Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Everything You Need to Know About Structural Code Coverage for C & C++ Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance & Zak Maiga - Solution Architect Structural coverage is the identification of code that has been executed and logged. There are several reasons why it's important to perform this acti... 2 months ago | 58 mins Data logging for the long haul Sandor Filippinyi, Head of Global Software Engineering at Tuxera, & Eva Rio, Product Portfolio Manager at Tuxera Increased global digitalization and rising energy demands are leading to growth in the smart meter, data logger, sensor, wearable, and IoT markets. As... 2 weeks ago | 18 mins Intro to Ubuntu Core 22 Mohit Kedia, Director of IoT Product Management One year ago, we celebrated the release of Ubuntu Core 22, the Ubuntu flavour optimised for IoT and edge devices. With 4 releases behind, Ubuntu Core... 3 weeks ago | 31 mins Mapping Attack Patterns to Detect Threats Mark Alba, Chief Product Officer, Anomali To move forward, we often reflect on the past. It’s no different in cybersecurity. Take, for instance, threat detection. In the early days of the in... 3 days ago | 24 mins SUSE Future of Embedded Linux SUSE For enterprises that need to build integrated systems based on industry-standard hardware, SUSE provides a unique combination of operating system, awa... 4 weeks ago | 4 mins Embedded Ubuntu for devices Edoardo Barbieri, Product Manager Building upon years of contributions from the wider Linux community, Ubuntu is the most widely used OS among professional developers and the preferred... 2 months ago | 104 mins Windows Legacy Systems - Don't Be Caught Unprotected Adam Gordon, vCISO & Microsoft SME Microsoft recently announced the end of life (EOL) for Windows 7, 8, 8.1, 2008 R2, and their embedded variants. Windows 2012 is slated for EOL in Octo... July 12, 2023 3:00pm Automation: Can't Live Without It, Learn to Live With It John Burke, Chief Technology Officer | Nemertes IT’s love/hate affair with automation is long-standing and complicated. The continuing spread and complexification of the IT environment has made auto... 1 month ago | 31 mins Unleashing Telco Grade API Security from Edge-Cloud Ryan B - Technical Director of Strategic Machine Learning, Noname Security This session will showcase the integration of Noname Security's machine learning edge computing solution with the Intel® NetSec Accelerator Reference ... 1 month ago | 40 mins Discover what’s possible with Embedded Analytics Jennifer Davis (Arch Systems), Tim Burke (Arch Systems), Yogev Wallach (BriefCam), Joe Gabriel (Qlik) Whether you’re looking to boost revenue, drive adoption, speed time to market or differentiate your offering, the success of your solution can be enab... 6 months ago | 49 mins Load more