Hi [[ session.user.profile.firstName ]]

Secure, Efficient, and Robust Gateway for Device Management on the Edge

As more intelligence being pushed to the edge, IoT deployment not only requires smart connected devices but often needs an intelligent gateway that can manage multiple hardware, support numerous application and protocols, and offer added computing and security capabilities.
An intelligent edge gateway plays a crucial role in any IoT infrastructure, from connecting legacy devices to the cloud, to diagnostics and device management, and running applications locally or through the cloud.
In this webinar, you will:
• Learn device management features such as bring-on-board, first-to-claim, firmware update, resource management
• Mobile application that lets you do local control directly or through the cloud
• Edge compute capabilities with local application execution
• Device-to-cloud security and underlying foundation of Mbed Linux
• A demo of the Pelion Edge Gateway
Recorded Jul 11 2019 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Deepak Poornachandra, Arm
Presentation preview: Secure, Efficient, and Robust Gateway for Device Management on the Edge

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to get started with Arm Cortex-M55 software development Apr 21 2020 2:00 pm UTC 60 mins
    Christopher Seidl, Senior Marketing Manager MDK & CMSIS and Jason Andrews, Solutions Director
    How to get started with Arm Cortex-M55 software development

    IoT and embedded developers can take advantage of an unprecedented uplift in energy-efficient machine learning and signal processing performance for next-generation voice, vision or vibration use cases with Arm's latest endpoint AI technologies:
    • The Cortex-M55 processor, Arm's most AI-capable Cortex-M processor
    • The Ethos-U55, the industry's first micro neural microprocessor (microNPU) that's designed to work with Cortex-M processors.

    These technologies can be developed in a unified software toolchain for the simplest and fastest development path for AI. Join this webinar to be one the first to get started today to write optimized code for the exciting features these processors bring.

    This webinar will be a hands-on demo of the development flow available with Arm tools and will cover:
    • New architectural features of the Cortex-M55 processor
    • How to benchmark an application using Cycle Model
    • How to run the application on an FPGA prototyping board
    • How to optimize your code with Keil MDK debug features
  • Faster build, healthier code with embedded Continuous Integration Mar 31 2020 1:00 pm UTC 60 mins
    Zach Lasiuk, Senior Solutions Designer & Bruno Castelucci, Staff Field Application Engineer
    Software development is an ongoing compromise between good, fast and cheap. With code size exploding exponentially, the complexity of software is rapidly growing year by year. This can lead to project delays, poorer quality and frustrated engineers. Developing software for embedded targets, where the development and production environments are different, adds to the challenges.

    Continuous integration stands out as a best-practice methodology for embedded software developers. By applying its principles, teams can create efficient code development flows with easily and reliably verifiable code health and implement efficient safety-certified development processes.

    In this webinar, Arm experts will take you through:
    - How to create more efficient embedded development flow with CI
    - How to plan the setup of the CI flow stages
    - Best practices and use cases
    - Resources to get started
  • How automation can accelerate IoT deployments with Pelion Device Management Mar 18 2020 4:00 pm UTC 60 mins
    Duncan Jones, Senior Product Manager, Arm & Tom Van Leeuwen, IoT Product Manager, Waylay NV
    IoT allows businesses to extract data from devices to empower better decision-making.
    Pelion Device Management is already being used by device makers to rapidly create innovative IoT products and collect crucial data from devices under management. The next step in solution evolution is to maximise the value through data insights.

    In this webinar, we will explain how automation platforms can harness the data from Pelion Device Management to drive automated business decisions and process workflows. We will explore one such integration, developed by Waylay, which uses rules engines to accelerate the path to greater efficiency.
  • How automation can accelerate IoT deployments with Pelion Device Management Mar 18 2020 10:00 am UTC 60 mins
    Duncan Jones, Senior Product Manager, Arm & Tom Van Leeuwen, IoT Product Manager, Waylay NV
    IoT allows businesses to extract data from devices to empower better decision-making.
    Pelion Device Management is already being used by device makers to rapidly create innovative IoT products and collect crucial data from devices under management. The next step in solution evolution is to maximise the value through data insights.

    In this webinar, we will explain how automation platforms can harness the data from Pelion Device Management to drive automated business decisions and process workflows. We will explore one such integration, developed by Waylay, which uses rules engines to accelerate the path to greater efficiency.
  • Building Voice Experiences on Embedded Devices Mar 12 2020 4:30 pm UTC 60 mins
    Mehrdad Majzoobi, Picovoice, Alireza Kenarsari-Anhari, Picovoice, David Bartle, Picovoice & Mary Benninon, Arm
    AI on Arm Partner Webinar
    Picovoice and Arm IP Teach You How to Build Voice Experiences on Embedded Devices

    Do you want to learn how to design and build a compelling voice interface that runs fully offline on Arm embedded microcontrollers or microprocessors?

