Agenda

Filtered by:

Clear All
Tuesday, October 16
9:00am Democratizing FPGA 9:00AM - 9:50AM Massimo Banzi, Arduino show more Description FPGAs offer a lot of flexibility and power but can be daunting for software developers without a hardware design background. This talk outlines simple path for users to create custom behavior with an Arduino board - opening up this flexibility to a far wider audience of users. We'll show how you can easily include accelerator functions for machine vision or precision motor control with predefined design libraries. We will also show how even custom system-on-chip design can be approached by beginners, and be more productive for experienced users, by using a visual hardware design tool. Time Tuesday, Oct 16 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G DSP Software Development Masterclass with Arm and MathWorks 9:00AM - 9:50AM Ram Cherukuri, MathWorks; Salman Arif, Arm show more Description Our world is increasingly digital and intelligent, with homes becoming smarter and devices becoming more human-like. That means that high-performance, multi-sensor devices such as wearables, audio headsets, smart speakers and more, all require embedded developers to incorporate a level of digital signal processing (DSP). Furthermore, the application of machine learning techniques to signal processing presents new opportunities and challenges for embedded developers. This joint talk by Arm and MathWorks will demonstrate how embedded developers can take advantage of faster prototyping and faster time to production with signal processing instructions, software libraries, tools and resources available for Cortex-M processors. In addition, this presentation will showcase implementation examples using machine learning (ML) for pattern recognition in audio applications. Time Tuesday, Oct 16 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Heavyweight Security for a Lightweight, Low-power World 9:00AM - 9:50AM William Adams, CENTRI Technology show more Description Everything starts and ends with your data, and taking personal responsibility for its protection is now critical across the industry. Whether you're an expert developing IoT solutions, sensors, or smart devices, you already know implementing IoT security is difficult for resource-constrained embedded environments. Ensuring the data is protected at the first mile, last mile, and every mile between presents a challenge for the true edge across multiple communication protocols. In this session we will look at some of the key challenges involved in securing your IoT data from creation to consumption. Time Tuesday, Oct 16 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Optimizing System Performance and Power in New MCU Architectures 9:00AM - 9:50AM Gideon Intrater, Adesto Technologies show more Description Embedded flash has been a mainstay of Arm microcontrollers, but now MCU vendors are considering new memory architectures to meet performance/power requirements of emerging intelligent IoT edge devices. For example, the flashless NXP i.MX RT1050 and ST’s STM32L4+ can use external flash for eXecute-in-Place (XiP) operation. An external memory with XiP capability can help designers create IoT devices with advanced capabilities and long battery life. We’ll share results of our extensive benchmarking of power/performance of various memory architectures on the i.MX RT1050 and the STM32L4 to provide system designers with insight into choosing the right memory architecture for their application. Time Tuesday, Oct 16 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
10:00am The Fifth Wave of Computing 10:00AM - 10:30AM Simon Segars, Arm show more Description The next wave of computing is being driven by multiple advanced technologies converging, driving massive economic opportunity around the world. There is potential to create entirely new businesses on the crest of this wave and drive incredible innovation across all sectors of society. The Arm ecosystem is leading the way, driving new technology solutions and guiding how they are delivered securely and at scale. Time Tuesday, Oct 16 10:00AM - 10:30AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
10:30am Collaborating to Deliver a Trillion Device World 10:30AM - 11:00AM Marcelo Claure, SoftBank Group Corp. and SoftBank International show more Description Softbank's vision is built firmly on a world of a trillion devices, and Marcelo will talk about how this vision can become real, and what it will to ensure a global IoT is delivered securely, efficiently and in a way that truly empowers businesses and people. Time Tuesday, Oct 16 10:30AM - 11:00AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
11:00am Preparing the Cloud for the Fifth Wave of Computing 11:00AM - 11:30AM Drew Henry, Arm show more Description How Arm and its ecosystem are enabling a disruptive change to infrastructure, satisfying the additional needs of a trillion intelligent devices that will drive the digital revolution. Time Tuesday, Oct 16 11:00AM - 11:30AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
11:30am Arm Mbed Connect 11:30AM - 7:00PM Various Speakers - See Description show more Description This is a developer-focused event, created and instructed by developers for developers. Join us to hone your skills with the assistance of our experts with a full day track of keynotes and hands-on workshops. Time Tuesday, Oct 16 11:30AM - 7:00PM Session Type Arm Mbed Connect Session Pass Type Arm Mbed Connect Pass Location Grand Ballroom 220 B & C Improving Memory on the Edge Using Octal Serial Flash Cache 11:30AM - 12:20PM Babak Taheri, Silvaco show more Description With intelligence and data processing moving to the edge, the demand for local program memory is exploding. So how do you increase the program memory on a device without significantly increasing cost and power or by limiting performance? This presentation from Silvaco, Arm, and Adesto will explore and compare the options available to developers, and will look at whether technologies, such as Execute in Place and Flash Cache, can be used to solve this problem. The technical presentation will provide real-world comparison data and make recommendations so that developers can build products that meet the demands of tomorrow’s intelligent devices. Time Tuesday, Oct 16 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Optimizing Hardware/Software Development for Arm-based Embedded Designs 11:30AM - 12:20PM Bill Neifert, Arm; Frank Schirrmeister, Cadence Design Systems, Inc.; Jason Andrews, Arm show more Description Software is crucial to enable designs for the IoT edge node through hubs to networks and servers, and networks for mobile, server, automotive, and consumer applications. We will introduce and evaluate techniques for mixed-fidelity execution of Arm-based designs, utilizing models at different abstractions – transaction-level (TLM) and register-transfer level (RTL). These models can be used in simulation, emulation, and FPGA-based prototyping and enable embedded software development, early integration of hardware, and software, IP selection, and performance optimization. We will compare different software-enablement techniques for bring up, test and debug and efficient hardware/software analysis. Time Tuesday, Oct 16 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Practical Challenges and Proposed Solutions for Implementing Embedded AI on Arm Cortex A/M Devices 11:30AM - 12:20PM Ganesh Balamitran, Renesas Electronics show more Description With the rapid growth in AI and machine vision, the industry’s focus is quickly turning to deploying neural networks for inference on end-point devices, like Arm Cortex A microprocessors (MPUs) and even Cortex M MPUs. In this session, we will share our learnings on the challenges of using 1) various implementations of popular networks on full frameworks like TensorFlow and Caffe, as well as 2) customized/optimized code better suited for embedded MPUs. We will also explore some of the new tool approaches and new tools that are addressing these challenges. Time Tuesday, Oct 16 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Sensor to Cloud on Arm with Open Source Software 11:30AM - 12:20PM Tyler Baker, Foundries.io show more Description At Open Source Foundries, we have researched and identified the best software projects in open source for building a connected IoT platform. With these projects and Arm-based devices, we have built an entire end-to-end (device to cloud) system that is secure, minimal, and updatable. From the RTOS (Cortex-M) running on a sensor through a Linux-based IoT gateway (Cortex-M) and into the cloud, the system runs open source software on Arm with no vendor lock-in. In this session, we’ll introduce you to every component so that you can replicate and build secure, connected Arm-based products. Time Tuesday, Oct 16 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G
1:30pm Bringing the Benefits of Cortex-M Processors to FPGA 1:30PM - 2:20PM Michele Riga, Arm; Lee Hansen, Xilinx show more Description FPGAs enable custom solutions to be created quickly and with a minimal amount of engineering effort. What if you could combine the flexibility of an FPGA with the processing and software ecosystem advantages of a Cortex-M processor? This joint Xilinx and Arm technical presentation will explore how to use Cortex-M processors in Xilinx-based FPGAs, providing guidance on all of the key steps in building a successful FPGA solution: integration, verification, synthesis, and software development, leveraging the large Arm-based software development ecosystem. Time Tuesday, Oct 16 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Designing Intelligent Systems Using Resource Constrained Edge Devices 1:30PM - 2:20PM Jacob Beningo, Beningo Embedded Group show more Description Traditional embedded software engineers often think that machine learning and intelligent systems are outside the realm of microcontroller-based systems and, therefore, outside their realm of expertise. Advances in microcontroller technology have made designing intelligent systems using these resource-constrained devices a reality. In this session, we will examine the tools and capabilities that are available to microcontroller designers to start using machine learning and adding a new level of intelligence to their devices. Developers will walk away understanding that machine learning and AI are not just for big data and the cloud. Time Tuesday, Oct 16 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Optimizing threat modeling to create robust IoT security solutions  1:30PM - 2:20PM Suresh Marisetty, Arm show more Description The expected growth of IoT devices will be fuelled by a myriad of use cases, including surveillance cameras, smart meters and asset trackers. These use cases each have power, performance and area (PPA) constraints and more importantly, the need for robust security. Threat Modeling and Security Analysis is a systematic approach, which helps to architect security requirements, optimized for a specific use case. These requirements needs to be mapped to a design that operates within the desired PPA constraints.  This presentation will walk you through threat modeling and how Arm’s Platform Security Architecture can help make robust IoT security solutions. Time Tuesday, Oct 16 1:30PM - 2:20PM Session Type Sponsored Session Location Executive Ballroom 210E SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center 1:30PM - 2:20PM Jeff Defilippi, Arm show more Description Distributed cloud and network infrastructures, the fundamental building block in our hyper-connected world, rely upon heterogeneous computing to efficiently analyze and service vast amounts of real-time data at its source with standard virtualization and container software stacks. This talk will discuss the evolution of smart acceleration solutions, emerging system requirements, and detail how Arm processors, system IP, custom accelerators, and architectures, such as AMBA, PCIe, and CCIX, can be combined to customize accelerated compute solutions for hyperscale performance at the power constrained edge. Time Tuesday, Oct 16 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
2:30pm Automated Identification of Embedded Physical Memories Using Shared Test Bus Access in IP Cores 2:30PM - 3:20PM Rob Knoth, Cadence Design Systems, Inc.; Teresa McLaurin, Arm show more Description Automotive, safety critical, and complex SoCs, with growing memory content, demand the use of memory built-in self test (MBIST). The manual process of binding the physical memory modules to the MBIST interfaces can be very complex and error prone. Arm and Cadence present an automated methodology that reduces the chance of field failure and ensures proper testing of the memories. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Hack-proofing Your C/C++ Code 2:30PM - 3:20PM Greg Davis, Green Hills Software show more Description While 85% of embedded designs use C and C++, these languages are notorious for allowing unsafe code practices that give hackers a way to attack. This talk shows exactly how to keep your Internet-connected product safe by writing your code properly the first time. Well-proven tools and techniques can be used to augment any software-design paradigm, and to effectively hack-proof your code. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E IoT and Silicon Security: Dissecting a Real-life IoT Attack 2:30PM - 3:20PM Chowdary Yanamadala, Arm show more Description Billions of IoT devices are expected to densely populate our cities, homes, offices, and factories. Many of use cases will involve value data and physical proximity – ripe for silicon attacks. IoT attack mitigation has been broadly focused around software counter measures; however, the barrier for physical attacks is increasingly being lowered and silicon security urgently needs protecting. If IoT designers fail to protect all relevant attack vectors, significant data is at risk. In this talk, we will analyze a real-life attack, reviewing the flaws, providing a systematic approach to security and demonstrating how you can now mitigate against silicon vulnerabilities. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Post-K: The Next Generation Arm-based Japanese Flagship Supercomputer 2:30PM - 3:20PM Satoshi Matsuoka, Riken CCS show more Description Post-K is the next generation Japanese flagship supercomputer, to be built around 2020, being jointly developed by Riken and Fujitsu. The processor is a many-core Arm v8 processor that Fujitsu developed on its own, facilitating 512-bit SVE (Scalable Vector Extension) instructions with support for both HPC and AI, ultra-fast on package memory, very low-power, and embedded high-performance Tofu network that will scale to 100,000 nodes. The projected performance of the processor for HPC workloads supersedes the high-end Xeons by several factors, as well as exhibiting GPU-like performance on AI workloads. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G
