Military Embedded Systems

Webcast Archive

Sponsored by: RTI
Mar 20, 2013 11:00AM EDT (11 years, 8 months ago)
The best way to architect your distributed system while driving down integration costs is to design your system of systems around one key property: inherent interoperability. But your design approach must embrace legacy systems. After all, you almost never start with a clean sheet of paper. Achiev...
Sponsored by: Dell, AMD
Mar 14, 2013 2:00PM EDT (11 years, 8 months ago)
High Performance Computing (HPC) brings to mind massively parallel systems that spare no expense. But today there is a very large HPC application space where computational performance must be balanced against cost to make a sound business case for real-world use. Advancements in processor and system...
Sponsored by: RTI
Feb 27, 2013 11:00AM EDT (11 years, 8 months ago)
Software pricing has always been controversial. As the evidence mounts that open source does not control costs, it has become even more critical. How much is software worth? Who should pay for it? What’s fair? Should vendors charge per floating license? Per user? For support only? Runtime royalties?...
Sponsored by: Altera, Pentek, Inc., Mercury, Rohde & Schwarz
Feb 27, 2013 2:00PM EDT (11 years, 8 months ago)
Radar and electronic warfare (EW) system designers are continually are tasked with doubling and tripling performance in every new design or system upgrade, which places a tremendous demand on signal processing solutions for these applications. Military program managers want to track multiple targets...
Sponsored by: LDRA
Feb 26, 2013 2:00PM EDT (11 years, 8 months ago)
If you’re developing safety-critical applications, you can’t afford to take chances. But commercial pressures don’t go away just because you’re diligent. The latest version of the MISRA standard lets you take advantage of more C features while helping you mitigate risk for safety-critical automotive...
Sponsored by: MathWorks
Feb 12, 2013 2:00PM EDT (11 years, 9 months ago)
This webinar will show you how to deploy critical avionics software with quality and confidence. Using code verification tools, you can easily identify critical defects in your source code. With formal methods based verification, see how you can mathematically prove that your source code is safe and...
Sponsored by: RTI
Jan 23, 2013 11:00AM EDT (11 years, 9 months ago)
Developing applications that can run over multiple cores, nodes or networks typically requires a significant amount of network-level programming. This low-level coding detracts from the implementation of application logic, introduces complexity, and is hard to maintain as requirements evolve and sys...
Sponsored by: Esterel Technologies
Jan 15, 2013 2:00PM EDT (11 years, 10 months ago)
Implementing a full V-process for the entire product lifecycle with interoperable tools provides developers with greater control and accuracy. A structured approach to efficiently connect the various modeling elements (for both the physics and the controller software) to the physical description of...
Sponsored by: Wind River
Dec 11, 2012 12:00PM EDT (11 years, 11 months ago)
Therapeutic technologies have shaped the medical industry by delivering treatments that save lives and ameliorate chronic conditions. But many categories of therapeutic devices are prone to high rates of malfunction and recall. Between 2005 and 2010, a reported 4,343 medical devices were recalled in...
Sponsored by: Freescale, QNX Software Systems
Dec 04, 2012 11:00AM EDT (11 years, 11 months ago)
Controlling the factory floor efficiently and securely has never been more important. However, design engineers typically have to worry about combining disparate parts and subsystems to get a controller—long before they can even get to their application. Freescale, QNX, ISaGRAF and KPA have develope...
Sponsored by: Mercury, Pentek, GE Intelligent Platforms
Dec 04, 2012 2:00PM EDT (11 years, 11 months ago)
Designers of electronic systems for unmanned vehicles, radar systems, fighter aircraft, ground vehicles, helicopter avionics, etc., all share a common challenge -- how to keep electronic systems cool when modern processors and boards generate so excessive heat and power. Today's chips from Intel, Fr...
Sponsored by: Emerson, Wind River, Intel
Oct 30, 2012 11:00AM EDT (12 years ago)
In this webinar we will reveal the details of Intel’s next-generation communications platform and show how you can deploy this platform in applications such as wireless infrastructure, edge routers, and security appliances.