    See how Picovoice, a leading embedded voice AI solution provider, and its web-based design platform enable engineers, non-technical UX designers and product managers, like you, to do this across a broad spectrum of Arm IP.

    In this webinar, we’ll:
    - Walk through the challenges and solutions for building offline voice solutions for embedded devices
    - Present Picovoice technology and its advantages over current solutions
    - Introduce Picovoice’s web-based design platform for building voice interfaces
    - Demo an example voice application on Raspberry Pi
    - Demo an example voice application on the Arm Cortex-M4

    As a bonus for attending, attendees will receive a $500 promotion code to apply towards the purchase of Picovoice products and services. Register now!
  • Top-down Performance Analysis Mar 5 2020 4:00 pm UTC 60 mins
    Florent Lebeau, Solutions Architect, Arm
    For Linux server and HPC applications, Top-Down performance analysis is a popular and effective optimization methodology. By categorizing subsets of CPU hardware events the approach highlights which portion of the CPU pipeline is starving, guiding the programmer towards relevant bottlenecks in a robust hierarchical manner.
    The latest version of our profiler in Arm Forge introduces configurable CPU metrics based on hardware events.

    In this webinar, Florent Lebeau, Solutions Architect from Arm, will demonstrate:
    • Basic and advanced usage of this feature for issue identification
    • How top-down performance analysis is applied to optimize using Arm Forge.
  • Wireless Cloud Connectivity Made Easy Recorded: Feb 6 2020 17 mins
    Christopher Seidl, Senior Marketing Manager MDK & CMSIS
    CMSIS-Drivers for WiFi connectivity is a standardized interface, that makes cloud connectivity simple. Off-the-shelf CMSIS components let developers easily set up and connect embedded applications to the cloud using a WiFi shield for their favorite development board.
    The new WiFi driver validation suite helps to debug connectivity issues and get to a stable connection faster.

    We will demonstrate these functionalities on an NXP LPC55S69 development board with a popular WiFi shield during the webinar.

    You will learn about how to:
    - Set up and connect an embedded application to the cloud
    - Use Wifi driver validation suite to debug connectivity issues
  • Securing IoT Solutions by Design Recorded: Jan 15 2020 44 mins
    David Rogers, CEO Copper Horse
    Most system Architects, Operational Executives, Product Managers and Developers understand that a device management platform has a role to play in ensuring a secure IoT device ecosystem. But few understand 'why' it's so important and 'how' to adopt this approach in a secure, streamlined and scalable fashion.

    Device hacks are becoming increasingly frequent, but you'd be surprised by the simplicity of some attacks. Conversely, the protection of diverse device types is no easy task, especially when an enterprise's duty of care lasts not just to the point of sale, but for the device's entire life cycle.

    In this session, we will begin by detailing why a diverse and secure device management ecosystem is so important and how to make that transition.

    To download the White Paper 'IoT-Securing by Design' please follow this URL: https://learn.arm.com/securingiotbydesign.html This can also be found in the attachments section of the webinar
  • Securing IoT Solutions by Design Recorded: Dec 2 2019 45 mins
    David Rogers, CEO Copper Horse
    Most system Architects, Operational Executives, Product Managers and Developers understand that a device management platform has a role to play in ensuring a secure IoT device ecosystem. But few understand 'why' it's so important and 'how' to adopt this approach in a secure, streamlined and scalable fashion.

    Device hacks are becoming increasingly frequent, but you'd be surprised by the simplicity of some attacks. Conversely, the protection of diverse device types is no easy task, especially when an enterprise's duty of care lasts not just to the point of sale, but for the device's entire life cycle.

    In this session, we will begin by detailing why a diverse and secure device management ecosystem is so important and how to make that transition.

    To download the White Paper 'IoT-Securing by Design' please follow this URL: https://learn.arm.com/securingiotbydesign.html This can also be found in the attachments section of the webinar
  • On Premises vs. Cloud: Choosing the Right IoT Deployment Approach Recorded: Nov 27 2019 50 mins
    Ville-Veikko Helppi, Principal Technical Product Manager, Arm
    According to the 2019 State of the Cloud Survey from Rightscale, more than 50% of all IoT-enabled enterprises manage their device estate using on-premises or hybrid solutions.

    If you are looking to deploy IoT devices across your organization, it is worth examining why organizations are choosing to deploy IoT systems within an on-premises or hybrid environment rather than solely in the public cloud.

    This webinar will highlight:

    - Beyond regulations, what key considerations are driving the increase in on-premises deployment
    - How to achieve security and scalability in IoT device management
    - Key pillars in device lifecycle management
  • IoT Security for Software Developers: The Platform Security Architecture APIs Recorded: Nov 22 2019 38 mins
    Suresh Marisetty, Principal Security Solutions Architect
    The Platform Security Architecture (PSA) is a framework for securing devices. A holistic set of technical resources and guides make it quicker, easier and cheaper to design security into chips and devices.