3:30pm Mocana & Arm: Accelerated & Secure Solution Development 3:30PM - 4:20PM Srinivas Kumar, Mocana show more Description Arm TrustZone Platform Security Architecture (PSA) and Mocana TrustCenter and TrustPoint offer a hardened and integration-ready system for compliance with ISO 26262, IEC 62443, NIST 800- 63-3, and IIC Endpoint Security Best Practices. Together, the firmware TPM (fTPM), hardware-based acceleration, firmware isolation levels, and the Trust Abstraction Platform provide APIs for accelerated solution development on Arm-based devices. This joint Mocana/Arm case study will discuss the above framework and how it overcomes the shortcomings of fTPM implementations from the past. Time Tuesday, Oct 16 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F There Is No One-Size-Fits-All in Machine Learning at the Edge 3:30PM - 4:20PM Jim McGregor, TIRIAS Research show more Description Many silicon and system architectures are emerging for edge computing. These solutions vary from using standard logic solutions to dedicated neural processing units (NPUs) and in-memory processing units. While all will work as inference engines, there are tradeoffs between performance, power consumption, manufacturing complexity, cost, and form factor size. The choice is also dependent upon the machine learning task(s) to be performed. As a result, the software model has a significant impact on the choice of machine learning solution. This presentation will discuss the different approaches and the most appropriate use by application and system requirements. Time Tuesday, Oct 16 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Unblocking Common Bottlenecks in Automotive SoC Verification 3:30PM - 4:20PM Marija Ugarak, HDL Design House; Peter Lewin, Arm show more Description This talk will demonstrate the verification strategy for some of the most typical automotive components, derived from an actual SoC based on a Cortex-M0 platform. We’ll identify the most common bottlenecks of such a verification process and provide extensive information on how to avoid them. Attendees will learn how to reduce the amount of engineering hours invested in planning, implementation, and verification. Time Tuesday, Oct 16 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Using the Arm Cortex-M Memory Protection Unit (MPU) with an RTOS 3:30PM - 4:20PM Jean J Labrosse, Silicon Labs show more Description A Memory Protection Unit is hardware that limits the access to memory and peripheral devices to only the code that needs to access those resources. An MPU allows an application developer to create more robust, safe and secure applications. The application can be organized by processes, each having access to its own memory and peripheral space. I will show how an MPU, as found in the Cortex-M (v7M and v8M), can interact with an RTOS and what recourses an RTOS has when a memory or I/O access violation is detected. Time Tuesday, Oct 16 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
4:30pm A Developer's Guide to Security on Cortex-M-based MCUs 4:30PM - 5:20PM Kobus Marneweck, Arm show more Description Modern embedded processors have a range of different security features, for example, the Arm Cortex-M processor series supports memory protection, TrustZone, and physical protection. Choosing the right security technology can be critical for many applications and this presentation will provide an in-depth explanation of each of these technologies, and the factors that need to be considered when choosing the right security approach. This talk will also cover the other key differences in Cortex-M processors and what software changes developers need to be aware of when migrating projects to the latest Armv8-M processors. Time Tuesday, Oct 16 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E How Do I Select IP to Use for My Machine Learning System?  4:30PM - 5:20PM Helena Zheng, Arm show more Description Machine learning (ML) processing requirements vary significantly according to the network and workload; there is no “one-size-fits-all” solution. Examining use cases, workloads, and performance data from real networks, this talk will give examples to help you choose the right Project Trillium IP from Arm for your application. Examples will include MCUs for cost- and power-constrained embedded IoT systems through CPUs for moderate performance with general-purpose programmability. Other examples include GPUs for faster performance with graphics-intensive applications to NPUs, such as with the Arm ML processor, for intensive ML processing, giving the highest available performance and efficiency.    Time Tuesday, Oct 16 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Platform Security Architecture: One Year On 4:30PM - 5:20PM Robert Coombs, Arm show more Description Last year, at Arm TechCon, we introduced the Arm Platform Security Architecture (PSA), which is designed to provide a framework to reduce the complexity of building secure IoT devices. In 2018, so far, we have published editable IoT threat models, started an open source software project and published the first architecture documents. This presentation will first cover the basics of PSA, what we’ve achieved in the first 12 months, and then new work on APIs and compliance. Time Tuesday, Oct 16 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Power Management in Arm-based Embedded Systems 4:30PM - 5:20PM Colin Walls, Mentor, a Siemens Business show more Description Power management in today’s embedded designs has been steadily growing as an increasing number of battery powered devices are developed. Often power optimizations are left to the very end of the project cycle. We will discuss design considerations that should be made when starting a new power-sensitive, embedded design. This will include choosing the hardware with desired capabilities; defining a hardware architecture that will allow software to dynamically control power consumption; defining appropriate power usage profiles; making the appropriate choice of an operating system and drivers; choosing measurable power goals to the software development team to track throughout the development process. Time Tuesday, Oct 16 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
Wednesday, October 17
9:00am CCIX: Seamless Data Movement for Accelerated Applications 9:00AM - 9:50AM Jon Masters, Red Hat; Millind Mittal, Xilinx; Jeff Defilippi, Arm show more Description During Arm TechCon 2017, members of the CCIX consortium provided an introduction to the chip-to-chip interconnect architecture, which was created to solve the performance and efficiency challenges of emerging acceleration applications, such as machine learning, network processing, storage/memory expansion, and analytics that combine processing and acceleration. At this year’s talk, CCIX members will not only focus the advancements to the hardware and software architecture. This talk will also detail the use cases that benefit from the cache coherent, shared virtual memory paradigm and seamless data movement between processors and accelerators, including FPGAs, GPUs, network/storage adapters, intelligent networks, and custom ASICs. Time Wednesday, Oct 17 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Optimizing IoT End Nodes for Machine-Learning 9:00AM - 9:50AM Shawn Prestridge, IAR Systems AB show more Description This session will explore the challenges of coding and debugging complex machine-learning (ML) and artificial intelligence (AI) systems. We will cover how to boost code performance and how to use the advanced debugging and trace capabilities in conjunction with the Neural Network Kernels for Arm Cortex-M software library (CMSIS-NN). We will also look at why code quality is such a major issue with machine learning and how you can future-proof your source code. This session is a must-attend for embedded developers that want to improve their development processes for ML and AI in automotive, industrial, medical, and other applications. Time Wednesday, Oct 17 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Securing the IoT with Arm TrustZone for the Cortex-M 9:00AM - 9:50AM Jacob Beningo, Beningo Embedded Group show more Description Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm TrustZone for Cortex-M processors. We will examine important concepts, such as secure and non-secure domains, setting up a TrustZone RTOS, and debugging a secure application. This session will provide a hands-on demonstration, using Nuvoton’s M2351. Time Wednesday, Oct 17 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H SW-based, Run-time Diagnostic Tests to Minimize System-level Effort 9:00AM - 9:50AM Kauser Johar, Arm; Mukesh Lahori, Arm show more Description In the automotive world, functional safety is an essential requirement and one of the key issues that is increasingly gaining attention. With ever-growing complexity and size of the SoC and MCUs, the risk from systematic and random hardware failures has increased. To achieve an acceptable level of safety in the vehicle, various safety mechanisms are implemented at different levels, starting from cores and other IPs. This presentation is about detection of random permanent faults in a typical Arm CPU to enable achievement of ASIL B DC metrics at SoC and MCU levels. Time Wednesday, Oct 17 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
10:00am Opening Remarks 10:00AM - 10:05AM Rene Haas, Arm show more Description Arm’s President of IPG welcomes TechCon attendees to the second day of keynote sessions. Time Wednesday, Oct 17 10:00AM - 10:05AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
10:05am >>> def make.iot(easy) 10:05AM - 10:30AM Dipesh Patel, Arm show more Description Companies able to act on data insights lead the pack in better management of their businesses and their ability to offer exciting new services to their customers. Enabling organizations to capitalize on these opportunities requires an ecosystem that operates in the fastest and most efficient way to reduce friction in the system and make IoT innovation easy. Dipesh Patel will explain what Arm is doing to make that possible. Time Wednesday, Oct 17 10:05AM - 10:30AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
10:30am Building Dynamic Robots 10:30AM - 11:05AM Marc Raibert, Boston Dynamics show more Description Dynamics opens a world of opportunity for robotics.  Robots that move dynamically can go where other robots can't go, handle larger payloads with smaller footprint and smaller robot mass, and move faster to get work done more quickly.  This talk will give a status report on Boston Dynamics' work in this area, both its long-term effort to develop robots of the future and shorter-term efforts to build products that capitalize on existing robot capability. Time Wednesday, Oct 17 10:30AM - 11:05AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
11:05am The Future of AI: Making AI Accessible and Personal 11:05AM - 11:30AM Jem Davies, Arm show more Description References to AI and Machine Learning revolutionizing the world can be found everywhere but, for many, AI may seem like a distant concept isolated to nameless cloud farms, beyond our day-to-day lives or our ability to influence it. However, we are already interacting with AI today – and forming our opinions of it - in a myriad of ways. As the technology continues to mature it is exploding into use in the devices around us and it’s this which will truly realize the potential of AI and transform our worlds. Learn how the device revolution around AI is going to change everything and what Arm is doing to enable this, in a way that keeps the individual at the center. Time Wednesday, Oct 17 11:05AM - 11:30AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
11:30am Accelerate complex SoC designs with unprecedented Industry Collaboration 11:30AM - 12:20PM Kuang-Kuo Lin, Samsung Foundry; Jamie Schaeffer, GlobalFoundries; Umang Doshi, Arm; Lakshmi Jain, Arm show more Description Samsung Foundry Turnkey Solutions For the Growing Semiconductor Markets -Samsung Foundry has accelerated its technology portfolio offering since becoming an independent business unit in 2017 . An expanded manufacturing roadmap with a plethora choices of mature (180nm-28nm) to advanced (14nm/11/10/8/7/5/4/3nm) process nodes will be presented. To ensure and expedite customer successes, Ecosystem and Packaging solutions have been established to support various marketing segments. Collaboration with key Ecosystem partner Arm will be highlighted. Optimizing the Leading Edge: FinFET, FDXTM, and RF, a winning combination -GLOBALFOUNDRIES will showcase their differentiated roadmap, including FDXTM (FD-SOI), FinFET, RF, and A/MS and how it is uniquely positioned to provide the broadest portfolio of leading-edge technologies to meet the requirements of next generation IoT, Auto, Mobile, High-performance Compute, 5G/Networking, AI/ML, and VR/AR applications. GLOBALFOUNDRIES and Arm will highlight the results of the collaborative efforts in a few markets and silicon success with Cortex-A53 and M4 utilizing back-gate biasing capability in the 22FDX® technology. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Achieving Mutual Authentication with Arm Mbed TLS and a Resourced Constrained BLE Microcontroller 11:30AM - 12:20PM Donnie Garcia, NXP Semiconductor show more Description To mutually authenticate two devices is a complex undertaking. The developer must understand the cryptography involved and how to establish a public key infrastructure. Thankfully, Arm Mbed TLS has all of the functionality to create and process a chain of certificates that establishes a trusted relationship between a transmitter and a receiver. This session will detail the process of creating a custom certificate, the base messages needed and the mbed TLS APIs used in devices, who authenticate based on a public key infrastructure. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Cloud-based Supervised Learning to Train a Recurrent Neural Network (RNN) on a Cortex-M4F 11:30AM - 12:20PM Laura Kassovic, MbientLab Inc. show more Description Cloud-based, supervised learning to train a highly accurate, recurrent Neural Network (RNN) with raw IMU sensor data, and optimizing the pattern-matching algorithm to run directly on an Arm Cortex-M4F SoC with less than 512kB FLASH and 64kB RAM. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Designing a Connected Sensor Device - Sponsored By Mentor, a Siemens Business 11:30AM - 12:20PM Jeff Miller, Mentor, a Siemens Business show more Description The design of connected sensor devices, whether for automotive, industrial automation, or the IoT, incorporate a wide range of design disciplines including MEMS, analog IC, digital IC, and embedded software. This presentation will take you through the design of a connected sensor device, including the simulation and design of the MEMS ultrasonic transducer, an analog driver circuit, and its integration into the overall mixed signal system using an Arm Cortex-M microprocessor and embedded software. