Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date MaaXBoard RT: Implement TensorFlow Lite object recognition Jay Marcinczyk, Field Application Engineer, Avnet Attendees will be guided through the process of building a TensorFlow Lite object recognition embedded application. Step-by-step instructions are pro... 4 months ago | 25 mins Meet Arm Keil Studio - The New Cloud-Based IDE to Simplify IoT Development Christopher Seidl, Senior Product Manager Embedded Tools, Arm & Joe Alderson, Director of Embedded Tools and UX, Arm The Internet of Things (IoT) is transitioning into a new, complex world driven by increased compute, connectivity, and security capabilities, the rapi... 2 years ago | 50 mins Meet Arm Keil Studio - The New Cloud-Based IDE to Simplify IoT Development Christopher Seidl, Senior Product Manager Embedded Tools, Arm & Joe Alderson, Director of Embedded Tools and UX, Arm The Internet of Things (IoT) is transitioning into a new, complex world driven by increased compute, connectivity, and security capabilities, the rapi... 1 year ago | 50 mins Process Isolation in Safety-Critical Systems with Arm FuSa RTS Vladimir Marchenko, Product Manager MDK Core and Middleware, Arm Arm Run-Time System for functional safety (FuSa RTS) provides process isolation capabilities that allow integration of software components with differ... 2 years ago | 58 mins How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip Hervé Roche, VP Marketing, Trusted Objects & Rob Dobson, VP Technology, Device Authority In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs ... 1 year ago | 44 mins HoriZone of IoT - Energy Efficient Security for Cloud-ready IoT Devices Alessandro Ratti, Brad Rex, and Jurg Siegenthaler The market demand for trusted embedded IoT devices with advanced security features is rapidly expanding. This event will focus on the question of how... 2 years ago | 125 mins New FIDO Authenticator Provisioning Solution for Enterprises Stephen Oh, CEO, TrustKey Solutions Recently, the industry has been moving away from using passwords since it is known to be the main cause for many security breaches. One of the best Pa... 2 years ago | 38 mins Digital Control Methods - Class 3 of "Power Conversion" Tom Spohrer, Product Marketing Manager, MCU16 Division, Microchip Technology, Inc. In the final session, the analog control system will be converted into digital control system. Digital filtering algorithms will replace the analog co... 7 years ago | 64 mins Designing a Secure IoT Product? The 3 Things You Must Consider EPS: Colin Lynch, CEO • Brian Colgan, Security Solutions | Nuvoton: Jason Lin, VP • Robert Ling, Senior Technology Manager You're designing a product that will be connected to the IoT. What should you be thinking about? How are you going to protect your valuable IP and saf... 1 year ago | 60 mins How to choose between analog hardware and digital signal processing software Jacob Beningo, Beningo Embedded Group Embedded designers are under significant pressure to reduce system development costs. Many embedded designs include analog components that increase th... 4 years ago | 68 mins