    Within these resources are the PSA Functional APIs. These define the foundations from which security services are built and provide a consistent interface to the underlying Root of Trust hardware.

    This webinar is aimed at developers designing IoT devices and want to make use of the PSA Functional APIs to build a secure product. ​

    Suresh Marisetty, Principal Security Solutions Architect, will talk through the PSA Functional APIs: ​
    - Firmware Framework, used to call a service provided by a secure partition​
    - Crypto API, which provides cryptographic and key management functions ​
    - Secure Storage API, which manages secure storage of objects ​
    - Initial Attestation API, used to prove a device is authentic​

    The webinar also covers the three levels of isolation and describe why adding isolation improves security. Guidelines will be provided to enable you to determine whether this is necessary in your use case and show how to write code in a partitioned device. ​
  • How will a CMP help MNOs win the IoT Market Recorded: Nov 20 2019 42 mins
    Rob Shah, Senior Product Manager, Pelion Connectivity Management
    Take your share of 1 trillion forecasted connections and become an IoT market leader. Join this live demonstration to find out how a connectivity management platform can help you unlock new markets, be ready for scale and increase profit margins.

    Designed for mobile network operators, see how you can:
    • Reduce complexity of subscriber management with set and forget management of millions of connections
    • Limit administrative burden by giving your enterprise customers self-service connectivity management
    • Extend automation to eUICC
  • Master the Deployment of Advanced ML Solutions on Embedded Devices Recorded: Nov 6 2019 67 mins
    Andrew Caples & Sebastien Taylor, Au-Zone
    AI on Arm Partner Webinar
    Au-Zone Technologies and Arm IP Optimize Run Time for Embedded Devices

    Do you want to learn how to create and optimize on-target runtime performance of advanced ML solutions for challenging vision applications on edge devices? See how Au-Zone, a leading embedded solutions provider, and its DeepView ML Toolkit enable developers to do this across a broad spectrum of Arm IP.

    In this webinar, we’ll:
    Walk through the challenges and solutions for deploying ML solutions for embedded devices
    Explain what the DeepView ML Development Environment is
    Discuss Vision/ ML use cases across the spectrum of Arm cores
    Introduce DeepView for Raspberry Pl, and what can you do with it
    Demo ML examples on Raspberry Pl

    As a bonus for attending, attendees will have an opportunity to receive a trial version of DeepView ML Toolkit for Pi 3+/Pi 4.
  • IoT Security for Software Developers: How PSA can help Recorded: Oct 3 2019 64 mins
    Joseph Yiu, Distinguished Engineer, Shebu Varghese Juriakose, Senior Software Technology Manager & Rob Coombs, Director, Arm
    Designing secure IoT gadgets can be difficult if you are trying to do everything yourself. With Arm, you don’t have to. The combination of Platform Security Architecture (PSA) principles and certification, TrustZone for Armv8-M and Trusted Firmware-M mean the hardest parts of securing an IoT device have been done. They are now integrated in the new generation of microcontrollers based on Arm Cortex-M23 and Cortex-M33 processors, making application development just as easy as previous generations of microcontrollers and freeing you up to focus on differentiation.

    Join three Arm security experts for a tour of a much easier path to secure your IoT products, regardless of your expertise in IoT or embedded security.

    During the webinar, you will learn:
    • How PSA certification helps microcontroller software developers
    • How TrustZone helps secure IoT systems
    • How typical applications work in TrustZone (where the RTOS is placed)
    • Concepts of secure firmware and introduction of the Trusted Firmware-M (TF-M) project
    • What you need to know when porting legacy applications from Armv6-M/Armv7-M to Armv8-M
    • What APIs TF-M provides and how to get started
  • IoT Security for Software Developers: Using TrustZone in a Secure IAR Workflow Recorded: Oct 3 2019 47 mins
    Kobus Marneweck, Senior Product Manager, Arm & Michael Fuhrmann, Senior Field Applications Engineer, IAR
    The Internet of Things (IoT) introduces new challenges for designers of smart, connected devices – security being one of the most critical. Software security hinges on creating an isolated secure execution environment and this is now easier and more efficient in a single CPU on resource-constrained embedded systems with Arm TrustZone technology for Cortex-M based CPUs.

    How do you make the most of the possibilities that the new Arm TrustZone-enabled embedded microcontrollers offer?

