Embedded Solutions & Events Update

Embedded World Conference Highlights

Release date: 2/17/2017 10:00:00 AM

It is no secret in the embedded industry, that Logic Technology always has had a strong presence at the Embedded World Exhibition & Conference. Since the conception of the event 15 years ago, we’ve put significant effort in bringing our premium partners to the exhibition and contributing to the conference program. 
 
Now, at the 15th anniversary of the event, Logic is proud to announce that 5 out of the 36 sessions in the conference program are hosted by our premium partners. The Conference Committee states on their website: “At the embedded world Conference, the brightest minds of the Embedded-Systems-Community are sharing the best, most efficient and secure solutions for upcoming challenges.” Logic Technology is honored to be recognized by the Committee as an important party for the security challenges faced by embedded developers ahead.
 
Please find below the conference schedule and abstracts of our partners for the various conference sessions. If you would like to meet an expert in person on the subject, please feel free to make an appointment. Or simply come to our booth 4-544 and claim your free and unique Logic Solution!


Free 3-day Ticket

Pre-register your visit to the fair with a free 3-day entrance ticket from Logic Technology at the Voucher Shop and don’t forget to stop by our booth to collect your Free Logic Solution!

Logic voucher E-code: B344681
 

Embedded World Conference Sessions

LDRA_T_150.png




 
Protect the Weak Link in Embedded Systems with New MISRA C Security Guidelines 
 
As developers continue to add features to their products within already constrained budgets and schedules, software has become the weak link that allows malicious entities to gain access to sensitive data and take over systems. As a result, writing secure code has become essential even for non-safety-critical systems. The use of new MISRA C security guidelines helps developers write safer, more secure, and more maintainable code.

In this session attendees will learn the essentials of using MISRA C guidelines for safety and security from the company that comprises four of the 11 positions on the MISRA C committee.
  Session 10, Tuesday March 14, 16:30-17:00 by Mark Richardson, LDRA
 
LDRA_T_150.png





 
Understand Software Quality's Three-Legged Stool: Static Analysis, Dynamic Analysis, and Unit Testing  
 
The definition of quality code is evolving as demands for it increase. Reliable, safe coding practices have been widely adopted for applications such as medical, industrial, transportation, automotive, and aerospace where a software malfunction could cause injury or death. The challenge is to make sure the software as a whole is correctly coded.

In order to address today's increasingly large and complex code bases, this presentation will show how to use automated static analysis, dynamic coverage analysis, data and control coupling analysis, and unit/integration testing for dramatic improvements over manual inspection and code review in the development of high-quality embedded software.

 
Session 17, Wednesday March 15, 14:30-15:00 by Mark Richardson, LDRA
 
Verum-logo_T_150.png







 
Software Archeology in Practice: Recovering Lost Behaviour from Legacy Code 
 
An unpleasant but nevertheless unavoidable truth of software development is that conventionally developed software 'rots' in time. Rot occurs slowly and insidiously, driven by the very nature of source code itself and the human factors that impinge on developing and maintaining it. From a business perspective, reengineering software is a nightmare. This risk, and the work involved in reengineering, can be greatly diminished if the essential functionality and behaviour of the software can be recovered from the legacy codebase. Future rot can be minimised by converting the legacy code into verifiably complete and correct models.

In this presentation we will show how to reduce the cost and risk of the work, using Model Driven Software Engineering tools and Formal Verification techniques.

 
Session 17, Wednesday March 15, 16:00-16:30 by Robert Howe, Verum Software Tools
 
2015-Logo-Datalight_Red_T_150.png





 
Reliably Committing Data to the Media Through the Linux Kernel 
 
The path from an application write instruction to the media commit in the Linux kernel is anything but a straightforward process. With more coders than ever building applications for a Linux or Android environment, a knowledge of how to reliably commit the data to the media is of vital importance.

This technical paper explains in detail the Linux write-behind cache, flush and fsync calls, and other techniques to balance power failsafe reliability and performance on Linux and Android. Also explored are  how file systems behave in these situations, focusing on two reliability techniques – journaling and transaction points.

 
Session 20, Wednesday March 15, 17:00-17:30 by Thom Denholm, Datalight
 







 
Avoiding the Brick – Seamless Updates in Embedded Devices   
 
Modern embedded devices are being updated more frequently than ever before, with many receiving updates once per year. Devices with more access will have security updates even more frequently. The consequences of a failed system update range from trying again to a complete failure to boot – the brick. In this session we are exploring the risk of complete failure during an update of a device, and sharing techniques that can be used to mitigate failures. 

This session explains how a transactional file system can seamlessly handle system updates of any size or scope. A power failure will never result in a brick, and no major changes are required to the design, even in a minimal embedded environment.

 
Session 24, Thursday March 16, 15:30-16:00 by Thom Denholm, Datalight
 

                 Logic-EW2017-Banner-(1).png