Sensors Converge Live Trainings & Workshops
Prototyping Secure Sensor Applications Using Click Boards and the Azure Sphere Starter Kit
Presented by Avnet
Creating quick, accurate, and secure proof of concept prototypes can reduce risk in IoT applications. In this mini workshop, a complete Microsoft Azure IoT connected sensor system is explained and demonstrated by an Azure Sphere specialist. Attendees are then guided though the hands-on process of configuring Avnet’s Azure Sphere Starter Kit for a variety of sensor-to-cloud applications. Attendees will take home an Avnet Sphere Starter Kit and two MikroE click boards to enable follow-on experimentation and learning. View details and schedule here.
Enhancing an Embedded Sensor Application with a Custom Voice Command Interface
Presented by Avnet
Incorporating voice recognition / command detection is a growing trend in embedded systems. In this mini workshop, a full-featured, voice-interfaced sensor system with webserver and embedded media player is demonstrated. Attendees are then guided though the rapid implementation steps of adding their own custom voice-command interface using NXP’s online VIT Voice Model Generation tool. The final building and running of a voice-enabled application using Avnet’s NXP i.MX RT1176 based MaaXBoard RT concludes the workshop, with attendees taking home the MaaXBoard RT kit for further experimentation. View details and schedule here.
Cyber Resilience for IoT - Bouncing Back from Attacks
Presented by Trusted Computing Group
Tuesday June 28, 2022 12:30pm - 1:15pm PDT
IoT devices are constantly under attack and the attacks just keep getting better. What happens if an attacker finds a chink in your armor and successfully infects a device or thousands of them? Trusted Computing Group’s newest cyber resilient technology standards show how to detect and recover from such an attack in an automated manner. Come learn about how you can use this new technology.
Optimizing Deep Learning AI/ML Models for Resource Constrained Embedded Systems
Presented by: IAR Systems
Tuesday, June 28, 2022 1:30pm - 2:15pm PDT
Machine Learning is becoming increasingly relevant in industry for decreasing costs and increasing efficiency using predictive maintenance techniques. By making use of machine learning, it is possible to build a model that makes predictions based on sensor input data in the presence of uncertainty.
In this session, we will explore:
- the use case of predictive maintenance with deep learning model
- determining the condition of an engine to estimate when maintenance should be performed
- how to optimize deep learning models to make it fit into your embedded application without compromising performance and energy efficiency
Join IAR Systems for this session for practical and applicable knowledge to effectively use your embedded application. Learn more.
Perpetual Power For Sensors and IoT Edge Devices Using Solar
Presented by PowerFilm Solar
Wednesday, June 29, 2022 1:00pm - 1:45pm PDT
Imagine you are designing a fantastic IoT system. Initially you choose a battery, but you know that the cost and effort that goes into maintaining the battery will limit the device’s adoption. Join PowerFilm to learn how energy harvesting using solar enables the deployment of a large number of sensors or edge devices with flexible, easy installation and extremely low maintenance perpetual power.
Developing IoT Cellular Applications With Arduino®
Presented by Microchip
Tuesday, June 28 – 1:00pm-3:00pm PDT
The AVR-IoT Cellular Board from Microchip has full Arduino compatibility and is shipped with a rich cellular library. This training focuses on how to use said library when developing IoT applications in Arduino. Topics such as MQTT, HTTP, Low Power and AWS are covered, with a focus on hands-on training.
Johan Lofstad, Senior Application Engineer, IoT Champion
Interfacing low power / low voltage sensors to the AVR®128DB48 Microcontroller
Presented by Microchip
Tuesday, June 28 – 3:00pm-5:00pm
This hands-on session will introduce low power programming techniques and the MVIO (Multi-Voltage IO) support provided by the AVR128DB family of microcontrollers.
Attendees of this workshop will be provided an evaluation board kit that demonstrates a direct interface between an AVR128DB48 MCU split between a 3.3V and 1.8V voltage domain directly interfacing to a 1.8V based 3D magnetic field sensor. By using a door/window alarm sensor example the basic concepts of low power clock domain switching and sleep modes will be used to implement a basic low power alarm system
Bob Martin, Wizard of Make / Senior Staff Engineer
Section 1: 30 minutes
Introduction to the Eval kit and development environment
Section 2: : 1 hour
• Using the on board analog features of the AVR128DB48 Curiosity Nano to generate a 1.8V power supply
• Interfacing to an 1.8V I2C based magnetic sensor
• Detecting and processing 3D magnetic field strength vectors
Section 3 : 30 Minutes
• Using low power modes of the AVR128DB48
• Session wrap up
Enabling the Business Starts with Security: Six Steps to Secure Connected Device Automation
Presented by Finite State
Tuesday, June 28 – 2:15pm-3:00pm
Most device manufacturers and implementers are not prioritizing security as they are building products and compiling software and firmware components. However, product security teams and product asset owners are often blind to the inherent risks in their own software and firmware supply chains. In fact, 60% of organizations lose revenue due to product security concerns for connected devices and embedded systems. This presentation will explore how organizations can move toward an automated product security model providing across the software supply chain lifecycle. The discussion will also provide a six-step methodology for initiating or maturing any product security program with a definitive focus on business enablement.
Attendees will learn how to:
- Enable their business by reducing time to market
- Automate security processes and workflow including PSIRT
- Take action on SBOM creation and manage supply chain risk
- Reduce exploitability of vulnerabilities identified in software and firmware
- Comply with enterprise security policies and regulations