Analog Devices | ADI Developer
Connect
Learn
Build

embedded world NA 2024

Banner illustration

Summary

Join ADI at embedded world North America, booth #2304, to explore our latest software solutions and learn how ADI can accelerate embedded development.
DateOctober 8 – 11, 2024
LocationAustin, TX

ADI at embedded world NA 2024 | Booth 2304


Join ADI at embedded world North America, booth #2304, to explore our latest software solutions and learn how ADI accelerates embedded development. You’ll experience new tools for developing, securing, and optimizing your system with opportunities to engage directly with our technology through hands-on demonstrations with our team of software experts.


Build Your Own Embedded Device Workshop (BYOES)


Embedded Development using VS Code, Zephyr and Open Source Tooling Date: Tuesday, Oct 8th 9:30 AM - 12:30 PM | Location: Room 9A Convention Center | Cost: $30 US | REGISTER Embedded software developers are being asked to design increasingly complex software solutions, on higher-speed buses across multiple architectures, with smaller teams and shorter times to market. The complexity challenge is increasing while the development time and resources are decreasing. This 3-hour hands-on workshop will introduce attendees to ADI’s solutions that address this complexity challenge, based on open-source tooling (GCC, GNU build tools), ecosystems (Zephyr, etc.), and config and debug tooling (VS Code, etc.). You’ll receive a MAX32690-based development platform, which is yours to keep. This Arduino form-factor kit includes a HW debugger, and a high-performance MEMs accelerometer breakout to sample data from.


Explore Solutions | Demos



ADI Software Tools

  • Configuration and Productivity Tools Explore how ADI configuration and productivity tools enable system and core configuration for embedded systems. They also include end-to-end security tools, accelerate technical discovery, and enable efficient data flow through the system.
  • Project Profiling Learn how projects can be profiled for size optimization, how the final compiled firmware image can be verified visually to ensure the right compilation flags were used when building the image, and exactly how much flash or SRAM a function or variable uses, including where it has been placed in memory.
  • Integrated Development Environment (IDE) Discover how ADI’s IDE facilitates heterogeneous application & system development, debugging, and optimization from a unified interface. Bringing this set of capabilities together is meant to accelerates developer time to market and is extensible via OpenAPI integration with 3rd party solutions and platforms for developers, partners and customers.


Security | ADI Assure™

  • Trusted Edge Security Architecture Dive deeper into security with ADI’s newly launched Trusted Edge Security Architecture that makes it possible for our customers to leverage a single security architecture across many platforms. This solution will reduce time-to-market for new product design by making it easy to leverage a single security API when switching MCUs or Security platforms. Visit us to see the ease of deploying our USS architecture on our MAX32690 platform.
  • Embedded Data Provenance Witness the critical role security plays in our modern energy infrastructure. Our energy systems demo with data provenance shows how to deploy ADI’s Data Trust Framework at critical endpoints to unlock provenance capabilities at the source of where your data is created. In EV charging infrastructure, it establishes a highly secure, immutable record of energy transactions for improving clean energy utilization, verifying critical transactions, and analyzing conditions that may affect energy distribution. Our Trust Framework can enable further extraction of value from data being generated at the Edge.
  • Intrusion Detection in Microcontrollers Learn about ADI’s cyber-resilience security architecture that includes a microcontroller-based IDS capable of rapidly detecting a broad range of attacks in real-time with high detection rates and low false positives. One of the most security-sensitive industries is medical, where we show how to further enhance cyber-resiliency at the edge with ADI’s cyber-resilience architecture. We are launching our solution on ADI’s study watch, taking advantage of IoT-optimized machine learning algorithms to classify execution of software tasks, processes, and applications as normal or anomalous in real-time.


Open Source Powered IIoT

  • Secure Edge Connectivity The shift towards extending IP connectivity to the edge is driving the requirement for integrating secure 10BASE-T1L Ethernet connectivity into resource-constrained embedded devices. Visit our industrial network demo to see multiple embedded nodes running Zephyr RTOS firmware interconnected over 10BASE-T1L, securely passing sensor data and I/O commands between devices, utilizing IIoT protocols like TCP/IP, MQTT, and TLS for security. Learn how ADI's leadership in industrial connectivity, paired with the power of the Zephyr RTOS embedded software ecosystem, allows customers to rapidly develop secure networked devices.


Accelerating Innovation with Open Source

  • Zephyr® Project Connect with and meet the Zephyr Project team in the ADI booth! Zephyr is a proven RTOS ecosystem, by developers, for developers and ADI is an active, contributing member. Zephyr recently passed more than 100,000 contributions and launched its 3.7 Long Term Support (LTS) Release. Learn how to contribute to this open-source project, participate in discussions, and access community resources. Join our vibrant community and collaborative ecosystem and learn how Zephyr is being used at ADI to solve industry challenges and drive innovation. And yes – there will be stickers and kites!


Hands-On Experience

  • Visit our hands-on workstation to further explore the tools and resources you learned about within the booth. Participate in short, hands-on exercises introducing you to key ADI development tools that help you learn how to use ADI open-source projects to accelerate your prototyping.


Meet the Speakers


Tanmaya Mishra | Senior Engineer
Machine-Learning Based Anomaly and Intrusion Detection for Cyber-Resilience in Microcontrollers
Date: Wednesday, Oct 9
Time: 2:00 - 2:30 PM
Panel: 3:30 - 3:45 PM
Location: Room 5, Level 3
Regulations, particularly in automotive and medical devices, are continuing to emphasize intrusion detection as a key requirement for addressing cybersecurity. In this presentation, we provide an overview of a proposed cybersecurity architecture and software stack, for microcontrollers. The cyber-resilience security architecture includes a microcontroller-based Intrusion Detection System (IDS) capable of rapidly detecting a broad range of attacks in real-time with high detection rates and low false positives. We present an overview of an IDS approach using IoT-optimized machine learning algorithms to classify execution of software tasks/processes/applications as normal or anomalous in real-time and the resilience architecture it runs within.


Alan Hehir | Director of User Experience (UX)
Human Factors and User Interface Design for Embedded Systems
Date: Thursday, Oct 10
Time: 10:00 - 10:30 AM
Panel: 11:30 - 11:45 AM
Location: Ballroom C, Level 1
Embedded and mobile devices are a part of life for billions of users today. These devices will help us communicate and relate in better ways and become more creative and more efficient in our working lives. From a user interface perspective, we must shift the design perspective away from technology as the end all to usability for these devices. This course will review human factors and user interface design techniques for embedded and mobile technology interfaces, including innovating, interaction design techniques, prototyping, controlling complex functions, information access, using images, and evaluation. Several case studies will be used to support the techniques presented.