Sensors Converge Live Trainings & Workshops

Prototyping Secure Sensor Applications Using Click Boards and the Azure Sphere Starter Kit
Presented by Avnet

Creating quick, accurate, and secure proof of concept prototypes can reduce risk in IoT applications. In this mini workshop, a complete Microsoft Azure IoT connected sensor system is explained and demonstrated by an Azure Sphere specialist. Attendees are then guided though the hands-on process of configuring Avnet’s Azure Sphere Starter Kit for a variety of sensor-to-cloud applications.  Attendees will take home an Avnet Sphere Starter Kit and two MikroE click boards to enable follow-on experimentation and learning. View details and schedule here

Enhancing an Embedded Sensor Application with a Custom Voice Command Interface
Presented by Avnet

Incorporating voice recognition / command detection is a growing trend in embedded systems. In this mini workshop, a full-featured, voice-interfaced sensor system with webserver and embedded media player is demonstrated. Attendees are then guided though the rapid implementation steps of adding their own custom voice-command interface using NXP’s online VIT Voice Model Generation tool. The final building and running of a voice-enabled application using Avnet’s NXP i.MX RT1176 based MaaXBoard RT concludes the workshop, with attendees taking home the MaaXBoard RT kit for further experimentation. View details and schedule here


Cyber Resilience for IoT - Bouncing Back from Attacks
Presented by Trusted Computing Group

Tuesday June 28, 2022 12:30pm - 1:15pm PDT

IoT devices are constantly under attack and the attacks just keep getting better. What happens if an attacker finds a chink in your armor and successfully infects a device or thousands of them? Trusted Computing Group’s newest cyber resilient technology standards show how to detect and recover from such an attack in an automated manner. Come learn about how you can use this new technology.

Optimizing Deep Learning AI/ML Models for Resource Constrained Embedded Systems
Presented by: IAR Systems

Tuesday, June 28, 2022 1:30pm - 2:15pm PDT

Machine Learning is becoming increasingly relevant in industry for decreasing costs and increasing efficiency using predictive maintenance techniques. By making use of machine learning, it is possible to build a model that makes predictions based on sensor input data in the presence of uncertainty.  

In this session, we will explore:

  • the use case of predictive maintenance with deep learning model
  • determining the condition of an engine to estimate when maintenance should be performed
  • how to optimize deep learning models to make it fit into your embedded application without compromising performance and energy efficiency

Join IAR Systems for this session for practical and applicable knowledge to effectively use your embedded application. Learn more. 


Perpetual Power For Sensors and IoT Edge Devices Using Solar
Presented by PowerFilm Solar

Wednesday, June 29, 2022 1:00pm - 1:45pm PDT

Imagine you are designing a fantastic IoT system.  Initially you choose a battery, but you know that the cost and effort that goes into maintaining the battery will limit the device’s adoption.  Join PowerFilm to learn how energy harvesting using solar enables the deployment of a large number of sensors or edge devices with flexible, easy installation and extremely low maintenance perpetual power. 


Developing IoT Cellular Applications With Arduino®
Presented by Microchip

Tuesday, June 28 – 1:00pm-3:00pm PDT

The AVR-IoT Cellular Board from Microchip has full Arduino compatibility and is shipped with a rich cellular library. This training focuses on how to use said library when developing IoT applications in Arduino. Topics such as MQTT, HTTP, Low Power and AWS are covered, with a focus on hands-on training.

Johan Lofstad, Senior Application Engineer, IoT Champion


Interfacing low power / low voltage sensors to the AVR®128DB48 Microcontroller
Presented by Microchip

Tuesday, June 28 – 3:00pm-5:00pm

This hands-on session will introduce low power programming techniques and the MVIO (Multi-Voltage IO) support provided by the AVR128DB family of microcontrollers. 

Attendees of this workshop will be provided an evaluation board kit that demonstrates a direct interface between an AVR128DB48 MCU split between a 3.3V and 1.8V voltage domain directly interfacing to a 1.8V based 3D magnetic field sensor. By using a door/window alarm sensor example the basic concepts of low power clock domain switching and sleep modes will be used to implement a basic low power alarm system

Bob Martin, Wizard of Make / Senior Staff Engineer


Section 1: 30 minutes

Introduction to the Eval kit and development environment

Section 2: : 1 hour

• Using the on board analog features of the AVR128DB48 Curiosity Nano to generate a 1.8V power supply

• Interfacing to an 1.8V I2C based magnetic sensor

• Detecting and processing 3D magnetic field strength vectors

Section 3 : 30 Minutes

• Using low power modes of the AVR128DB48

• Session wrap up


Enabling the Business Starts with Security: Six Steps to Secure Connected Device Automation
Presented by Finite State

Tuesday, June 28 – 2:15pm-3:00pm

Most device manufacturers and implementers are not prioritizing security as they are building products and compiling software and firmware components. However, product security teams and product asset owners are often blind to the inherent risks in their own software and firmware supply chains. In fact, 60% of organizations lose revenue due to product security concerns for connected devices and embedded systems. This presentation will explore how organizations can move toward an automated product security model providing across the software supply chain lifecycle. The discussion will also provide a six-step methodology for initiating or maturing any product security program with a definitive focus on business enablement.

Attendees will learn how to:

  • Enable their business by reducing time to market
  • Automate security processes and workflow including PSIRT
  • Take action on SBOM creation and manage supply chain risk
  • Reduce exploitability of vulnerabilities identified in software and firmware
  • Comply with enterprise security policies and regulations