Upcoming Virtual Events

Upcoming Virtual Events from Embedded Computing Design and its partners.

  • IoT Device Security Conference

    IoT Device Security Conference

    The Virtual IoT Device Security Conference –– Securing today's connected, AI, and machine learning devices.

    Read Article
  • Innodisk Virtual Exhibit

    Innodisk Virtual Exhibit

    Explore industry-leading solutions and learn about the future of computing in our first-person 3D exhibit. Innodisk Virtual Exhibit has different areas waiting for you to discover.

    Read Article
  • Autonomous Vehicles: We’re Already There (Sort Of)

    Autonomous Vehicles: We’re Already There (Sort Of)

    Depending on your perspective, autonomous vehicles have been with us for quite some time, or they’re not even close to being here.

    Read Article
  • Bio-Medical AFE for Connected Health & Remote Monitoring

    Bio-Medical AFE for Connected Health & Remote Monitoring

    With an aging population, cost of health is rising fast. Prevention and disease detection are helping to control the cost of health. To be able to detect anomalies early, 24/7 monitoring is required.

    Read Article
  • RISC-V Summit

    RISC-V Summit

    Your chance to network with thought-leaders, technology companies, and researchers spearheading the adoption of this transformative change in the silicon market. Registration is now open!

    Read Article
  • Qt World Summit Online

    Qt World Summit Online

    Get free tickets to the software development & UI/UX event of the year!

    Read Article
  • NVIDIA GTC 2020: Deep Learning & AI Conference

    NVIDIA GTC 2020: Deep Learning & AI Conference

    AIRS 10/5/2020: GTC is the must-attend digital event for developers, researchers & innovators looking to enhance skills, exchange ideas understand AI transformation.

    Read Article
  • Best Practices to Protect IP and Deliver Secure Encrypted Code

    Best Practices to Protect IP and Deliver Secure Encrypted Code

    AIRS 11/10/2020 at 11 AM EDT: In this talk, we will discuss some best practices to ensure that your application is safe and that illegal copies of your product are as difficult as possible to create.

    Read Article
  • IEC 62443: How to Achieve the Highest Levels of Industrial Security

    IEC 62443: How to Achieve the Highest Levels of Industrial Security

    AIRS 11/10/2020 at 2 PM EDT: The IEC 62443 standards have been widely praised for their use of practical but effective countermeasures. Learn how they can be used to secure industrial systems.

    Read Article
  • Smart Home Device Security: A System View

    Smart Home Device Security: A System View

    AIRS 11/10/20 at 4 PM EDT: We discuss what is needed to secure a smart door lock, including threat models, required hardware and software security features like cryptography and isolation.

    Read Article
  • Tuning Your Hypervisor for Better Embedded System Performance

    Tuning Your Hypervisor for Better Embedded System Performance

    AIRS 10/27/20 at 11 AM EDT: This webinar explores best practices for hypervisor analysis and tuning, and presents techniques and tooling examples you can use when building hypervisor-enabled devices.

    Read Article
  • Meeting the Need for Secured Authentication in Wireless Charging

    Meeting the Need for Secured Authentication in Wireless Charging

    AIRS 10/21/20 at 11 AM EDT: During this webcast, attendees will learn about the rationale behind the Wireless Power Consortium’s version 1.3 of the Qi specification, what is needed and best practices.

    Read Article
  • Micro Video Series: Putting It All Together

    Micro Video Series: Putting It All Together

    ON DEMAND: Baking security into your system is not easy, but it must be done. Learn where to go to get the help you need to build a secure and safe device.

    Read Article
  • Micro Video Series: Ongoing Threat Prevention

    Micro Video Series: Ongoing Threat Prevention

    ON DEMAND: Securing your device or system is a complete lifecycle effort. Learn why proactive endpoint integrity monitoring is a must in today’s interconnected world.

    Read Article
  • Micro Video Series: Hardening and Fortifying

    Micro Video Series: Hardening and Fortifying

    ON DEMAND: You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device

    Read Article
  • Micro Video Series: Designing with a Trusted Foundation

    Micro Video Series: Designing with a Trusted Foundation

    ON DEMAND: How to build on a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.

    Read Article
  • Micro Video Series: Building a Security Policy

    Micro Video Series: Building a Security Policy

    ON DEMAND: Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats.

    Read Article
  • Micro Video Series: Capturing Use Case Security Requirements

    Micro Video Series: Capturing Use Case Security Requirements

    ON DEMAND: Learn how security requirements will influence the direction your project takes, and what you will need to prove you’ve met them.

    Read Article
  • Micro Video Series: The Cybersecurity Journey Through the Full Product Lifecycle

    Micro Video Series: The Cybersecurity Journey Through the Full Product Lifecycle

    ON DEMAND: Device security starts before the first line of code is written and ends only after the system is taken out of service. Learn how security is applied at different stages of the journey.

    Read Article
  • Archived Webcasts & Events in Progress

    Archived Webcasts & Events in Progress

    Browse all ongoing and past virtual events hosted by OpenSystems Media.

    Read Article
  • loading
    Loading More...