Sponsored by: Freescale
Oct 18, 2012 2:00PM EDT (12 years, 1 month ago)
As smartphone and tablet use increases, the opportunity for a wide range of accessories and App-based accessories ("appcessories") is growing – and it’s more than just speaker docks. Learn about the latest trends, and the wide range of accessory solutions for iPod®, iPhone® and iPad® devices that ar...
Sponsored by: Emerson Network Power, Advantech, Adlink, Radisys
Oct 10, 2012 11:00AM EDT (12 years, 1 month ago)
Multicore processing, virtualization, and increasing network connection speeds to 40 gigabits and beyond are pushing their way into ATCA target markets. These disruptive technologies are enabling next generation features and applications. Critical mass has formed and learning curves are being overco...
Sponsored by: Wind River
Oct 02, 2012 2:00PM EDT (12 years, 1 month ago)
The potential of multi-core platforms to deliver increased performance with less power consumption can only be fully realized with careful architecture decisions. You need to understand your platform requirements regarding performance, robustness, and security to successfully choose and configure yo...
Sponsored by: RTI
Sep 27, 2012 11:00AM EDT (12 years, 1 month ago)
In this webinar, we will show you the most important change you can make to the way you license and deploy critical software for distributed systems. RTI is introducing the RTI Infrastructure Community Model, a new way to leverage the power of the world's leading implementation of the OMG Data Distr...
Sponsored by: Montavista
Sep 13, 2012 2:00PM EDT (12 years, 2 months ago)
At the beginning of an Open Source Project, you often start with a solution, commercial or noncommercial, with a known quality level. Then you go about customizing it by adding patches for project specific components, specific peripherals, performance optimizations, power management optimizations, e...
Sponsored by: TRUSTe, Locaid
Sep 06, 2012 2:00PM EDT (12 years, 2 months ago)
Mobile devices are best defined by their ability to locate users more granularly and provide a new set of services and marketing messages. But, with this new additional capability, ensuring users trust application developers leveraging their location is critical to obtaining mass adoption of these n...
Sponsored by: RTI
Aug 30, 2012 11:00AM EDT (12 years, 2 months ago)
Sponsored by: RTI
Jul 31, 2012 11:00AM EDT (12 years, 3 months ago)
Distributed systems work by sending information between otherwise independent applications. Traditionally, that communication is done by passing messages between the various nodes. This "message-centric" approach takes many forms, but all have a common premise: the unit of information exchange is th...
Sponsored by: RTI
Jul 17, 2012 11:00AM EDT (12 years, 4 months ago)
In this webinar, learn how the use of one common integration platform in your designs lowers development and certification costs and reduces overall project risk. We will discuss testability of distributed systems, how to avoid sources of non-determinism, design alternatives to reliable communicatio...
Sponsored by: IBM
Jun 27, 2012 2:00PM EDT (12 years, 4 months ago)
Software plays an ever-increasing role in driving innovation and providing marketplace differentiation in “smarter” products. However, the complexity of bringing more interconnected, instrumented and intelligent products to market faster is stretching software development teams and traditional softw...
Sponsored by: RTI
Jun 26, 2012 11:00AM EDT (12 years, 4 months ago)
The typical method of securing data-in-motion is to establish a secure channel between two nodes. For example, TCP/TLS can be used to both authenticate each node and encrypt the data in transit. But, what if you have a complex distributed system with low latency requirements? What if you are multica...
Sponsored by: Wind River
Jun 21, 2012 1:00PM EDT (12 years, 4 months ago)
Networking and communication equipment products are starting a great migration to solve the new challenges associated with The Cloud, Big Data, Virtualization, Workload Consolidation, and High Performance Computing. This massive migration is significantly transforming the underlying embedded techn...
Sponsored by: Intel Corporation, Kontron, Radisys
Jun 14, 2012 11:00AM EDT (12 years, 5 months ago)
This webinar will show how the new features benefit industrial automation, digital signage, healthcare, mil/aero, and other applications. We will also show how you can speed design with off-the-shelf hardware and software from the Intel® Intelligent Systems Alliance.