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Future-proofing Your Code - Sponsored By IAR Systems AB 11:30AM - 12:20PM Shawn Prestridge, IAR Systems AB show more Description How do you make your code stand the test of time? Wouldn’t it be nice to be able to actually reuse your code instead of just talk about it? This session will give you a roadmap of how to future-proof your code and design by focusing on the 4 Ss: Size, Speed, Safety, and Support. What are the best possible optimizations for your code regarding both size and speed? Actually, you might not need to rewrite the algorithm to get more performance with these optimizations. In addition, this session will discuss issues that can impact the safety of your code and how to quickly identify vulnerabilities and latent defects in your application. Finally, it will explore specific techniques to help you develop robust applications ready for future takeoff. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C HiSilicon Technologies Shares Best Practices to Accelerate Tapeout of their 7-nm, Arm Cortex-A76 based High-Performance Mobile AI Computing Chipset - Sponsored By Synopsys, Inc. 11:30AM - 12:20PM Yangle Wu, HiSilicon Technologies; Ron Duncan, Synopsys, Inc. show more Description HiSilicon will describe select methodologies and best practices they used to design their mobile AI computing chipset that is deployed in Huawei's flagship smartphones. In this session, you will learn how HiSilicon overcame the challenges in designing a large, complex, highly integrated SoC on TSMC’s 7-nm node with Arm’s latest CPU, Cortex A-76. Their approach leverages Synopsys Fusion Technology for a highly convergent RTL-to-Signoff flow, including physical signoff, that enabled HiSilicon to achieve best PPA and reduce time to tapeout using a massively parallel physical signoff architecture. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Integrating an embedded FPGA IP into your Arm-based SoC - Sponsored By Achronix Semiconductor Corporation 11:30AM - 12:20PM Kent Orthner, Achronix Semiconductor Corporation show more Description Embedded FPGA IP brings the power and flexibility of programmable logic to your ASICs and SoCs. This talk will show how you can integrate an eFPGA into your ASIC or SoC to accelerate high-performance applications such as machine learning, cryptocurrency, 5G wireless, networking, and automotive. You will learn: - How to architect an Arm-based SoC for high-performance acceleration - How to benchmark and customize an eFPGA for your specific application - How to use performance modeling tools to analyze eFPGA in-system performance - How to use eFPGA design tools to implement an accelerator inside your ASIC - How to verify your ASIC and eFPGA designs - How to use the eFPGA to assist bring-up, ATE testing, and BIST. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A Minimize Development Time of Systems Using Non-Volatile Memory 11:30AM - 12:20PM Mike Eftimakis, Arm show more Description It is well recognized that industry demand for global-embedded, non-volatile memory (eNVM) is set to be boosted by IoT applications. However, eNVM integration is a painful process for SoC designers, as they need to modify memory controllers and interface for different foundry and process technologies. To solve this problem, Arm has developed AMBA Generic Flash Bus interface standard (GFB) in collaboration with its partners. In order to focus on design innovation and not on hacking another memory controller, join this talk to learn how GFB can enable you to save development time, innovate more, and improve reusability. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Performance of Quantum-safe Cryptography in Arm Devices 11:30AM - 12:20PM Reza Azarderakhsh, FAU and PQSecure Technologies show more Description Advances in the realization of quantum computers are a real threat to our security and privacy. There is ongoing research on making our computers and connected devices secure against quantum computers called post-quantum cryptography. In this talk, we will explain available solutions and present our research findings on the highly-optimized software libraries for post-quantum cryptography, based on Supersingular Isogeny Key Encapsulation (SIKE) protocol on Armv8 processors. SIKE is one of the candidates submitted for standardization and, due to its smallest key requirements, is more suitable for embedded devices. We demonstrate the performance results in an Arm-based smartphone. Time Wednesday, Oct 17 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G
12:00pm Introduction to Arm - Sponsored By Arm 12:00PM - 12:30PM Chris Shore, Arm show more Description If you are new to Arm or a first-time TechCon visitor, here is the place to start. Chris will give an informative overview of who Arm is and what they do, what products are available, and what applications they are suitable for, as well as how to find devices, services and tools. With lots of pointers to what to look out for in the conference and on the show floor, this is the ideal session to help you get the best out of your time at TechCon. Time Wednesday, Oct 17 12:00PM - 12:30PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
12:30pm A Sign-off Driven Physical Design Flow for Arm Processors with RedHawk Analysis Fusion in IC Compiler II - Sponsored By Synopsys, Inc. 12:30PM - 1:20PM Kenneth Chang, Synopsys, Inc.; Annapoorna Krishnaswamy, ANSYS show more Description (Box Lunch Provided) Learn how to maximize design QoR and reduce schedules for Arm processor implementation with early accurate power analysis and optimization for power integrity and reliability within IC Compiler™ II, powered by RedHawk™ Analysis Fusion. We will explore how physical designers can leverage this seamless integration and its ease of use to enable up to 5x turnaround time improvement vs. point tool power integrity fixing flows, including leveraging self-heat analysis for thermal-aware EM checks and RedHawk-SC-big data-enabled SoC power integrity and reliability sign-off solution for advanced nodes. Synopsys Fusion Technology™ delivers this tight integration by transparently transferring data between the place-and-route environment and power integrity analysis. Time Wednesday, Oct 17 12:30PM - 1:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D
12:45pm Practical Development of Safe, Secure, Reliable Embedded Software - Sponsored By AdaCore 12:45PM - 1:15PM Patrick Rogers, AdaCore show more Description Everybody knows software is buggy, and everybody knows it is too expensive. Everybody knows that software is increasingly in a position to adversely affect lives and property, from voting machines to medical implants to the cars we drive (and drive us). But buggy code is not inevitable. Reliable high-integrity code need not be prohibitively expensive. We need to revise our expectations before somebody gets hurt. There are many reasons for the current state of affairs, including management issues, but inadequate technology is a root cause. This session will present SPARK 2014, a programming language and tool suite based on static analysis that makes production of reliable embedded software practical. Using this technology, you can formally prove the properties of your code, using your existing team, and without breaking the bank. We will present existing, real-world examples of the use of the technology, including applications currently running on Arm platforms. At the end of the presentation attendees will have an idea of just how much better things could be and how to get more information. Time Wednesday, Oct 17 12:45PM - 1:15PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
1:30pm Arm is fundamental to next generation network infrastructure and distributed cloud systems - Sponsored By Arm 1:30PM - 2:20PM Brian Jeff, Arm show more Description Hyperscale data center and telco operators are evolving their platforms to enable a world of 1T connected devices, secure networks, and fast growing distributed cloud computing. A 100x increase in connected devices, driven by new IoT deployments, will require a network that can address the backhaul challenges of this increase in connected devices, while simultaneously enabling lower latency responses from networks to enable new applications such as robotics, medical, automotive V2x, and smart cities with 5G wireless technology. Those challenges require deployment of compute capability at the network edge, with low power and smart offload of networking, storage, virtualization, and ML processing – all with an abstracted software model that enables orchestration of functions to the right location in the network. In this talk, Arm will outline a technology roadmap that is specifically built for distributed cloud and 5G networks that deliver this edge computing capability. The future is cloud native, containerized, and offloaded from main data center compute, even as the main compute needs in mega data centers continue to scale. Arm is building a software ecosystem, a collection of IP, and a partnership that enables edge to cloud designs for this new infrastructure using a variety of processors, acceleration blocks, interfaces, and optimized systems. The new infrastructure will be designed with an “edge -in” heterogenous approach. The transformation in network infrastructure and cloud computing has already begun, and Arm technology is fundamental to continuing transformation of computing. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Best Practices and Synopsys QuickStart Implementation Kits (QIKs) for the Latest Armv8-A Processors - Sponsored By Synopsys, Inc. 1:30PM - 2:20PM Mike Montana, Synopsys, Inc. show more Description If you are designing or planning to design a chip with Arm processors, then attending this session is a must. Using the recently announced Arm Cortex A-76 and other current and next generation Arm cores, you will learn from experts' best practices and technologies, including machine learning techniques, to efficiently implement Arm's next-generation processors at 7nm and meet challenging performance targets while minimizing dynamic and leakage power. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Chirp + Arm: Enabling Zero-Friction Provisioning and Connectivity with Data-Over-Sound 1:30PM - 2:20PM Daniel Jones, Chirp show more Description The proliferation of IoT devices brings an increasing need for seamless, zero-config connectivity and provisioning. The up-and-coming solution to this problem harnesses audio as a machine-to-machine networking medium. This session introduces data-over-sound as an attractive alternative to RF-based communications for a multitude of IoT use cases, from Wi-Fi device provisioning to payment transactions. We demonstrate how Chirp's Arm-optimized data-over-sound SDKs provide audio networking capabilities to pre-existing audio I/O hardware, without the need for RF chips. We will showcase real-world use cases and discuss the affordances and challenges that arise from using sound as a medium for transmission of data. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Debugging Complex Applications in The Most Efficient Way - Sponsored By IAR Systems AB 1:30PM - 2:20PM Aaron Bauch, IAR Systems AB show more Description Have you ever tried to debug an issue that only pops up randomly? Do you wish there was more to debugging than just printf statements? There is help for you! This session will focus on practical, real-world debugging to show you how to track down elusive bugs as well as get more debug data from your device. It will go through how to interpret that data so that you really know what is going on inside of your application instead of just guessing fixes. In addition, the session covers how to diagnose exceptions (like hard faults), debug multiple code images simultaneously, and how to get the most out of your debugging environment to enable you to deploy your application as quickly as possible. Full code trace, timeline visualization, function profiling, code coverage, conditional breakpoints – there is a lot of functionality and useful shortcuts that can boost your efficiency while gaining complete control of every line of code and every single instruction executed in your complex application. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Designing for Safety and Security in Connected Cars - Sponsored By Wind River 1:30PM - 2:00PM Marques McCammon, Wind River show more Description With the rapid growth of autonomous technologies and the resulting rise in software complexity, the auto industry has entered the age of the software-defined vehicle. In order to truly bring the vision of the autonomous car to the masses, safety and security must always be paramount concerns. Highly connected vehicle systems that will allow for intelligent communication between the car and the world around it also open the door to new cyber threats. Given this, without strong security there is no safety. Car companies must address safety and security at every step of design and development. What’s more, appropriate measures must be taken to keep vehicles up-to-date and protected against security threats throughout the lifetime of the car. Additionally, there are strong parallels between automotive and other mission-critical systems. The automotive industry can learn from other industries, such as aerospace and defense, with similarly stringent safety demands. In this session, Wind River® will share insights about: - The rapidly changing software landscape, especially with the rise of the Internet of Things, and how it is adding complexity to automotive systems - How vehicles can and will need to securely communicate with their surroundings - The evolving cybersecurity threat landscape for connected and autonomous vehicles - Similarities between automotive and other mission-critical industries with demanding safety and security restrictions - The link between functional safety and security, and the need to fuse safety and security requirements together - Key use cases around security, including remote diagnostics and maintenance - Innovative architectures and technologies to address increasing compute complexity in automotive systems - How to ensure that a vehicle remains secure and up-to-date over the course of its entire lifetime, which can span more than 10 years Time Wednesday, Oct 17 1:30PM - 2:00PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater High-Performance CPU Implementation at TSMC N7 Node Using Cadence Innovus Implementation System - Sponsored By Cadence Design Systems, Inc. 1:30PM - 2:20PM Zhun Cai, Cadence Design Systems, Inc.; Hanhua Deng, Huawei / Hisilicon show more Description Learn how HiSilicon achieves optimal 7nm performance for its CPU designs. In advanced FinFET nodes, physical implementation becomes more complex than before to push higher performance, especially in CPU design. In this paper, we will introduce some useful methods to address the challenges of 7nm CPU designs using the Innovus Implementation System for improved push power, performance, and area (PPA). We will discuss some techniques for not only handling 7nm process requirements, but also helping to push CPU design performance. For example, in the placement stage, early clock flow (ECF) is one key technique we used in the CPU design to achieve higher performance. With ECF, we improve the frequency by 10%. We will also review clock tree optimization methods (CCOpt™ technology) and the SI prevention methodology for advanced node, especially for 7nm. Finally, we will introduce the Tempus™ signoff ECO technology, showing how it is effective to help us quickly complete final timing closure and improve timing correlation between implementation and signoff tools. