Hi [[ session.user.profile.firstName ]]

Embedded University

  • Date
  • Rating
  • Views
  • Keeping Your IoT Devices Secure – From Design to Decommissioning
    Keeping Your IoT Devices Secure – From Design to Decommissioning Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Oct 12 2017 64 mins
    In our first two classes, we have looked at the needs of a cloud-based IoT solution and how to design and build it. In this final class our expert instructor will cover the critical aspects of how to test and deploy our IoT solution, and more importantly, how to keep it secure and operational through ongoing monitoring and maintenance. We will look at how Device Cloud enables ongoing monitoring and maintenance for the devices through the entire life cycle of the IoT solution from design through end-of life. Particular elements to be covered will include Device Cloud functionality such as edge management and data management. Still in its relative infancy, the IoT is already being hacked at an alarming rate. We need to include the tools and the platform to stay one step ahead, keep our devices secure and up-to-date, and maintain a vigilant ‘eye’ on the system throughout its life. Sponsored by Wind River.
  • Designing for the IoT
    Designing for the IoT Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Oct 11 2017 63 mins
    As we learned in our first class, we need a cohesive platform of tools and various ‘building blocks’ to build a robust cloud-based IoT solution to meet the needs of even high-reliability IIoT applications. In this second class on cloud-based design for the IoT, our expert instructor will discuss how a combination of Industrial Internet of Things (IIoT) technologies and software-defined architecture (SDA) from Wind River® is ushering in a new era of IoT innovation. Some of the topics to be covered include development tools and example pre-build platforms for many popular targets, connectivity and control APIs, and network and infrastructure platforms and services. Our instructor will also cover the topics of how to assure our communications and data are secure and properly communicated, filtered, collected, and safely stored. Current industry estimates are that only 10-25% of data is actually collected and stored – when this data increases by perhaps two orders of magnitude in the next five years, how can we assure that we can indeed collecting, communicating, using, and saving the data we need? We will look at some of the answers to that question in this class. Sponsored by Wind River.
  • IoT and Cloud Computing Basics
    IoT and Cloud Computing Basics Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Oct 10 2017 64 mins
    Before we begin our IoT system solution, we need to fully understand the overall structure and key elements of a robust and secure cloud-based system. In this leadoff class, our expert instructor will review these needs as well as the possible challenges that we face and will continue to face in our IoT system throughout its life cycle. We will review the basics of designing for the IoT as well as the primary elements that are needed in its design. Issues to be covered include safety, security, device management, data management, network communications and infrastructure, and maintenance. We will look at Wind River Helix Device Cloud, a SaaS IoT device management platform, and how its ready-built elements can be integrated into our IoT design. Sponsored by Wind River.
  • Virtualization Increases Your IoT Critical Infrastructure System’s Cybersecurity
    Virtualization Increases Your IoT Critical Infrastructure System’s Cybersecurity Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Sep 28 2017 61 mins
    With the connection to the Internet and the connectivity to a plethora of devices, cybersecurity is a big issue. This dovetails with the need for multiple levels of safety that were discussed in Day 2, as it pertains to the cost of certification in critical infrastructure IoT. While this may sound like a complex endeavor, it doesn’t have to be. Attend Day 3 of this three-day course, and we’ll make sure that you’re headed in the right direction. We will show you how your IoT applications can be made secure and updated with critical cybersecurity patches while at the same time your safe and certified critical infrastructure applications remain untouched. In addition, we’ll provide a wrap-up of the three days and be sure to answer any outstanding questions. Sponsored by Wind River.
  • Use Virtualization To Enable Safety-Certified IoT Critical Infrastructure System
    Use Virtualization To Enable Safety-Certified IoT Critical Infrastructure System Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Sep 27 2017 61 mins
    Companies are updating their critical infrastructure, and safety has become a key issue, with increased regulation and risk of litigation driving the need for safety certification in industries such as aerospace, energy, industrial automation, medical, and robotics. One area of concern is partitioning safety certified and non-safe code and that’s what we’ll cover in Day 2 of this three-day course. We’ll look at how using virtualization, Java, analytics and various types of partitioning in your IoT design can maximize safety and reduce your overall design cost and risk. Sponsored by Wind River.
  • How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems
    How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Sep 26 2017 62 mins
    There’s no way around it; as a software developer, system engineer, or system architect, you’re going to encounter design complexity when developing safe, secure and reliable IoT systems for today’s critical infrastructure. But in this new software-defined world and with the IoT exploding around us, companies like yours must adapt to stay relevant. While legacy critical infrastructure is too expensive to just replace completely, there are ways to implement new features that will define premium products for your market and meet the safety and security requirements necessary for connecting to the IoT. In Day 1 of this three-day class, we’ll look at how you can transform digitally and ensure that your applications remain safe and secure. Sponsored by Wind River.
  • Powering the Industrial Internet of Things
    Powering the Industrial Internet of Things Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Jun 22 2017 61 mins
    Don’t confuse the Internet of Things (IoT) with the Industrial IoT (IIoT), which typically has much more stringent characteristics. That’s because the IIoT usually involves some sort of manufacturing, robotics, or other mission-critical application, where down-time can be measured in dollars, often lots of them. In Day 3 of this three-day class, we’ll look at how to best power your IIoT application, which could include FPGA power and design considerations for high-speed RS-485 data links. The class will use the Intersil PowerCompass tool to help simplify the design. Day 3 sponsored by Intersil
  • Designing for Safety in Non-Mobile Applications
    Designing for Safety in Non-Mobile Applications Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Jun 21 2017 60 mins
    Ensuring that currents don’t exceed safe levels is just one area that will be explored in Day 2 of this three-day class. Using specific product examples to remove the guesswork, our expert instructor will explain how to protect against overcurrent damage using a 12-V buck regulator family as the design example. You’ll also get an understanding of how linear and low drop-out (LDO) regulators operate, including their key performance parameters. Day 2 sponsored by Intersil
  • Designing for Safety in Battery-Powered Applications
    Designing for Safety in Battery-Powered Applications Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Jun 20 2017 62 mins
    Recent events have proven that you can never be too careful when you’re designing batteries into your systems, and that covers everything from wearables to hybrid/EV battery packs. In Day 1 of this three-day class, we’ll look at how to make your battery packs safer; how to build a USB-to-controller interface that “talks” to a power device; and how to extend battery life in wearable devices. The class concludes with a question and answer period between the attendees and the expert instructor. Day 1 sponsored by Intersil.
  • IoT Device Management
    IoT Device Management Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Mar 23 2017 64 mins
    In our final class, we will look at the “Things” of the IoT – our nodes and devices – and how we can effectively commission, monitor, and detect problems in them throughout their lifecycle. We will look at methods for adding device management capabilities in our devices from the design stage as well as ways to add these capabilities in the legacy devices we looked at in the previous class. One topic we will look at is effective commissioning and decommissioning of devices in the network – how can we add or remove a node from the network without adversely impacting the rest of the network? Another area we will look at is security assurance and testing: how can we be sure of the device security – and how can we test it? And lastly we will look at maintenance. What methods can we use for testing devices or paths within the network and how can we effectively and safely perform system updates? To conclude our class, we will review our checklist and see what other issues we may need to be aware of in our IoT design. Day 3 sponsored by Wind River

Embed in website or blog