Presentations (Scotland)   ...informative, useful and productive.

Presentation Stream  1 :

Presentation Stream 2 :

Presentation Stream 1



9.30 - 10.10

Designing Embedded Systems for Harsh Environments

Designing products for use in marine or subsea applications requires not only attention to the mechanical design but aspects of electronic and software design also. Offshore deployment, whether above or below the surface, can present some of the biggest challenges a product designer has to face.

Seemingly unrelated factors can come into play, requiring the designer to have to anticipate a variety of unusual or abnormal scenarios in order to equip the system with all the attributes to withstand the extremes of weather, temperature and other environmental demands.

"Offshore locations such as salmon farms are challenging environments for an embedded system"

In this talk Ian Smith of Abelon Systems, a leading embedded systems consultancy, will use case studies from recent Abelon projects to highlight some of the challenges raised by these hostile environments and the solutions used to overcome them.

back to top>>




10.15 - 10.55

Getting it ‘right first time’ with TT architectures

This presentation will be concerned with the development of software for real-time embedded systems that need to be reliable.  The real-world examples used in this talk will include both a controller for a washing machine and an automotive “Electronic Control Unit” (ECU).

Throughout the talk, the presenter will have a focus on time-triggered (TT) systems.  Implementation of a TT system will typically start with a single interrupt that is linked to the periodic overflow of a timer. This interrupt may drive a task scheduler (a simple form of “operating system”). The scheduler will – in turn – release the system tasks at predetermined points in time. 

In this presentation, we will argue that TT approaches provide an excellent foundation for reliable real-time systems because – during development and after construction – it is easy to model the system and, thereby, determine whether all of the key timing requirements have been met.  There will be examples of the kind of models in mind (and demonstrate how easy it is to create them). 

During the presentation, we will also argue that the deterministic behaviour of TT systems offers significant advantages when the design is up and running because – since we know precisely what the system should be doing at a given point in time – we can very quickly determine whether it is doing something wrong.  Again, we’ll use some practical examples to illustrate how easy it is to perform precise run-time monitoring on TT systems.

Presented by Michael J. Pont, SafeTTy Systems Ltd

back to top>>





11.30 - 12.10

Enabling PIC® Microcontroller Based Designs for Touch and Input Sensing Applications

With a powerful architecture, a range of 8-bit, 16-bit, and 32-bit offerings, flexible memory technologies and comprehensive easy-to-use development tools, the PIC Microcontroller series from Microchip has enabled many generations of low power devices. This presentation will introduce Microchip's implementations for Touch and other Input Sensing applications and will cover such topics as :

- Proximity, Keys, and Sliders
- Touch Screen and Touch Pad Controllers
- 3D Gesture Controller (detect gestures of the user and to track a movement)
- Haptics (provides tactile feedback to the user by applying forces or vibrations)

Adding a modern intuitive user interface to a design improves its ease of use, functionality and aesthetics. This presentation will explain how Microchip has opened up their algorithms and techniques to engineers, so that they have the freedom to innovate with an industry leading, robust, touch implementation on a vast range of PIC microcontrollers.

Presented By Adrian Amor, Director at Intelligent Display Solutions (an Official Microchip Design Partner)

back to top>>







13.20 - 14.00


Machine to Machine Communication – IoT in The Real World

This presentation will explore the many options for machine to machine communication. It will look at options such as Wifi, Bluetooth, Zigbee, Wimax, Lte and HSPA and it will evaluate each in terms of throughput, range, coverage, power consumption, devices per network, security, topology, connection and reliability.

The presentation will also discuss hardware and software options as well as exploring options for Device to Cloud connectivity and security.

back to top>>




14.05 - 14.30


Device Development and Product Line Management - Providing a Better Outcome for Product Creators and for Their Clients

Capturing requirements and ensuring that all those involved in the development of application and product solutions understand what is required, should be straightforward. As anyone who works in device and system development knows, this is far from being true.

We will explain and demonstrate how requirements may be created, communicated, reviewed and approved. We will show how defects can be flagged and included in the process; how change impact analysis can be performed and how product test results be linked directly to the requirements they verify - thus providing end-to-end traceability.

In addition, we will look at how work-flow management raises quality standards and helps assure compliance to industry standards.

These matters will be presented by Stephen Porter.

back to top>>





15.15 - 15.55

The NSRI Explained - Facilitating Increased Research and Development Activities for the Subsea Sector

The National Subsea Research Initiative (NSRI) is a newly formed, not for profit organisation the recognised focal point for the UK Subsea Industry supply chain promoting and facilitating increased Research and Development activities for the sector.

NSRI operates specifically in the following areas:

  1. Oil & Gas
  2. Defence
  3. Wave and Tidal Renewable energy
  4. Offshore wind
  5. Subsea mining
  6. Ocean Science

NSRI’s facilitates partnerships between UK industry and academia with the aim of enabling technology development and ultimately implementation in the subsea arena.

The UK subsea industry has proven to be a huge UK success story enjoying sustained and compound growth.  According to Subsea UK (2013) the subsea sector comprises of 750 companies employing around 66000 people generating revenues of nearly £9 Billion and is set to grow yet further. Industry forecasts that potentially by 2016 the industry will generate as much as £11 Billion.