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Machine Learning on Arm Cortex-M Microcontrollers 1:30PM - 3:10PM Alessandro Grande, Arm; Mark Woods, Arm show more Description Deep learning algorithms are gaining popularity in IoT-edge devices due to their human-level accuracy in many tasks, including image classification and speech recognition. This creates increasing interest in deploying neural networks (NNs) on low-power processors found in always-on systems, such as those based on Arm Cortex-M microcontrollers. CMSIS-NN is a library of optimized software kernels for running NNs on Cortex-M cores. In this hands-on workshop, we will show developers how to run image classification on Cortex-M microcontrollers using CMSIS-NN. Bring your own laptop to participate in our hands-on workshop!        First 50 attendees will receive an OpenMV Cam M7 microcontroller board and free 90-day Keil MDK Professional development suite. Audience Level: Intermediate Time Wednesday, Oct 17 1:30PM - 3:10PM Session Type Conference Workshop Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220C Measuring the Performance and Energy Cost of Cryptography in IoT Devices 1:30PM - 2:20PM Hannes Tschofenig, Arm; Peter Torelli, EEMBC show more Description Communication security technologies, like Transport Layer Security (TLS), are readily available for developers to use to protect their IoT systems. Still, developers are reluctant to use state-of-the-art security technologies due to the impact on performance, code size and RAM, and energy. What is the impact of encryption algorithms, hash functions, and public key cryptosystems, on a specific microcontroller? In this talk I will introduce a new security benchmark developed by EEMBC that will allow silicon manufacturers and developers to analyze and select the appropriate microcontroller. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Optimized Edge Cloud Use Case with Arm-based uCPE 1:30PM - 2:20PM Kshitij Sudan, Arm; Alex Trigoub, Telco Systems show more Description Universal CPE (uCPE) is one of the first commercial edge computing use cases. A key challenge is effective deployment of multiple VNFs on a cost and power-efficient device. We will discuss utilizing Arm TrustZone to enhance device and network security with HW-based isolation of OS trusted firmware and VNFs. The talk will discuss the software and SoC aspects and advantages of creating an Arm-based uCPE solution. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Securing the Connected Car 1:30PM - 2:20PM Eystein Stenberg, Mender.io show more Description Using recent real-world examples, Eystein Stenberg, CTO at Mender.io, will discuss the opportunity of connected cars and walk the audience through the following: • Key opportunities OEMs have for connected vehicles, as demonstrated by Tesla’s ability to provide over-the-air (OTA) software updates • The anatomy of the Jeep Cherokee hack: the technical details of how the Jeep Cherokee was hacked and steps you can take to reduce your attack surface • Best practices on delivering over-the-air software updates with failover management Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Take Arm® Cortex®-M33 DSP Performance to New Levels by Leveraging an Armv8-M Co-Processor Interface - Sponsored By NXP Semiconductors 1:30PM - 2:20PM Adam Fuks, NXP Semiconductors show more Description Armv8-M extends Cortex-M architecture to support coprocessor extensions. This extension enables powerful specialization possibilities, which bring even wider applicability for Cortex-M cores. The combination of Arm’s ecosystem, coupled with the possibility of application-optimized hardware raises the bar on what is possible. This session presents the new DSP Coprocessor offered by NXP’s upcoming Cortex-M33-based MCU platforms. We will explore the newly introduced coprocessor interface available in Armv8-M cores. It will also show how the combination of this interface with the Arm Ecosystem can allow extending the Arm Cortex-M core to be a more capable processing unit for DSP tasks. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A
2:15pm AI in the Enterprise: A Look at Real-World Usage - Sponsored By Arm 2:15PM - 2:45PM Bob O'Donnell, TECHnalysis Research show more Description In this session, TECHnalysis Research President Bob O’Donnell will share the highlights of his new study on the usage of AI applications in US businesses. The presentation will include data on the top AI applications, the types of chip architectures used for inferencing and training, the most commonly used frameworks, cloud platforms and cognitive services and much more. In addition, there’s information on the biggest opportunities and challenges that companies see with AI and what their plans are for the future. Time Wednesday, Oct 17 2:15PM - 2:45PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
2:30pm Achieving High-Performance Verification on Arm-Based Servers with HPE, Marvell, Arm, and Cadence - Sponsored By Cadence Design Systems, Inc. 2:30PM - 3:20PM David Lacey, Hewlett Packard Enterprise; Tim Thornton, Arm show more Description HPE and Cadence are partnering to deliver high-performance verification on the HPE Apollo 70 System running the Marvell ThunderX2 processor based on the Armv8-A architecture. Together with Arm and Marvell, the presenters will show higher-simulation performance in two ways. For high-throughput IP-level (UVM) tests running on individual cores, the data will show more tests per server, enabling faster regression. For long-running tests running on multiple cores, the data will show better scalability to speed up these tests. The presenters also will discuss additional technologies within the Cadence Verification Suite and data center optimization so that attendees understand how to apply the advantages of the HPE Apollo 70 Arm-based servers for their next project. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Battling the Security Challenges of Next-Generation Product Development - Sponsored By IAR Systems AB 2:30PM - 3:20PM Haydn Povey, Secure Thingz show more Description With ever more devices connected to networks via the IoT, there is an increased risk of hacking attacks and IP thefts. You want your product to be a success, but as its popularity grows, so does the interest from the bad guys. So it’s time to face reality. Any device can get hacked. Any weakness can, and will, be exploited to steal your IP and reengineer your product, either in manufacturing or at the user site. In addition, your third-party manufacturer may run unsolicited production batches and steal your profit as well as potentially hurt your brand or customers. The question is: what are you going to do about it? How do you battle the bad guys? Solving the challenges of security is critical to the success of the IoT. This session will go through these major challenges, why you should care and what to consider in your product development. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Building Future Automotive SoCs From Arm IP 2:30PM - 3:20PM Tom Conway, Arm show more Description The automotive industry is undergoing a period of intense change and innovation. Arm IP is already at the heart of many SoCs within the automotive market. Arm is increasing our investment in automotive, to deliver more to our partners across ADAS / Autonomous, IVI / Cockpit, Powertrain, and Body. Come along to hear more about the various features, safety capabilities and specific products across our portfolio (CPU, ML, GPU, ISP, System IP, etc) to help with your next SoC for Automotive and how our products can help you develop innovative new products in this exciting market. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Designing Arm-Based SoCs with Next-Generation High-Speed Interfaces - Sponsored By Synopsys, Inc. 2:30PM - 3:20PM Scott Knowlton, Synopsys, Inc. show more Description Now that the PCI Express® (PCIe®) 4.0 Base Specification is released, and numerous 16GT/s designs are in-flight or entering the market, SoC designers and architects are looking ahead to their next-generation designs. PCI Express 5.0 (32GT/s) and CCIX (25GT/s) require designers to consider and overcome several key challenges including managing datapath width, timing closure, signal integrity, and complex packaging issues. In addition, a close collaboration between system designers, SoC designers, and layout designers becomes important. This session addresses how to accelerate your move to these new high-speed standards that are especially useful for infrastructure/server class products, while managing the latency, throughput, power, and area requirements of Arm®-based and other high-performance SoCs. Session Keywords: Synopsys Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Developing Machine Learning Solutions for the IoT Edge 2:30PM - 3:20PM Raviraj Mahatme, Arm show more Description Machine learning, especially deep learning, based algorithms are gaining popularity in IoT edge devices, as they can offer human-level accuracy in many tasks, such as image classification and speech recognition. We have seen increasing interests in developing and deploying neural networks (NNs) on the types of low-power processors found in always-on IoT Edge systems, such as those based on Arm Cortex-M microcontrollers. In this talk, we first discuss the challenges of deploying neural networks on microcontrollers with limited memory and compute resources and power budgets. We introduce CMSIS-NN, a library of optimized software kernels to enable deployment of neural networks on Arm Cortex-M processors. We also present techniques for NN algorithm exploration to develop lightweight models suitable for resource constrained systems. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E How Security Provisioning Considerations Affect Your Armv8-M based Firmware Design Process 2:30PM - 3:20PM Rajeev Gulati, Data I/O Corporation; Steve Pancoast, Secure Thingz show more Description Designing a secure device based on an Armv8-M core is one thing. Designing a secure device that can easily be provisioned in high volume is quite another. The latter requires a modern workflow which integrates security into all phases of a product’s life. With a cost-effective and scalable security provisioning methodology, these IoT devices may be produced securely anywhere in the world. Too often there is a gap between the design and manufacturing process, impacting time-to-market and quality. The modern workflow closes the gap between design and production. This session looks at best practices for designing and provisioning trusted devices. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H STM32F7 Embedded Graphics Hands-on Workshop Sponsored By STMicroelectronics 2:30PM - 5:30PM Mike Hartmann; Steve Miller, STMicroelectronics, Inc. show more Description In this hands-on workshop, you will use a STM32F7 Discovery Board and the TouchGFX software framework to create cutting edge GUIs! TouchGFX is designed to take advantage of the graphical features of the STM32F7, STM32F4, STM32H7, and STM32L4+ families. The hands-on training is a working session – please bring your laptop, either a Windows® computer (Windows 7 or later or MacBook® running Windows® (Parallels, VM Fusion, etc.), with one type A USB port and a minimum 12.5 Gigabytes of free disk space. Note: Administrator rights are needed for software and driver installation. ST will provide the required STM32F7 Discovery Kit and software. SPACE IS LIMITED FOR THIS SESSION – FIRST COME, FIRST SEATED. Must bring your laptop, be present and stay for training to receive free kit. Time Wednesday, Oct 17 2:30PM - 5:30PM Session Type Sponsored Workshop Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220B The Arm Ecosystem - Driving Performance Beyond Moore’s Law - Sponsored By Arm 2:30PM - 3:20PM Lionel Belnet, Arm; Miguel Nunes, Qualcomm show more Description CPU performance and efficiency from Arm has driven significant technological advances with our ecosystem partners creating platforms that take the user experience to new heights. In this talk you will see how Arm and Qualcomm are now enabling what others have struggled to do from small screens to large. Get insights into the roadmap, CPU performance and a deep dive into the latest Arm CPU from the product experts from both companies. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Unified Zero-touch Model to Provision Arm & Intel Devices to Pelion 2:30PM - 3:20PM Guy AlLee, Intel Corporation; Geoffrey Cooper, Intel Corporation; John Hengeveld, Arm show more Description Today, it takes nearly 20 minutes to manually provision each device to IoT management platforms like Pelion, AWS, or Azure. Many solutions require one-off preloading of configurations by SIs or OEM device manufacturers, only apply to Arm or Intel devices, or are not open to work with any device management system. In this joint Pelion and Intel presentation, we showcase a groundbreaking solution that will enable any Arm- or Intel-based sensor to onboard to Pelion with privacy preserved. Demo: TrustZone- based sensor and Intel gateway will provision to Pelion in seconds at the touch of a power button. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Updating and Executing Trusted, Authentic Code in an IoT World - Sponsored By NXP Semiconductors 2:30PM - 3:20PM Alejandra Guzman, NXP Semiconductors show more Description The proliferation of IoT products has increased the vulnerability of our everyday devices, enabling attacks on personal data and changing the manufacturer’s intended device functionality. Executing trusted and authentic code on an IoT device is critical to securing a manufacturer’s IP or personal data and information. In this session, we’ll cover how the security features available on NXP’s Cortex-M-based MCU portfolio can help address the complex requirements for secure firmware updates that protect intellectual property and ensure product integrity. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A
