight why it is important to analyse and release "production" code.

Go to Session

Working with custom ISA extensions in RISC-V

Presented by IAR Systems

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session

Working with custom ISA extensions in RISC-V

Presented by IAR Systems

One of the major benefits of using RISC-V is the flexibility the architecture provides, which enables OEMs as well as SoC vendors to design custom cores with the exact definitions needed for the application or product. The fact that you can add any instruction you need provides full flexibility for innovation and differentiation without compromising code quality or performance. These application-specific instructions (custom ISA extensions) is enabled through the .insn directive. In this webinar your will learn how to make use of your custom extensions in the development of your RISC-V based application.

Go to Session

You've Got the Power. Manage it Wisely.

Presented by Matt Liberty

Presented by Jetperch

No customer wants to change or recharge batteries. This talk explores the techniques and methods to develop products that wisely consume only the energy that they need. Following a quick review of current, voltage, power, and energy, this session will cover:

  1. The techniques used to budget for energy consumption during the initial product design
  2. The equipment and methods used to measure voltage, current, power & energy
  3. The common ways of reducing energy consumption in your product after you have hardware and software. These techniques span both hardware and software.

Energy management applies to nearly all battery-powered products including mobile phones, toys, and Internet of Things end node. Even always-on mains powered devices are concerned with power consumption to meet energy regulations, reduce cost, and consume less energy. This talk will help you develop better, more energy-efficient products.

Go to Session

Register

and gain access to 35+ hours of amazing content from some of the top luminaries in the Embedded Systems industry

By checking this box, you agree to our privacy policy.
By checking this box, you agree to receive more information from Embedded Online Conference and its sponsors.