The presentation will outline the NSRI, how to engage with us and how to get into the subsea sector for developmental activities.

back to top>>



Presention Stream 2




9.30 - 10.10

The Impact of a Certified Toolset in a High Integrity Software Development Environment

Working to any of the key software standards such as DO-178C, EN50128, ISO26262 or IEC61508 drives onerous changes into the V cycle design process. This talk will demonstrate that using a qualified or certified toolset can dramatically streamline and automate many of the steps, as well as build quality and best practise into the design.

back to top>>



10.15 - 10.55

Latest in Version Control Technology and How it can Assist in Migration to Git based Development

Today’s presentation addresses the issues of how to control and maintain software projects effectively and efficiently whilst providing developers with local access to the codebase. As many development organisations are looking to migrate to a Git based solution we will identify areas of potential risk to be considered, and solutions to mitigate that risk.

It will also address the management of digital assets right through the project from initial design through to final delivery with the focus being on maximizing productivity with the lowest amount of overhead. Also, how this management data can be used to ensure that the threat of IP being misappropriated is assessed and minimized.

back to top>>




11.30 - 12.10

Improving Embedded Software Security through Coding Standards Compliance and Structural Coverage Analysis


Ensuring the security of embedded devices involves more than simply using vulnerability preventive programming.  However, paying attention to and leveraging security standards such as CWE/CVE, CERT C and even CERT Java, will certainly improve the probability of delivering a secure and effective system. 

To develop software of high assurance and quality, critical software developers can no longer rely on manual inspection and code review alone.  Software developers must utilise automation to assist in the analysis of today’s increasingly large and complex code bases.  Automation will save time, money and help ensure the security of the overall system by enabling automated code static analysis, dynamic coverage analysis, data and control coupling analysis and unit/integration testing. 

When good security programming practices are combined with automation and a secure software operating system and hardware architecture, security can be greatly enhanced, if not highly assured.

This presentation will focus on embedded software security covering:

  • Vulnerability and security flaws
  • Software development with security coding standards
  • Verification and traceability of security requirements


Speaker :

Mark Richardson has over 25 years of experience in the development of real-time embedded software in C, C++ and Java. He is currently working for LDRA, where he is a Field Application Engineer working in close collaboration with LDRA’s numerous distributors.  Previously to joining LDRA, Mark was the lead application engineer for IBM Rational Rhapsody and has over 12 years of experience using UML on embedded projects.

He has lived in England, France and the USA, working on a variety of embedded projects and is currently living in the UK.

back to top>>



13.20 - 14.00

Is it Supposed To Do that ?  - Testing and Debugging Embedded Systems

Testing embedded systems can be fraught with difficulties. The systems are usually embedded deeply within something else with fixed memory available. The target they run on behaves differently to desktop PCs. They control real hardware, and take inputs from sensors and other machines so they frequently have a real-time element.

Many useful methods, techniques and families of tools that have been developed, but seem to have been forgotten about recently. This presentation will look at and evaluate the available types of tools, techniques and methods, starting from creating the system specification needed to validate the tests, through to final verification, and offer helpful ways of automating many of them.

Presented by Chris Hills of Phaedrus Systems

back to top>>




14.05 - 14.45

XMC families of ARM Cortex-M0/4 microcontrollers for controlling Switched Mode Power Supply (SMPS)

Infineon XMC families of ARM Cortex-M0/4 microcontrollers, allow highest efficiency and reliability when controlling Switched Mode Power Supply.

This presentation will explore the XMC microcontroller's high performing peripherals, such as High Resolution PWM, that have been tailored for optimised control of power converters, and it will explain how the highest level of performance and power density can be achieved using this approach.

back to top>>
















15.15 - 15.55

Least Privilege Separation Kernel Hypervisors Explained

The concept of a Least Privilege Separation Kernel Hypervisor starts with a traditional Separation Kernel, designed to ensure that different blocks of a partitioned system are invisible to other blocks except for tightly controlled information flow. A Least Privilege Separation Kernel extends that model by subdividing the contexts of the blocks so that the information flow becomes even more tightly controlled. Finally, adding hypervisor functionality to that mix leaves you with a single platform capable of safely hosting multiple and differing subjects, irrespective of the required integrity level for each.

This presentation will introduce key design principles and will explain how they allow developers to fully leverage the in-built hardware virtualization on today’s multicore processes. It will then go on to describe how typical real-world scenarios can make best use of this technology, in applications such as:

1. Secure IoT separation between Operation Technology and Information Technlogy

2. Platform consolidation through the virtualization of disparate environments

3. Virtualization of defunct target devices to provide a cost effective path to hardware refresh

4. Safe, single processor hosting of multiple subjects with differing safety and security integrity levels

Presenter Biography:

Mark Pitchford has over 25 years’ experience in software development for engineering applications. He has worked on many significant industrial and commercial projects in development and management, both in the UK and internationally. Since 2001, he has worked with development teams looking to achieve compliant software development in safety critical environments, working with standards such as DO-178, IEC61508 and ISO 26262.

Mark earned his Bachelor of Science degree at Trent University, Nottingham, and he has been a Chartered Engineer for almost 20 years. He now works throughout Europe, the Middle East and Africa as Technical Manager with Lynx Software Technologies.

back to top>>