3:00pm Technology Decisions Critical To Your IoT Strategy - Sponsored By Arm 3:00PM - 3:30PM Simon Ford, Arm show more Description Draw on Arm’s IoT software expertise in this session, as we discuss how to build a successful IoT device software strategy. We’ll cover the fundamental questions that businesses should be asking within their organisation, which will provide guidance for making key decisions. Topics covered will include: 1. Software strategy to meet design complexity and customer requirements 2. Your new responsibilities around device security and manageability 3. The complexities of installation, provisioning and device management 4. Designing for multi-source and targeting multiple markets 5. The dilemma of short term investment vs. long term gain Time Wednesday, Oct 17 3:00PM - 3:30PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
3:30pm 5G System Design: Challenges and Solutions 3:30PM - 4:20PM Kinjal Dave, Arm; Ray Hwang, Arm show more Description The emerging 5G cellular systems raise unprecedented challenges to support a portfolio of different use cases and service types. In this talk, we will provide an overview of 5G technology requirements, the key use cases envisioned for 5G, the system design challenges, including conflicting performance and efficiency requirements. We will also highlight possible solutions to meeting some of the design challenges posed by future 5G modem designs. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Accelerating & Optimizing Machine Learning on Arm Cortex-A 3:30PM - 5:10PM Jason Andrews, Arm; George Lander, Arm show more Description There has been an explosion of interest around deploying deep learning enabled applications on embedded platforms, in everything from digital assistants to home entertainment systems. Arm NN bridges the gap between existing machine learning frameworks and the underlying hardware. It enables translation of existing frameworks, such as TensorFlow and Caffe, allowing them to run efficiently, without modification, across a variety of Arm Cortex CPUs and Arm Mali GPUs. In this workshop we will show developers how to get up and running with Arm NN on Linux and how to analyze application performance with Arm’s profiling tool, Streamline. Bring your own laptop to participate in our hands-on workshop! First 40 attendees will receive a HiKey 960 development board & free 60-day Streamline Performance Analyzer with Arm DS-5 Ultimate Edition. Audience Level: Intermediate Time Wednesday, Oct 17 3:30PM - 5:10PM Session Type Conference Workshop Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220C Can ISO 26262 Random Fault Analysis be Scaled to Complex SoCs Containing 3rd Party IP? - Sponsored By Synopsys, Inc. 3:30PM - 4:20PM Kevin Rich, NVIDIA show more Description Analysis of the effects of random faults on complex SoCs presents unprecedented challenges for functional safety tools. NVIDIA's state-of-the-art SoCs targeting autonomous driving consist of a dizzying array of units/IP, both proprietary and third party. The failure mode analysis of hundreds of units is necessarily performed by the hundreds of engineers with domain expertise. The SoC can be subdivided for the purpose of analysis, and in the case of third party IP, such as Arm® cores, this analysis is performed by the IP vendor. These analyses must eventually be combined into a coherent, SoC-level FMEDA (failure modes, effects, and diagnostic analysis). The more challenging aspects of this process and how they are addressed in VC Functional Safety Manager, an FMEDA tool that is the product of a Synopsys-NVIDIA collaboration, will be presented. VC FSM's integrated FMEA (failure mode effects analysis) and FMEDA development flow supporting tens of simultaneous users will be described. Particular focus will be given to the advantages of leveraging a purpose-built tool that utilizes a centralized database. Sophisticated features that smooth the path from FMEA to FMEDA, including integration with fault injection, will be discussed. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Computer Vision at the Edge and in the Cloud: Understanding the Tradeoffs 3:30PM - 4:20PM Jeff Bier, Embedded Vision Alliance show more Description Computer vision is rapidly becoming ubiquitous. From devices that prevent automobile accidents, to smart cameras that measure the flow of customers in stores, as well as home assistants that monitor the health of elders, vision is showing up everywhere. A key architectural choice underlies this ubiquity: should vision processing be done at the edge, in the cloud, or a combination of the two? In this presentation, Jeff Bier, founder of the Embedded Vision Alliance, will discuss the benefits and trade-offs of edge, cloud, and hybrid approaches, and when you should consider each option. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210A How to Reduce the Integration Effort for an Industrial SoC Design 3:30PM - 4:20PM Mike Eftimakis, Arm; Vojislav Krvavac, HDL Design House show more Description When developing any SoC, making sure that all the components are compatible and properly connected is one of the major tasks. Whether you use third-party IPs or develop your own, integration effort can be significant. HDL have been using the Arm System Design Kits to drastically shorten the integration process, thanks to a reliable frame, which you can use to build your SoC. The goal of this presentation is to show the practical benefits of using the Arm System Design Kit, greatly reducing design, verification, and software development efforts when developing an SoC for industrial application. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Meeting Functional Safety Requirements for the Next Generation of Automotive Applications - Sponsored By Cadence Design Systems, Inc. 3:30PM - 4:20PM Neil Stroud, Arm; Alessandra Nardi, Cadence Design Systems, Inc. show more Description The modern vehicle is becoming one of the most complex and demanding technology platforms that requires innovation across architecture, design, IP, tools, and flows to meet the significant performance, security, and safety requirements. The latest Arm cores are designed to support a variety of automotive applications (e.g., infotainment, autonomous driving, connectivity) up to the highest level of safety integrity requirements. The presentation will review the flows, methodologies, IP, and some of the design techniques needed to satisfy functional safety requirements for different automotive applications. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Pre-packaged IoT Solutions 3:30PM - 4:20PM Kevin Bromber, myDevices show more Description In this track we will demonstrate a complete end-to-end IoT solution which combines gateways from several hardware manufacturers, a variety of industrial sensors, Arm mbed Cloud device management software, LoRaWAN Network server, and the IoT in a Box application software from myDevices. The presentation will be a combination of slides to explain the architecture of the platform, followed by a live demonstration of a real IoT solution being deployed in minutes in front of the audience. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Speed Up Your AI Designs with Dedicated Arm Machine Learning Hardware 3:30PM - 4:20PM Ian Forsyth, Arm show more Description Discover the features and benefits of Arm’s Project Trillium's hardware processors: Machine Learning (ML) and Object Detection (OD) processors, their software support, and applicability for different markets and the options for incorporating them in differentiating SoC designs. This talk will describe our strategy and plans for the highly scalable, ground-up designed ML architecture, the markets it will target, and future product iterations. It will also include a comparison with other Arm solutions, enabling you to choose the best software and hardware combination to address your specific needs.   Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Understanding the Principles of a Secure Development Workflow - Sponsored By IAR Systems AB 3:30PM - 4:20PM Chris Jones, Secure Thingz; Shawn Prestridge, IAR Systems AB show more Description What are the aspects to consider when it comes to security during the development of a secure device-based product? What process should you have when provisioning a secure device, such as a secure MCU or secure element, to offer protection from remote attacks? Security best practices require choices in design, features, implementation, testing, configuration, and maintenance. There are a great many considerations including protocols, encryption, technology, software, APIs, platforms, and more. This session will cover what basic principles to consider, the workflow when developing a secure product, the process of securely manufacturing a secure product, and finally, the detailed mechanisms of implementing a secure product through its lifecycle. Second speaker: Shawn Prestridge Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Working Together to Secure the Internet of Things - Sponsored By Arm 3:30PM - 4:20PM Andrew Frame, Arm; Srinivas Kumar, Mocana; Haydn Povey, Secure Thingz; Yuxin Zhou, Express Logic show more Description Securing the Internet of Things is not something that one company or entity can achieve on their own. This panel will discuss how collaboration is required across the whole ecosystem to truly secure devices. The panel will discuss some key collaboration elements including: the Arm Platform Security Architecture (PSA), the creation of firmware and software that adheres to PSA principles, plus the need for accessible and utilizable APIs and professional tools. The panel will represent many areas of the IoT ecosystem including: microcontroller manufacturers, development tools, real-time operating systems, security software solutions and cloud service providers. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C
3:45pm Securing PSA with external flash - Sponsored By Winbond Technology Ltd. 3:45PM - 4:15PM Nir Tasher, Winbond show more Description Secure SoC architects and designers favor embedded flash for the strong security it enables. However, when considering the overall system costs and limitations inherent to eFlash design, one finds great benefit in using external flash. External flash, on the other hand, carries a hefty security price tag, one which is almost impossible to mitigate. Here is where secure flash comes into the picture. Secure Flash combines the benefits of an external flash device with high security level which allows meeting the goals of security, flexibility, budget, and regulation. Time Wednesday, Oct 17 3:45PM - 4:15PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
4:30pm A Guide to Securing Embedded Devices with TrustZone - Sponsored By Arm 4:30PM - 5:20PM Jacob Beningo, Beningo Embedded Group; Kobus Marneweck, Arm show more Description Securing embedded systems has become a critical task for developers as more devices become connected and upgradable over the Internet. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm® TrustZone® for Cortex®-M processors. We will examine important concepts, such as Secure and Non-secure domains, setting up a TrustZone RTOS and debugging a secure application. This interactive session will provide a hands-on demonstration of the newly released Microchip SAM L11, a Cortex-M23 based chip with TrustZone. We will use Arm Keil MDK to demonstrate how to get TrustZone up and running on both hardware, and also in simulation, using a virtual processor. Topics covered in this session include: – Introduction to TrustZone – Defining the Secure and Non-secure world – Example use cases to secure an application with TrustZone – Implementing an RTOS in the TrustZone environment – How to debug a TrustZone-based application – Best practices for securing an embedded system – Recommendations for next steps Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Automated and Scalable Functional Safety Verification is Essential for ISO 26262 Compliance of Automotive SoCs - Sponsored By Synopsys, Inc. 4:30PM - 5:20PM David Hsu, Synopsys, Inc. show more Description ISO 26262 compliance at the highest levels of functional safety is becoming a requirement for a wide range of complex automotive SoCs. For example, AI processors, many of which are Arm® processor-based, that enable the most advanced levels of automotive autonomy, increasingly need to be ISO 26262 ASIL D-certified. Meeting ISO 26262 compliance needs for very large devices with many proprietary and 3rd party IPs presents unprecedented challenges for SoC verification teams. The failure mode analysis of potentially hundreds of units must be distributed to engineers and teams with specific domain expertise, and these analyses must then be combined to create coherent device-level FMEAs and FMEDAs. Fault injection testing to evaluate the effectiveness of safety-related IPs and SoCs in addressing random hardware failures is one of the key aspects of ISO 26262 Second Edition Chapter 11 requirements. This session will describe a state-of-the-art functional safety verification solution built around VC Functional Safety Manager, Synopsys’ product for FMEA/FMEDA automation scalable for complex automotive SoCs and large verification teams, as well as Z01X, our industry-leading functional safety fault simulation solution, that automates the generation of key ISO 26262 deliverables. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D IoT Connectivity Must Scale & Accelerate Globally – Here's How 4:30PM - 5:20PM Nigel Chadwick, Arm; Alan Tait, Arm show more Description Modern IoT frameworks require a scalable, cost-effective connectivity management service. In this talk, we will discuss how to easily manage the connectivity of IoT devices, regardless of network type, and deliver ongoing connectivity management over a device’s entire lifecycle. In particular, MNOs and Enterprise/OEM clients have a variety of requirements for all their IoT connected devices, including subscriber management & analytics, billing, data routing and reporting capabilities.” Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Low Power Neural Networks on Cortex-M7 CPUs Using the OpenMV Cam H7 4:30PM - 5:20PM Kwabena Agyeman, OpenMV, LLC show more Description In March 2018, Arm released the Arm CMSIS NN library which lets you run neural networks trained with desktop tools like Caffe and TensorFlow on low power Cortex-M7 microcontrollers for edge device IoT computing. With the OpenMV Cam H7 powered by a 400 MHz Cortex-M7 STM32H743VIT6 chip, we demonstrate how to turn desktop NNs into binary files that can be dynamically loaded and run on images. