Home > Tracks > all tracks >

Tips and Tricks for Designing Real-time IoT Systems

Presented by Jacob Beningo

IoT devices are becoming more complex and compute-intensive with every passing month. Keeping up with customer needs and requirements requires a design that is not just updatable and robust but also scalable and configurable. 

In this session, we will explore practical tips and tricks for designing real-time IoT systems. Major topics that we will discuss include:

  • Challenges facing IoT Developers
  • Software architecture design
  • Identifying and leveraging execution domains
  • Device security
  • Low-power design techniques

Go to Session

The Device Feedback Loop - What does it mean for IoT Operations and Development?

Presented by Dr. Johan Kraft

Presented by Percepio

Join this interactive session with Percepio founder Dr. Johan Kraft and learn why the IoT industry is embracing the idea of a Device Feedback Loop to safeguard IoT operations. Based on interviews with senior stakeholders at leading OEMs, examples of relevant metrics are provided to illustrate how monitoring them could help your business. Afterwards, you are welcome to join an open discussion in the Q&A session where you can hear additional views from other attendees and share your own experiences.

Go to Session

IoT Development in the Cloud

Presented by Chris Shore

The IoT is evolving rapidly and software development is being forced to evolve to match new demands. Increasingly, developers are under pressure to release earlier and update more often. Historically, early development has been tied to availability of hardware platforms on which to develop, test and prove new software. With the speed of change we are seeing these days, this is increasingly becoming a barrier.

At DevSummit recently, Arm announced Arm Virtual Hardware. This uses Arm Fast Models technology to enable cloud-based IoT development. Removing the requirement for hardware enables earlier start to the software development process, reduces cost and time-to-market. We’ll discuss in detail this technology and how we expect it to transform and accelerate software development and deployment.

We’ll also look to the future and imagine what the ecosystem in the cloud might look like.

Go to Session

Embedded ML: The New Secret Weapon to IoT Success

Presented by Arun Rajasekaran

Presented by Edge Impulse

Attempting to add-on AI and ML modeling to existing IoT networks delivers marginal results compared to when it's designed into the architecture. Organizations that have accomplished this in their IIoT/IoT architectures can support model processing in multiple stages of their solution while reducing networking throughput and latency, making everything more purposeful and even more secure.

Go to Session

Is C+ a safer C?

Presented by Niall Cooling

No, that's not a typo – C+ is a common programming model where effectively C is being written but compiled with a C++ compiler. Why would you do that? Surprisingly two very popular IoT programming platforms; Arduino (https://www.arduino.cc/) and Arm’s Mbed (https://os.mbed.com/) use this programming paradigm. C+ (C++ as C) brings with it several useful extensions to C that can help enhance program safety and security. This talk looks at some of the small, but significant, useful features that compiling with a C++ compiler brings, without any penalties to size or performance.

Go to Session

Containers and Managed Software on Micro-controllers

Presented by Kasper Lund

Building all functionality for your micro-controllers as monolithic firmware is error-prone and costly. Taking a page from server- and desktop systems, we propose running your code as individual apps, isolated from each other in containers, and managing them over-the-air through a remote serviceability protocol. Want to catch a glimpse of this on an ESP32?

Go to Session

How to Measure RTOS Performance

Presented by Colin Walls

In the world of smart phones and tablet PCs memory might be cheap, but in the more constrained universe of deeply embedded devices, such as those that support the IoT, it is still a precious resource. This is one of the many reasons why most 16- and 32-bit embedded designs rely on the services of a scalable real-time operating system (RTOS). An RTOS allows product designers to focus on the added value of their solution while delegating efficient resource (memory, peripheral, etc.) management. In addition to footprint advantages, an RTOS operates with a degree of determinism that is an essential requirement for a variety of embedded applications. This paper takes a look at “typical” reported performance metrics for an RTOS in the embedded industry.

Go to Session

Creating Your Own Development Environment

Presented by John Little

Modern software development tools have allowed more rapid, collaborative application development, but IoT and embedded software developers haven't always been able to best use these tools. Much of this is due to industry-defined development environments requiring clunky, non-automatic interfaces and platform-specific dependencies before you can deploy to your target. In this talk, I'll walk you through concepts and tools I use to build my environments, including versioning, virtualization, compilation, testing, continuous integration and deployment. After this talk, you'll be able to set up a snappy, replicable, and collaborative development environment to free your team from a constrained environment and build an integrated environment that best suits your needs.

Go to Session

Ensuring Data Integrity Using Blockchain With Toradex Torizon

Presented by Mohammed Billoo

The blockchain has seen explosive growth in the past few years, especially with the advent of cryptocurrency. The blockchain has also become popular in the IoT space, as a mechanism to verify the integrity of data collected by sensor nodes. In this presentation, Mohammed provides an overview of the blockchain and its different uses and applications in the IoT. He also provides a demonstration on a Toradex SoM and carrier board running Torizon which implements a simple blockchain solution. In this example, data is collected on the device and added to the blockchain. Finally, the integrity of the data on the blockchain is verified.