    During this webinar you will learn:
    • How to easily get started setting up a secure development workflow using IAR Embedded Workbench and IAR Systems’ new tool C-Trust
    • Since code quality is critical, we will also show you how to use IAR Embedded Workbench to create reliable, efficient TrustZone-based applications

    This webinar will cover security implementation on the new generation of microcontrollers based on Arm Cortex-M23 and Cortex-M33 processors.
  • How to maximise the benefits of eSIM in smart utilities Recorded: Oct 3 2019 54 mins
    Tom Burke, Edwin Haver & Gregor Rodic
    We’ve joined forces with IoT and mobile solutions provider, Workz and smart metering manufacturer Iskraemeco Workz and Iskaremeco to explain the benefits and provide practical aspects of utilizing eSIM technology for smart utilities applications.

    What you’ll learn:
    • How to simplify the deployment and management of smart meters at scale
    • Practical aspects of managing devices remotely with eSIM technology
    • The benefits of embedding connectivity at point of manufacture

    Future-proof your smart utility investments in the long run. Learn eSIM technology can help simplify the deployment, management and security implementation of smart energy devices. Get practical proposals for utilizing eSIM technology.
  • IoT Security for Software Developers: NuMicro M2351 with TrustZone & CMSIS-Zone Recorded: Sep 25 2019 41 mins
    Kobus Marneweck, Arm, Christopher Seidl, Arm & Robert Ling, Nuvoton
    Today, more and more devices across our homes, cities and work places are becoming connected. When a device becomes connected, security must be considered from the ground-up to protect systems, networks, and data from a range of attacks and a broad spectrum of vulnerabilities. But, how can you ensure your IoT device is secure?
    The Nuvoton’s M2351 microcontroller brings a new level of trust and security to embedded systems. At the heart of the MCU, is the Arm TrustZone enabled Arm Cortex-M23 processor providing hardware enforced isolation between the Trusted and the Non-trusted resources in the device.
    Join this webinar to learn:
    • How to develop secure embedded applications from a software developer's perspective on the NuMicro M2351
    • How to simplify IoT security with the TrustZone enabled, Cortex-M23 processor
    • How to use software components, such as Trusted Firmware for Cortex-M (TF-M) and CMSIS to efficiently tackle common challenges
    • How to apply the approach on real target hardware from Nuvoton, using CMSIS-Zone for setting up the Secure/Non-secure partitions on the NuMicro M3251
    • How to create a smart authentication application that uses TF-M to secure credentials
    • How to use Keil MDK for embedded software development
  • IoT Security for Software Developers: Get Started with TrustZone for Cortex-M Recorded: Sep 23 2019 65 mins
    Jacob Beningo
    We often hear how important it is to secure IoT and embedded devices, but how exactly do we go about doing that? In this webinar, we will explore the steps necessary to develop a secure application starting with architecture design and isolation and ending with implementation.
    We will look at the major components that need to be in place such as secure boot, peripherals, libraries, data storage and more. Examples and the demonstration will be done using the Microchip SAML11 TrustZone-enabled microcontroller.
    During the webinar, you will learn:
    •How to identify Secure and Non-secure software components
    •Why and how to partition an application using Arm TrustZone technology
    •How to secure peripherals and manage the secure boot process
    •Tips for protecting secure data such as private keys

    This webinar will be delivered by Jacob Beningo.
  • How to maximise the benefits of eSIM in smart utilities Recorded: Sep 9 2019 55 mins
    Tom Burke, Edwin Haver & Gregor Rodic
    We’ve joined forces with IoT and mobile solutions provider, Workz and smart metering manufacturer Iskraemeco Workz and Iskaremeco to explain the benefits and provide practical aspects of utilizing eSIM technology for smart utilities applications.

    What you’ll learn:
    • How to simplify the deployment and management of smart meters at scale
    • Practical aspects of managing devices remotely with eSIM technology
    • The benefits of embedding connectivity at point of manufacture

    Future-proof your smart utility investments in the long run. Learn eSIM technology can help simplify the deployment, management and security implementation of smart energy devices. Get practical proposals for utilizing eSIM technology.
  • Is NB-IoT the future of IoT connectivity? Recorded: Aug 29 2019 46 mins
    Paul Bullock
    Extended coverage, lower power consumption and the security of cellular, the promise of NB-IoT for IoT connectivity is well known but are there times when NB-IoT isn’t the right choice? Join this webinar to get a deeper understanding of NB-IoT, the use cases it’s best suited to and use cases where other connectivity options may be a better option. Attendees will leave this webinar better prepared to make connectivity choices for their device use case.
    Related content
    • Remote SIM Provisioning Whitepaper
    • New Industrial Whitepaper – in development
Diverse webinars on all elements of the Arm ecosystem
From providing the IP for the chip to delivering the cloud services that allow organizations to securely manage the deployment of products throughout their lifecycle, Arm delivers a complete Internet of Things (IoT) solution for our partners and customers. It’s rooted in our deep understanding of the future of compute and security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Secure, Efficient, and Robust Gateway for Device Management on the Edge
  • Live at: Jul 11 2019 2:50 pm
  • Presented by: Deepak Poornachandra, Arm
  • From:
Your email has been sent.
or close