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Methods for Provisioning Security Features in an M33-based MCU Using a Physically Unclonable Function 4:30PM - 5:20PM Rob Cosaro, NXP Semiconductors show more Description Security is becoming an important part of all devices connected to the Internet, but along with security comes the complication of provisioning the microcontroller with secret keys. In this session, we’ll discuss the traditional methods of injecting secret keys into OTP, but one of the most interesting part of this presentation is the introduction of a new type of key storage called physically unclonable function, or PUF, and what this brings to security. With PUF, the microcontroller contains the key without having to inject a secret key. This opens up different options that make provisioning easier and more secure. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Optimizing Arm Cortex A76 PPA in TSMC 7nm and Arm IP Portfolio for TSMC 22ULP/ULL Processes 4:30PM - 5:20PM Paddy Mamtora, Cadence Design Systems, Inc.; Rupal Gandhi , Arm; T Chan, Pixelworks Inc show more Description Implementing Arm’s latest Cortex-A76 high-performance core on a TSMC 7nm process warranted a fully tuned and optimized flow to achieve the design power, performance, and area (PPA) goals. Cadence and Arm collaborated in creating this flow during the Cortex-A76 processor development. This session will discuss the result of this work, a TSMC N7 Cortex-A76 implementation flow tuned for optimal performance per watt. TSMC 22nm technology offering consists of two variants – 22ULP & 22ULL. Arm has developed IP optimized to both technology variants. This paper would talk about multiple IP & design optimization facets considered in ensuring optimal SOC PPA across different market segments with focus on IOT segment. Presentation 1-Optimizing Arm Cortex A76 in TSMC 7nm Using Cadence Implementation Flow. Speakers: Paddy Mamtora (CDNS) and Rupal Gandhi (Arm) Presentation 2- Optimizing Arm Platform & POP IP to Enable Low Power & Low Voltage Applications on TSMC 22ULP/22ULL Technology. Speakers: T Chan (Pixelworks) and Geetha Rangarajan (Arm) Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Securing The World by Starting With Your Application - Sponsored By IAR Systems AB 4:30PM - 5:20PM Shawn Prestridge, IAR Systems AB; Rafael Taubinger, IAR Systems AB show more Description Security can no longer be an afterthought or a patch. It needs to be there from the very beginning of the design of your application. By simplifying the configuration of security, from the Root of Trust and key storage on your secure device, to the creation of security profiles and projects, you will be able to take complete control of your security development workflow and ensure trust in your next application. This session will show how integrate security into an existing workflow of development, debugging, mastering and manufacturing. The session will go through the steps necessary for creating a secure application in a straightforward way, leveraging the secure hardware built into next-generation microcontrollers to provide the low-level trust anchors and secure services needed for trustworthy IoT solutions. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Transform your next design with complete solutions from Samsung Foundry and Arm on 14/11/7/5nm and FDSOI 4:30PM - 5:20PM Kuang-Kuo Lin, Samsung Foundry; Umang Doshi, Arm show more Description Samsung Foundry continues to accelerate its process technology, advanced IP, and packaging portfolios to provide the best solutions for existing and emerging markets. Designers can find in Samsung a reliable partner to provide complete turnkey solutions for applications ranging from HSCD/AI, Networking, Mobile, Automotive and IoT. An expanded manufacturing roadmap with a plethora choices of mature (180nm-28nm) to advanced (14nm/11/10/8/7/5/4/3nm) process nodes will be presented. In this session, Arm and Samsung Foundry will co-present the joint IP design solutions that will ensure and expedite customer successes and accelerate their time-to-market. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A Utilizing Workload Consolidation for Industry 4.0 - Sponsored By Wind River 4:30PM - 5:00PM Pavan Singh, Wind River show more Description The industrial world is going through a transformation known as Industry 4.0, or the Industrial Internet of Things. This transformation is leading to smart manufacturing systems, with more compute capability at the edge. However, adding more compute capability increases OPEX. This is due to the complexity of computer integration and compute options as well as cabling, power, and maintenance costs. The solution to solving this cost increase is “workload consolidation.” Workload consolidation within the factory will allow multiple compute workloads to run on a common computing platform. The control of individual machines, manufacturing data collection, communications, security, and safety functions can be consolidated into “virtual machines” within a single compute platform. Another advantage is that all the data can be analyzed locally, so quick decisions can be made rather than going back to the data center or cloud for further instructions. In this session, learn how advances in processing performance, real-time operating systems, and virtualization technology are enabling workload consolidation in the factory to drive global industries from automatic to autonomous for Industry 4.0. Time Wednesday, Oct 17 4:30PM - 5:00PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater Who’s Driving? The Responsibilities That Come with Providing Physical IP to the Automotive Market 4:30PM - 5:20PM Jim Dodrill, Arm show more Description As we anticipate the rise of autonomous driving using Arm processors and physical IP, we must be keenly aware of the importance of assuring the reliability of Arm products. The safety of many people and the reputations of Arm and our partners are at stake. This presentation will illuminate the connections from transistor physics, through Arm physical IP, to our responsibility for passenger safety. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E
5:30pm How We Get There From Here: A Roadmap to Scaling IoT to A Trillion Devices - Sponsored By Arm 5:30PM - 6:15PM Greg Yeric, Arm; Dr. Rob Aitken, Arm; Ian Bratt, Arm; Brian Fuller, Arm show more Description The IoT will reach a trillion connected devices in less than 20 years. Already, the dash to get there is upending business models, traditional notions of design and triggering vast new innovations in hardware and software. But these are early days. Much more needs to happen–from ecosystem development and refinement to hardware and software and services advances–to reach a trillion devices. What’s it going to require and are we, as an industry, in a position to deliver on time? Join Arm's trillion device trio: Greg Yeric (Research Fellow), Rob Aitken (Director of Technology) and Ian Bratt (Director of Machine Learning) as they offer thoughts on how the future we think about can become real. Time Wednesday, Oct 17 5:30PM - 6:15PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
Thursday, October 18
9:00am A Balanced Approach to Inference Implementation at the Edge 9:00AM - 9:50AM Markus Levy, NXP Semiconductors show more Description The IoT led to an explosion of data. Though it was once thought the cloud would handle this data, the industry soon realized this was impractical. As a result, machine learning on the edge has increased in popularity and usefulness. One of the most fascinating things about machine learning, or edge computing, is that it can be accomplished on a wide range of device categories, from MCUs with Arm Cortex-M4 and M7 cores to complex SoCs with high-end A-class cores, GPUs, and ML accelerators. This presentation describes the cost and performance tradeoffs for these device categories, using Vision, Voice, and Vibration as examples. Time Thursday, Oct 18 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Designing & Benchmarking Best-in-class Real-Time SoCs for Autonomous Vehicles 9:00AM - 9:50AM Eric Sondhi, Arm; James Scobie, Arm show more Description SoCs for autonomous vehicles demand advanced safety features alongside efficient and responsive execution. Arm IP, like the Cortex-R52, is designed from the ground up to address functional safety in systems that must deliver high performance, optimize power efficiency, and comply with the most stringent safety standards in the automotive and industrial markets. Arm's modeling solution and the FuSa-certified Arm Compiler 6 allow Partners to start their SoC architecture and benchmarking early, validating system functionality and performance. Pre-silicon performance analysis of hardware and compiler-optimized code and continuous integration enables partners with the fastest route to FuSa certification and the automotive market. Time Thursday, Oct 18 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H PSA in Practice - Developing with Trustonic on Cortex-M23 9:00AM - 9:50AM Richard Hayton, Trustonic show more Description Arm’s Cortex-M23 and Cortex-M33, with their Platform Security Architecture, provide the underpinnings for secure IoT. This talk shows how secure devices can be built in practice by leveraging commercial silicon that has been preprovisioned with Trustonic’s secure Kinibi-M micro-TEE and device identity. The talk covers: • Development of a trusted module, with a “hello world” worked example • Debugging and testing of the trusted module on a test board • Deployment steps for a commercial device where debug access is naturally restricted We will also cover some of the key benefits for device makers focusing on IP protection/fraud prevention. Time Thursday, Oct 18 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Specifying and Certifying Hardware Suitable for Secure, Arm-based IoT Applications 9:00AM - 9:50AM David Alexander, PA Consulting; Haydn Povey, Secure Thingz show more Description While the Platform Security Architecture from Arm is helpful in providing a framework to drive security within the system, numerous other requirements should be met to deliver a secure application. In fact, every decision in the development, deployment, and delivery of a project may have unforeseen consequences during a product’s life cycle. This presentation will discuss the features and functions of devices that are required to implement a secure application, including the need to generate, store, and maintain cryptographic keys; the level of entropy required on a device; the physical robustness guarding secrets; and secure operations and network operations centers. Time Thursday, Oct 18 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
10:00am What's Next? 10:00AM - 10:25AM Mike Muller, Arm show more Description Is Moore’s law dead, is it safe to connect your toaster to your home network? These are some of the uncomfortable questions Arm CTO and co-founder Mike Muller will assess as he discusses recent trends involving the good and bad uses of new data. What will a world built on zettabytes of real-time personal, business and infrastructure information really look like? And how do we take the lessons from a partially-connected web world and translate them into a fully connected IoT world that is robust on security and data privacy. Time Thursday, Oct 18 10:00AM - 10:25AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
10:25am Better Together: Integrated Technology Solutions 10:25AM - 10:50AM Peter Greenhalgh, Arm show more Description The need to deal with ever more complex technology asks has meant the traditional co-operation existing across the boundaries of technology and products within Arm has had to evolve to a new level of sophistication. As a result, we are now creating the structures, opportunities and capabilities to build products that deal with challenges in a much more multi-dimensional way. It is allowing us to advance from a product-focused design ethos to one focused on building system solutions. As Arm's VP of Technology Peter Greenhalgh will explain, this “Better Together" approach will position us and our partners to deal more easily and robustly with the major challenges we face in areas such as security, performance and efficiency. It will also allow for more holistic thinking in how we design solutions that incorporate an array of IP; from computer vision and machine learning, CPUs, GPUs, VPUs and DPUs, interconnect, system-IP and compiler technology. By raising our thinking even higher at the system level, Arm will bring even greater balance and problem-solving abilities to the ecosystem. Time Thursday, Oct 18 10:25AM - 10:50AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
10:50am Voice on the Edge 10:50AM - 11:30AM Dr. Rand Hindi, Snips show more Description Deep Learning is one of the biggest revolutions in Artificial Intelligence. For the first time, machines became capable of communicating with humans like humans do between themselves, using voice and natural language. However, achieving this level of cognition has required enormous amounts of data to be processed by large machine learning models, creating issues of privacy, latency and bandwidth. In this talk, he will show how modern advances in machine learning and hardware enables voice to be processed on the Edge, leading the way for a future of near-instant, private-by-design human-machine interaction. Time Thursday, Oct 18 10:50AM - 11:30AM Session Type Keynote Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Location Grand Ballroom 220A
