...this page will be updated with presentation information during Nov/Dec

Day 1 - Presentations

Day 2 - Presentations

Presentations - Day 1

 

 

 

09.30 - 10.10

Developing real-time embedded systems in compliance with IEC 61508 and related international safety standards

This presentation will be concerned with the development of software for real-time embedded systems that need to be safe: the particular focus will be on designs that need to meet international safety standards and guidelines, such as IEC 61508. 

Throughout the talk, I’ll have a focus on time-triggered (TT) systems.  In most cases, the starting point for a successful TT design is a “bare metal” software platform: that is, the system will not usually employ a conventional “RTOS”, Linux™ or Windows®. In this software platform, a single interrupt will be used, linked to the periodic overflow of a timer. A ‘polling’ process will then allow interaction with peripherals. 

TT architectures built on this foundation have been used for many years in industries such as aerospace, because they have been found to provide the basis for safe and reliable systems.

In this presentation, the presenter will focus on the development of TT embedded systems using two off-the-shelf microcontrollers (MCUs).  I will illustrate how such a platform can help developers to create a cost-effective design solution.  It will consider some of the particular benefits of this dual-MCU solution for developers of safety-related designs, including the ease with which comprehensive run-time monitoring can be carried out (providing high levels of diagnostic coverage).

The techniques discussed will not be tied to any particular MCU platform or semiconductor manufacturer and a number of real-world examples will be used throughout the presentation.

Presented by Michael J. Pont, SafeTTy Systems Ltd

back to the top>>

 

 

 

 

 

10.15 - 10.55

Understanding Compiler Validation for the Development of Critical Systems

Is your compiler introducing bugs? Assuming that your compiler is perfect can be risky, particularly for embedded and connected systems.



Compiler validation can remove that risk. In this presentation Olwen Morgan explains what compiler validation does, what it doesn't do, and when you might need it. She will also explain why just running an off the shelf test suite is not enough, particularly since not all test suites are created equal

Olwen Morgan is an independent consultant that undertakes compiler validation for critical systems.

back to the top>>

 

 

 

11.30 - 12.10

Application Software and the Security Threat

Learn how best in class solutions, along with customised deployment can ensure your application software release is secure.

The threat landscape is constantly changing, so to meet this challenge, security vulnerabilities and reliability issues need to be detected and addressed as they occur on the developer’s desktop . Using an Agile approach, Developers are now able to identify and fix these issues incrementally before code is entered in the CI build and merged into a release.

The use of Open Source Software components is now pervasive and incorporated in most applications, and with over 3,000 new open source vulnerabilities discovered every year, open source application security is clearly no place to cut corners. When vulnerabilities are disclosed, the race is on between you and hackers looking to exploit your applications and containers.

 

back to the top>>

 

 

 

 

 

13.20 - 14.00


t.b.c

back to the top>>

 

 

 

 

 

 

 

14.05 - 14.45

t.b.c

back to top>>

 

 

 


15.15 - 15.55

t.b.c

back to top>>

 

 

 

 

 

16.00 - 16.40

t.b.c

back to top>>

 

Presentions - Day 2

 

 

 

 

9.30 - 10.10

t.b.c

back to the top>>




 

10.15 - 10.55

t.b.c

back to the top>>

 

 

 

 

11.30 - 12.10

t.b.c

back to the top>>

 

 

 

 

 

13.20 - 14.00

t.b.c

back to top>>

 

 

 

 

 

14.05 - 14.45

t.b.c

back to the top>>

 

 

 

 

 

15.15 - 15.55


t.b.c

back to top>>