Go to Session

Building an Interactive IoT Dashboard With Speech Synthesis Using Node-RED

Presented by Don Wilcher

Hardware devices, Application Programming Interface (API), and online services can be wired together using a data flow-based programming tool called Node-RED. Node-RED allows developers to build IoT devices using a web browser editor quickly. A developer can create an IoT device using a variety of Node-RED widgets provided with the data flow-based programming tool. In this talk, the participant will learn the essential visual programming environment by building an IoT interactive flow dashboard with a speech synthesis demonstrator.

Go to Session

Deploying Mass FUOTA Updates with LoRaWAN

Presented by Ashley Pope

FUOTA is critical for IoT applications and deployments, providing future-proofing of connected device deployments and ensuring that devices will continue to operate over long lifetimes. LoRaWAN® has the unique capability among LPWANs to support FUOTA, securely and reliably delivering updates over the air to many devices at one time, while consuming ~1% of the battery capacity. Entire fleets of devices can be scheduled and updated simultaneously within 5 to 10 minutes. In this presentation, Ashley Pope from Oxit, will share use cases of mass FUOTA update across millions of devices globally, such as, in data centers across retail security, for irrigation systems, within the smart home, and for the utilities sectors. Come hear how FUOTA and LoRaWAN are already enabling interoperability, especially among devices and sensors in remote or difficult locations, to allow you quicker time to market and optimized cost efficiency.

Go to Session

How to Survive Designing Hardware in a Software Company

Presented by Orkhan Amiraslanov

The Generic Node project is an ambitious hardware venture that tries to build a hardware device that is built for software engineers and integrators. It's product vision tants many of the given paradigms and principles in hardware development. Not BOM optimization is the key but reducing the Total Cost of Ownership for the end to end solutions that are built with it. The design is made with the supply chain in mind. With the right security tools the device can be safely distributed across a supply chain of multiple actors yet not expose its security credentials to the third parties involved. The device is made for many different types of applications and comes with a series of cloud integrations.

Go to Session

Live Hack: Demonstrating Common IoT Security Weaknesses

Presented by Joe Hopper

How would hackers attack your IoT device? Joe Hopper, Principal Security Consultant at Fracture Labs, will demonstrate several complex hacks against off-the-shelf IoT devices to shed light on the design and implementation weaknesses seen across the industry. He will walk through common attacks such as: finding and connecting to hidden serial consoles, boot process hijacking, memory analysis, firmware extraction, password cracking, and more to gain unauthorized access to IoT devices and customer information.

By using the same approach hackers use against your devices, you will walk away with a better understanding of where and how you need to tighten security controls.

Go to Session

Open Source OTA Updates and Reporting for Edge Devices

Presented by Dustin Reynolds

Companies often release devices based on features the customer cares about while neglecting hidden features such as security, updates, error monitoring, and application logging. Operating system and application updates are straightforward to implement and provide companies a path to fix security vulnerabilities and improve device performance through the life of the device. Application reporting allows you to close the loop in understanding device performance in the field so you can target the most critical updates

Go to Session

Hardware in the Loop in Containers: Why Docker is Hardware's Best Friend

Presented by Ari Mahpour

Have you ever tried to set up a second or third test machine only to discover you forgot to document the first one? Are you one of those people who spend hours installing drivers and configuring settings on your test machine? With containerization we can set up our second or millionth computer in less than a few seconds. Containerization has become ubiquitous among software developers but barely known to the embedded community, let alone hardware engineers. In this talk we will review how to use containers to solve your automation frustration (and tackle world peace if time permits).

Go to Session

Internet of Things Operating System Development Under "Light" Smart Age

Presented by Leo Zou

IoT technology is affecting our lives at a rapid pace, and becoming such an integral part of daily life. RTOS powered "Light" Smart tech is considered to be more applicable to fit the requirements of IoT development.

In this session, we'll explore the "Light" Smart tech and how RT-Thread works to fit this trend. Major topics that we will discuss include:

  • The concept of the "Light" Smart tech and how it applies to daily life.
  • The requirements to an RTOS for AIoT devices. How OpenSource RT-Thread IoT OS works to fit this trend.
  • The architecture of the RT-Thread IoT OS Project and the project features and pros.
  • Building an open-source ecosystem for developers.

Go to Session

Building a Video Surveillance System with Torizon

Presented by Drew Moseley

Presented by Toradex

Setting up a Video Surveillance System with a commercial off-the-shelf solution is relatively easy to do, albeit potentially costly. With the availability of low-cost embedded hardware and USB webcams, there is no reason we cannot easily make our own system. Open-source software for managing such a system is readily available, distributed as containers for easy installation and configuration in a system. In this talk, we will cover the how-to of creating a surveillance system. We will use the Torizon platform and hardware from Toradex to quickly set up connected Embedded Linux devices to function as a Video Surveillance system. Commodity webcams will be used. The web-based front-end is easy to use and allows the hardware to be deployed and configured remotely. By the end of this talk, we will have a functioning system that viewers of this talk can replicate in their home or office.

Go to Session