11:30am ServerReady and Open Standards Accelerating Delivery 11:30AM - 12:20PM Charles Garcia-Tobin, Arm show more Description Arm and its ecosystem partners have been working together to achieve great out-of-the-box experience for our server customers. We defined the Server Base System Architecture (SBSA) and Server Base Boot Requirements (SBBR) based on open standards. We developed the Architecture Compliance Suite (ACS) to test the servers for compliance. We designed the Arm ServerReady program to highlight the servers that comply to these standards. This session marks the public launch of the Arm ServerReady program with our partners worldwide. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Sponsored Session Location Executive Ballroom 210D Accelerated Inferencing on the Edge - Sponsored By Mentor, a Siemens Business 11:30AM - 12:20PM Russell Klein, Mentor, a Siemens Business show more Description Machine learning algorithms are highly compute-intensive. Training sessions can be performed in data centers where racks of server class processing power can be employed. However, inferencing, which may be done on embedded systems (edge nodes), is less compute-intensive. But certain applications such as real-time video image processing may stress the capabilities of even the fastest Arm processors. One way to address this is to move parts of the inferencing algorithms into accelerators implemented in hardware. This session will explore the use of High-Level Synthesis (HLS) to create machine learning accelerators specific to an implementation. HLS enables for greater trade-offs between power, area, latency, and throughput needed to meet demanding power and performance goals. HLS allows implementation to be done much more quickly than traditional hardware design methodologies, which is essential in fields like machine learning where algorithms are continually evolving. This session will also cover integrating the accelerators into an Arm processor subsystem’s hardware and software. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A Advancing IoT Communication Security with TLS and DTLS v1.3 11:30AM - 12:20PM Hannes Tschofenig, Arm show more Description Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps. In this talk I will explain how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. I will also talk about the performance improvements and how they help in IoT deployments. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Delivering Future Automotive Systems - Sponsored By Arm 11:30AM - 12:20PM Robert Day, Arm show more Description Vehicles are undergoing an intense, rapid period of innovation, much of it is enabled by Arm based processing power. The complexity and functionality of electronic systems is rapidly increasing with massive growth in software content, all required to power the next generation of connected, autonomous, electric vehicles. This panel will bring automotive industry experts together to discuss how to deliver these future automotive systems, looking at different enabling technologies and other industry trends and requirements. Topics include : safety, security, ubiquitous connectivity, power and performance for higher levels of autonomous compute processing, and new trends in cabin and driver experiences. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Enabling Real-time Machine Vision and Deep Learning on Small Devices 11:30AM - 12:20PM Laurent Itti, JeVois Inc show more Description The next generation of consumer devices will require more natural interfaces, stronger situation awareness, and better perceptual capabilities, both to inform users and to interact with them. Computer vision and deep learning are crucial enablers, yet they have remained difficult to implement on embedded systems. I will survey machine vision and deep learning frameworks and technologies available for deployment today, and demonstrate real-time implementations on $5 Arm Cortex-A7 processors of algorithms ranging from barcode reading, to face recognition, and object recognition using deep neural networks. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Future-proofing Your Code - Sponsored By IAR Systems AB 11:30AM - 12:20PM Shawn Prestridge, IAR Systems AB show more Description How do you make your code stand the test of time? Wouldn’t it be nice to be able to actually reuse your code instead of just talk about it? This session will give you a roadmap of how to future-proof your code and design by focusing on the 4 Ss: Size, Speed, Safety, and Support. What are the best possible optimizations for your code regarding both size and speed? Actually, you might not need to rewrite the algorithm to get more performance with these optimizations. In addition, this session will discuss issues that can impact the safety of your code and how to quickly identify vulnerabilities and latent defects in your application. Finally, it will explore specific techniques to help you develop robust applications ready for future takeoff. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Revolutionizing the Data Center with Hyperscale Cloud Systems 11:30AM - 12:20PM Mauri Whalen, Ampere Computing show more Description Join Ampere Computing’s VP of Software, Mauri Whalen, for an inside look into how the company is bringing an open and innovative strategy to hyperscale computing. Learn about Ampere’s latest Arm®v8 64-bit server operating at up to 3.3 GHz specifically designed for cloud servers. Mauri will also talk about Ampere’s developer community, the “just-works” commitment, insights into software compatibility, and how you can get hands-on time with an eMAG development system. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Securing and Managing IoT Ecosystem – A Developer’s Tale 11:30AM - 12:20PM Alon Shamir, Arm show more Description Today’s IoT deployments tend to be heterogeneous and fragmented in kinds of devices and deployment topologies. Developers are an integral aspect of operating this in a managed and secure fashion. You’ll leave this session with technical knowhow on how best to make the device lifecycle managed Over-The-Air, integration choices you’ve to make to deploy this in hybrid cloud environment and best approaches to secure with commercial PKI systems. In addition, we’ll review the ability to bring in devices with disparate protocols into one management environment providing a unified operational visibility into the IoT system. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Virtual Reality and Augmented Reality Optimized for Heterogeneous Multicore Systems 11:30AM - 12:20PM Lorenzo Dal Col, Virtual Arts show more Description Virtual reality and augmented reality experiences require very high resolution, frame rate, and smoothness, and represent the most demanding applications run on a mobile device today. Modern phones have capable hardware, many times containing eight or more CPU cores and up to 18 GPU cores, but writing code that works well in this environment can be challenging. This presentation will show real-world examples of innovative techniques and tools for writing software which uses all the CPU and GPU cores, while maximizing energy efficiency. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
12:00pm Arm Innovator Program - Sponsored By Arm 12:00PM - 12:30PM Rex St. John, Arm show more Description Arm Innovators are technical pioneers helping to extend Arm architecture and sharing their experience in a wide variety of exciting areas. The Innovator Program offers many opportunities for Innovators to collaborate with Arm and showcase their work, expertise and projects. The session will talk about the Innovator program, why it is key, it’s importance in the ecosystem and how it reaches developers. We’ll bring in two innovators to highlight their work and what they have worked on with Arm. For more information visit: https://www.arm.com/innovation/meet-innovators https://community.arm.com/innovation/b/blog Time Thursday, Oct 18 12:00PM - 12:30PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
12:45pm The Revolution and Challenges with E-Cockpit - Sponsored By Thunder Software Technology Co., Ltd. 12:45PM - 1:15PM Andy Yu, ThunderSoft show more Description With the advancement of mobile communication, artificial intelligence and automobile telematics, it is inevitable that our cars will become more intelligent. The trend of “Software defined cars” will be common observance. Thundersoft works closely with the industry leaders to bring high quality solutions, tools and services to automobile OEMs and tier one suppliers, helping them to further improve the drivers experience and shorten the time to market. Time Thursday, Oct 18 12:45PM - 1:15PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
1:30pm Accelerate your Arm-based SoC with SpeedcoreTM eFPGA IP - Sponsored By Achronix Semiconductor Corporation 1:30PM - 2:00PM Steve Mensor, Achronix show more Description Embedded FPGA IP has already been established as a proven industry solution to accelerate Arm-based ASICs and SoCs. Achronix SpeedcoreTM eFPGAs are finding increasing usage in applications such as AI, machine learning, cryptocurrency, 5G wireless, networking and automotive. This talk focuses on the evaluation, IP resource selection, integration, verification, and post-silicon validation phases of embedding an eFPGA into an Arm-based SoC. We will also discuss how Achronix works closely with customers to port the eFPGA IP to different process and technology nodes. Time Thursday, Oct 18 1:30PM - 2:00PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater Arm and TSMC Enable Automotive SoC Designs 1:30PM - 2:20PM Wolfgang Helfricht, Arm; Thomas Quan, TSMC show more Description Certification, grades, functional safety, traceability are now the common terms in the semiconductor industry with the rapid expansion of electronic automotive applications. Along with these terms, we have seen the need for optimized physical IP for automotive SoC’s and a wide range of processes enabling automotive designs. The session will review the advances that have been made in Artisan physical IP for TSMC 16FFC automotive process, the new safety package deliverables, and how the upcoming Automotive POP IP can address some of the unique and stringent automotive requirements to ensure design robustness. The session will also cover the design enablement platforms for TSMC16FFC and 7nm processes. We will describe the design collaterals delivered with each platform, including automotive-specific technology files, PDKs, design flows, and foundation IP. We will also go over the availability and roadmap of interface and other IP from IP Alliance partners for these 2 processes. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Arm-Synopsys Collaboration to Enable Edge-to-Cloud Computing 1:30PM - 2:20PM Rahul Deokar, Synopsys, Inc.; David Koenen, Arm show more Description Arm and Synopsys are collaborating to enable rapid SoC innovation from hyperscale data centers and HPC all the way out to the network and provider edge. These all demand high-performance, efficient, scalable, heterogenous compute solutions. Learn how Arm Cortex-A processors, Arm CoreLink Coherent Mesh Network and System Guidance for Infrastructure (SGI), provide a scalable, energy-efficient solution and, in combination with Synopsys’s solutions (Design Platform with Fusion Technology, QuickStart Implementation Kits (QIKs), Verification Continuum Platform, and DesignWare Interface IP), enable designers to speed creation of their infrastructure products from power-constrained to peak performance on a common software platform. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Debugging Complex Applications in The Most Efficient Way - Sponsored By IAR Systems AB 1:30PM - 2:20PM Aaron Bauch, IAR Systems AB show more Description Have you ever tried to debug an issue that only pops up randomly? Do you wish there was more to debugging than just printf statements? There is help for you! This session will focus on practical, real-world debugging to show you how to track down elusive bugs as well as get more debug data from your device. It will go through how to interpret that data so that you really know what is going on inside of your application instead of just guessing fixes. In addition, the session covers how to diagnose exceptions (like hard faults), debug multiple code images simultaneously, and how to get the most out of your debugging environment to enable you to deploy your application as quickly as possible. Full code trace, timeline visualization, function profiling, code coverage, conditional breakpoints – there is a lot of functionality and useful shortcuts that can boost your efficiency while gaining complete control of every line of code and every single instruction executed in your complex application. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Do You Want to Create Secure IoT SoCs and Still Meet Your Deadline? 1:30PM - 2:20PM Mike Eftimakis, Arm; Neil Parris, Arm show more Description IoT security requires many complex components and a complete understanding of the IoT ecosystem. It is a significant challenge, but there is a way to make development simpler and faster. Arm is introducing new IoT frameworks, bringing security to different IoT device classes. Arm’s System Design Kits and associated software give you a complete framework, enabling faster creation of IoT solutions. Featuring a modular approach with key components pre-integrated with security elements following the principles of the Platform Security Architecture (PSA), the hardware elements are complemented by reference firmware and software enabling an any-device to any-cloud strategy. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E How to Build Optimized ML Applications with Arm Software - Sponsored By Arm 1:30PM - 2:20PM Robert Elliott, Arm show more Description Discover how developers are using the Compute Library, CMSIS-NN and Arm NN to develop AI applications targeting CPUs, GPUs and new processor architectures for Machine Learning (ML). After a brief overview of Arm’s ML software offerings, the talk will examine real-world use cases and how the ARM ML software libraries and APIs may be leveraged to create highly optimized ML applications for platforms ranging from Cortex-M microcontrollers to Cortex-A CPUs, Mali GPUs and the new Arm ML Processor (Marvin). To conclude, the talk will review the roadmap for Arm NN and related low-level software libraries, while looking at some of the challenges ML presents in low-power environments. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Intensive Image Processing on Arm (When ISP fails!) 1:30PM - 2:20PM Pannaga Bhushan Reddy Patel, Samsung RnD Institute, Bangalore; Rahul Sharma, Samsung RnD Institute, Bangalore show more Description The innovative arrangement pixels in tetracell sensors to allow enhanced light sensitivity in low-light conditions, and the data thence gathered do not lend themselves for further processing by the platform’s Image Signal Process (ISP) that expect data in Bayer format. This means that all the image enhancement algorithms, acting upon this non-standard format, have to be processed on the CPU and/or other processing elements available on the platform. Processing of big-image buffers with algorithms doing intensive processing, within a latency acceptable for successful commercial solution, is the subject of the proposal. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Pre- and Post-Silicon Verification for 5G Deployment - Sponsored By Mentor, a Siemens Business 1:30PM - 2:20PM Ron Squiers, Mentor, a Siemens Business show more Description The vision of 5G is becoming clearer as we move toward 2020. Most experts agree that 5G networks will support massive density at 1 million devices per square kilometer, blazingly fast speeds of at least 10 Gbps, latency as low as 1 millisecond and power as low as 0.1 millijoule/Kbit. People will not only be connected to each other with mobiles and wearables, but so will machines, automobiles, city infrastructures, public safety, and more. Looking ahead to this major transformation in cellular technology, Mentor acquired Sarokal Test Systems, a company that has been at the forefront of the 5G movement since its inception. This session explains the technology that fuses the Veloce emulation platform with Sarokal’s fronthaul testing technology for early and flexible verification and validation of 5G chip sets both pre- and post-silicon. Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A Revolutionizing the PC experience – Made possible by Arm’s trusted ecosystem - Sponsored By Arm 1:30PM - 2:20PM Ryan Shrout, Shrout Research; Stefan Rosinger, Arm; Arun Kishan, Microsoft; Miguel Nunes, Qualcomm show more Description The journey for always on, always connected Windows PCs has picked up significant momentum this year, and it isn’t slowing down. The partnership between Arm, Qualcomm, and Microsoft made this possible, delivering long battery life, LTE connectivity, and instant-on experience. Join us in this interactive panel session to learn from the technical experts, from each of these companies, about system performance, developer ecosystem, and roadmap commitment, that will change the next-generation PC experience. Moderated by Ryan Shrout (Founder of PC Perspective and Shrout Research). Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210B Safety & Security: An Unbreakable Bond 1:30PM - 2:20PM Marques McCammon, Wind River show more Description Given the complexity of autonomous driving and with so much at risk, safety and security are more critical than ever. The connected nature of automobiles opens the door to new threat vectors. Without security there is no safety. In order to stay vigilant against threats, OEMs will need to consider themselves as software companies. We'll investigate: * Complex cybersecurity landscape * Link between Functional Safety and security * Use cases around security, including remote diagnostics and maintenance * Architectures and technologies to address increasing compute complexity in cars and ensure systems stay secure * Lessons from other mission critical industries Time Thursday, Oct 18 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
