Embedded E-cast show

Embedded E-cast

Summary: An E-cast is a live, single or multiple sponsor event used to educate engineers, programmers, and other industry professionals about a particular product, service, or technology. Each podcast consists of a 45-minute presentation and 15-minute interactive Q&A session. E-casts are moderated by a member of the OpenSystems Media editorial staff or a industry recognized guest moderator. Our E-casts are moderated to keep the event interesting, informative, and technically relevant.

Join Now to Subscribe to this Podcast

Podcasts:

  E-cast: Wind River Test Management 5.0: Security Testing and Code Diagnostics | File Type: audio/x-mp3 | Duration: 01:00:00

Join us for a webinar that will delve into the details of the new capabilities and describe how they can be used in real life scenarios to cut test cycle times, to reduce the cost of achieving high quality and to harden devices against malicious attacks. .

  E-cast: Developing DSP applications with FPGAs | File Type: audio/x-mp3 | Duration: 01:00:00

In this 1-hour session, presenters will describe hardware and software tools, which enable engineers to develop DSP applications that take advantage of the processing power in the latest generation of FPGAs and FPGA SoCs. .

  E-cast: Designing Accessories for Smartphones and Tablets | File Type: audio/x-mp3 | Duration: 01:00:00

As smartphone and tablet use increases, the opportunity for a wide range of accessories and App-based accessories ("appcessories") is growing and its more than just speaker docks. Learn about the latest trends, and the wide range of accessory solutions for iPod, iPhone and iPad devices that are possible with Freescale MCUs, MPUs, sensors and analog products, including software and rapid prototyping systems.

  E-cast: Open Source 2.0? | File Type: audio/x-mp3 | Duration: 01:00:00

Since the inception of open source, companies have struggled to find successful, profitable business models. Attempts abound, including purist "services and support only", "bait and switch", Freemium, and dual licensing.

  E-cast: How to Get to Market with Android on your Smart Device | File Type: audio/x-mp3 | Duration: 01:00:00

Theres no disputing that Android devices are hot. But developing on an Android platform can be challenging both from a technical and business perspective.

  E-cast: Max Out Your Multi-core Performance with Wind River VxWorks | File Type: audio/x-mp3 | Duration: 01:00:00

The potential of multi-core platforms to deliver increased performance with less power consumption can only be fully realized with careful architecture decisions. You need to understand your platform requirements regarding performance, robustness, and security to successfully choose and configure your operating environment so you can fully leverage the power of multiple cores.

  E-cast: Introducing Wind River Linux 5 | File Type: audio/x-mp3 | Duration: 01:00:00

Wind River Linux 5 is ushering in a new era of enabling next-generation Linux devices. Adopting the Yocto Project as its core foundation, Wind River Linux 5 builds on our world-class project support, rapid open source maintenance practices, and advanced tools to deliver the ultimate launch pad for embedded Linux innovation.

  E-cast: Making Open Source projects work for the long haul | File Type: audio/x-mp3 | Duration: 01:00:00

At the beginning of an Open Source Project, you often start with a solution, commercial or noncommercial, with a known quality level. Then you go about customizing it by adding patches for project specific components, specific peripherals, performance optimizations, power management optimizations, etc.

  E-cast: Privacy-by-Design: Key Tips for Developers on Building Privacy into Apps and Devices | File Type: audio/x-mp3 | Duration: 01:00:00

Mobile devices are best defined by their ability to locate users more granularly and provide a new set of services and marketing messages. But, with this new additional capability, ensuring users trust application developers leveraging their location is critical to obtaining mass adoption of these new services.

  E-cast: Don't architect a real-time system that cant scale | File Type: audio/x-mp3 | Duration: 01:00:00
  E-cast: Comparing Network Appliance Throughput Across 2 Generations of Intel Core Platforms | File Type: audio/x-mp3 | Duration: 01:00:00

Ever-increasing network traffic keeps system designers of application servers, network appliances, and other packet-processing devices constantly looking for new platforms that can cost effectively increase throughput. For this market, the 2011 introduction of 2nd generation Intel Core processors (based on Intel microarchitecture formerly codenamed Sandy Bridge) offers real performance gains over previous generation architecture.

  E-cast: The Single Most Important Decision in Designing Your Distributed System | File Type: audio/x-mp3 | Duration: 01:00:00

Distributed systems work by sending information between otherwise independent applications. Traditionally, that communication is done by passing messages between the various nodes.

  E-cast: How to minimize cost and risk for developing safety-certifiable systems | File Type: audio/x-mp3 | Duration: 01:00:00

In this webinar, learn how the use of one common integration platform in your designs lowers development and certification costs and reduces overall project risk. We will discuss testability of distributed systems, how to avoid sources of non-determinism, design alternatives to reliable communication and more.

  E-cast: The ten point guide to improving real-time and embedded software development | File Type: audio/x-mp3 | Duration: 01:00:00

Software plays an ever-increasing role in driving innovation and providing marketplace differentiation in smarter products. However, the complexity of bringing more interconnected, instrumented and intelligent products to market faster is stretching software development teams and traditional software development approaches to the limit.

  E-cast: Five Ways to Secure a Real-Time Distributed System Without Compromising Performance | File Type: audio/x-mp3 | Duration: 01:00:00

The typical method of securing data-in-motion is to establish a secure channel between two nodes. For example, TCP/TLS can be used to both authenticate each node and encrypt the data in transit.

Comments

Login or signup comment.