Technical Highlights November 2014
This is our November selection of White Papers and Webinars.
It’s free, but you have to register. Please use the formsheet (on the right)
Mixed language programming for critical systems
Over the last 30 years Ada has gained the reputation of a programming language with an unrivalled pedigree in high integrity software development. It has become particularly relevant for systems with mixed-criticality constraints where it must interface with other languages.
We have put together for you a Microsite which provides
- a webinar that introduces the mixed language programming features of Ada through example use cases using C, C++ and Java
and useful information about topics like
- Ada for the C++ or Java Developer;
- Multi-Language Programming: The Challenge and Promise of Class-Level Interfacing
- Ada Gems: Mixed Language Development
- GNAT Pro for Mixed-Language development
- GPRbuild - Multi-Language Management.
COTS fail-safe platform for train control and rail signaling
Designed to address the changes happening in the market for rail infrastructure, Artesyn introduces a new COTS fail-safe platform for train control and rail signaling. The ControlSafe Platform is a cost-effective solution that enables rail infrastructure providers and system integrators to substantially accelerate time-to-market without incurring the high costs and risks of the SIL4 certification process.
The ControlSafe Platform meets all the functional safety, reliability and availability requirements mandated by rail standards and speci¬fications, including EN50126, EN50128 SIL4 and EN50129 SIL4. It is expected to provide 15 years of planned product life and 25 years of extended support and service.
The presenter is Shlomo Pri-Tal, Artesyn’s Vice-President for ControlSafe products, is considered one of the founders of the embedded computing industry as one of the originators of the VMEbus architecture.
M2M - are you planning a scalable long-term cellular strategy for 2G, 3G & 4G technologies?
2G services have served millions of devices for years, and continue to be employed in virtually every market worldwide. The evolution of 3G and 4G cellular networks, however, is changing the landscape of cellular services. While some operators will continue to maintain 2G networks, other operators have begun to cap existing 2G services. For organizations developing machine-to-machine applications, when does it make sense to migrate to 3G and 4G services?
Introduction to Energy Harvesting Technology
There is abundant energy in our environment, and the challenge is to convert that ambient energy into useable electrical energy to power an application. This lecture looks at the harvesting source (solar, thermoelectric, vibration, etc.) and the transducers used with each; the system architectures used in energy harvesters; the ideal features of an energy harvesting power management IC; and finally, some storage elements to hold the harvested energy.
Re-think surveillance performance and integration
Network video recorders (NVRs) are typically network-based computers that take video feeds from multiple cameras simultaneously and record the video in a digital format onto one or more hard drives. They offer an excellent alternative for smaller DSS installations that don’t need the storage capacity of a storage area network. This white paper looks at Milestone Systems’ line of Husky NVRs and how they use Intel Core i5/i7 processors.
Modular SIL 4-certifiable system platform for safety-critical public transportation applications
In the last years, the government in many countries have increased their safety standards to provide more safety in public transportation. Many controllers that are currently on the market don‘t fulfill the requirements and need additional and often expensive safety devices. In this Webinar MEN show you how to cover all requirements from the beginning with just a single system.
- Klaus Popp, Head of Product Management, MEN Mikro Elektronik
Protecting your R&D investment with SHA-256 authentication
- During this webinar, participants will receive an overview of the Challenge-Response Authentication protocol and demonstrations on “How to set up an authentication system in four easy steps” and “How to integrate authentication into a new or existing design”. We will walk participants through the dangers of not protecting their IP and revenue, discuss the methods that counterfeiters typically use to copy hardware and software, and finally, we will demonstrate Maxim’s proven 2-chip, hardware-based security solutions to address these issues.
- Tom Bui, Mass Market Solutions Product Manager, Maxim Integrated