2:15pm IoT Security in a Connected World, a New Approach to Securing IoT Devices 2:15PM - 2:45PM Yossi Naar, Cybereason show more Description IoT devices are growing at an exponential rate. Every day brings new and exciting technologies to our homes, cities, factories, and hospitals. Unfortunately, along with the amazing opportunity that these devices bring, come new and complex security concerns. Together with Arm, Cybereason presents a new approach that we believe can fundamentally change our ability to protect these devices, and protect ourselves from potential compromise from these devices. Time Thursday, Oct 18 2:15PM - 2:45PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
2:30pm Battling the Security Challenges of Next-Generation Product Development - Sponsored By IAR Systems AB 2:30PM - 3:20PM Haydn Povey, Secure Thingz show more Description With ever more devices connected to networks via the IoT, there is an increased risk of hacking attacks and IP thefts. You want your product to be a success, but as its popularity grows, so does the interest from the bad guys. So it’s time to face reality. Any device can get hacked. Any weakness can, and will, be exploited to steal your IP and reengineer your product, either in manufacturing or at the user site. In addition, your third-party manufacturer may run unsolicited production batches and steal your profit as well as potentially hurt your brand or customers. The question is: what are you going to do about it? How do you battle the bad guys? Solving the challenges of security is critical to the success of the IoT. This session will go through these major challenges, why you should care and what to consider in your product development. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Beyond Hardware: An Interactive Overview of Arm Development Solutions - Sponsored By Arm 2:30PM - 3:20PM Guilherme Marshall, Arm show more Description Through its continuous investment in tools and software, Arm has been accelerating system design and software development since the first Arm architecture. With compilers, debuggers and simulation systems created alongside Arm architectures and cores, Arm Development Solutions provides the tools necessary to get accurate views into your system's behavior and performance. From sensors to servers, open source projects to commercial enterprise solutions, join us in this interactive session to learn how Arm can help you through every step of your product development lifecycle.  Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Ensuring Silicon-to-Cloud Security for Your Medical Device 2:30PM - 3:20PM Kaushal Vora, Renesas Electronics; Henrik Flodell, Renesas Electronics show more Description While medical devices have always been designed with safety and quality in mind, today’s design emphasis is centered around connected, software-driven medical device security. Security not only impacts safety and quality but also ensures compliance, revenue/IP, and brand protection. In this session, we will discuss a platform approach to security on an Arm-based microcontroller. Here, security starts with securing your firmware, critical data, and keys in the hardware, forming your root-of-trust. We will then discuss how security and trust are extended to your cloud. We also review how designing for security impacts operations, budgets, planning, and insurance/compliance requirements. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G New Business Models For Cellular IoT 2:30PM - 3:20PM Loic Bonvarlet, Arm show more Description Today almost every M2M device includes a SIM card. The cost of procuring the SIM card for an M2M application, getting someone to physically put it in the SIM card slot and then verify the network connection usually costs upwards of $25. The advent of eUICC (eSIM) technology presents an opportunity to streamline the costs which should propel the IoT market. In this discussion, we look at the new opportunities that iSIM brings to the value chain and possible new business models and revenue streams the industry can benefit from. Ultimately, no single platform will be able to offer all features for all verticals in an IoT environment characterized by a “platform of platforms” approach, with open, interoperable platforms interacting with and complementing each other in a “system of systems” constellation and open ecosystem. Therefore, using easy-to-integrate and standards-based services is a key requirement as different players in the ecosystem build their business propositions. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Sponsored Session Location Executive Ballroom 210D Preserving Proprietary Innovation in an Open Source World 2:30PM - 3:20PM Mark Orvek, Linaro; Tyler Baker, Foundries.io; Jeff Kaufman, Red Hat; Iliyan Malchev, Google; Hervé Sibert, GlobalPlatform.org show more Description Uniquely in the Arm ecosystem, there is the collision of two worlds: the well-established embedded world of often bespoke platforms, stacks, and tools, and the arriving world of open-source software frameworks, often originating on commodity hardware. This session looks at this collision and asks if this meeting of open source and proprietary innovation has to be a zero-sum game. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Securely connecting MCUs to the Cloud 2:30PM - 3:20PM Richard Elberger, Amazon Web Services show more Description This talk will outline the challenges of embedded development and highlight how Amazon FreeRTOS solves these challenges. The Amazon FreeRTOS discussion will center around differentiated features such as tickless mode for low power consumption, and the ecosystem of tools available for development, test, and debug. We will also discuss use cases and relating microcontroller architecture choices. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210B Using Virtual Prototyping for Accurate Performance Analysis – an SSD Controller Case-Study 2:30PM - 3:20PM Malte Doerper, Synopsys, Inc.; Tim Kogel, Synopsys, Inc.; Jason Andrews, Arm; Eric Sondhi, Arm show more Description Optimizing the performance for a complex application is a phase-coupled problem: the HW architecture needs to be optimized for SW application, and the SW needs to be optimized for HW. Virtual prototyping enables the early and joint consideration of HW and SW, across multiple teams and companies, and even before RTL of all components becomes available. This in-depth technical presentation will show the complete flow, including the creation of an accurate virtual prototype as well as the usage for SW bring-up and joint HW/SW performance optimization. The flow will be illustrated by a demonstration of a real-live SSD controller SoC. Session Keywords: Synopsys Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H When Clock, Power, and Reset Domains Collide; and How to Solve It with Static “Multi-Domain Verification” - Sponsored By Mentor, a Siemens Business 2:30PM - 3:20PM Joe Hupcey, Mentor Graphics show more Description Interaction of functions spanning multiple independent power, clock, and reset domains can potentially cause catastrophic chip failures. Yet design teams still face several challenges to ensure these domains are working correctly with respect to each other. Although designers usually do a good job partitioning a design into power, clock, and reset domains at the chip level, there is considerable difficulty in understanding how these domains interact with each other at the block or lower levels. Standard verification tools and methods offer no reliable way to analyze the different domains together and to verify their interoperation comprehensively. Power-aware simulation is a good start, but there are too many combinations of power, clock, and reset domains to achieve sufficient coverage with simulation to verify the inter-domain interaction dynamically. The situation is made worse when design teams are integrating multiple legacy or third-party IPs that are unfamiliar and/or have limited-to-zero documentation. Hence, static domain analysis is essential to examine the design space thoroughly. In this presentation we will show how a “Multi-Domain Verification” (MDV) approach built on such a static analysis foundation can successfully address these challenges. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A Why the Future of IoT Is Blockchain Integrated 2:30PM - 3:20PM Shabeer Kirmani, Sparkster show more Description In this session we will look at blockchain technology and how it complements the IoT movement, helps fulfill IoT’s mission, and augments its power and capabilities. We will build an Arm mbed IoT live device on stage with simple building blocks, integrate it with a revolutionary blockchain network, and demonstrate a powerful use case – all CODELESSLY. Join us for this fun and interactive session. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
3:00pm Why Arm for Secure IoT - Sponsored By Arm 3:00PM - 3:30PM Andrew Frame, Arm show more Description For the  IoT market to grow and scale, the ecosystem needs to have confidence that the connected devices they are deploying are designed and built with security in mind. The IoT value chain needs to consider the full spectrum of security considerations, throughout the lifecycle of a device, from security analysis and threat mitigation, through to provisioning and updates. This presentation will review the market challenges and describe how Platform Security Architecture rallies the ecosystem to addresses them. We will show how the combination of Arm services and secure IoT frameworks can ensure the success of evolving IoT business models. Time Thursday, Oct 18 3:00PM - 3:30PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
3:30pm Advances in AR and VR with Arm based Technologies - Sponsored By Arm 3:30PM - 4:20PM Sylwester Bala, Arm show more Description Recent advances in AR and VR have led to some exciting developments in use cases and applications based on Arm technology. In particular Augmented Reality enables a wide range of new use cases and new businesses opportunities in the mobile segment. In this session you will learn about the key Arm based technologies and solutions for Augmented Reality using SLAM (Simultaneous Location and Mapping) as a case study. SLAM is the basis for use cases that range from tracking camera pose in mobile AR and VR to more complex high-level understanding of the real world seen through a camera. It is in the heart of AR headsets, AR smartphones and solutions for self-driving cars, unmanned drones, planetary rovers and a lot more other use cases. You will learn about the importance and challenges associated with the technology on current and future platforms. An insight on the system pipeline and what to take into consideration while building AR and VR solutions to achieve best in class end user experience. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Analyzing Machine Learning Inference with Arm Performance Tools 3:30PM - 4:20PM Stephen Barton, Arm show more Description Machine learning workloads can be complex for performance analysis and tuning, especially when the workload utilizes a mix of CPU, GPU and dedicated accelerators within the same system. In this talk, we will describe the performance analysis challenges faced by the different classes of ML users, and show how Arm has extended its performance analysis tools with a deep understanding of the ArmNN framework and ML processor. These new capabilities make it possible to right-size your machine learning algorithms for the chosen hardware platform, or to verify that a platform’s hardware capabilities are being exploited to the fullest extent possible. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Autonomous Vehicle Security: What Are the Design Concerns and Attack Vectors? 3:30PM - 4:20PM Lonnie Harrell, Arm show more Description The automotive industry is experiencing a revolution with the progression from connected to autonomous cars. These advanced systems bring increasing demands on compute performance, safety, and the highest levels of cybersecurity to more areas of the vehicle. Delivering these increasingly complex systems requires a range of capabilities in the IP. Crucial knowledge of system vulnerabilities as well as how they can be and have been exploited is paramount to secure development. Imperative market data analyzing cybersecurity, microcontroller, processor and system requirements, and merging trends drive the evolution of cybersecurity within SoCs. This session will cover topics surrounding these vital industry concerns. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Implementing a Bluetooth 5 Mesh Network 3:30PM - 4:20PM Michael Anderson, The PTR Group, LLC. show more Description The Bluetooth specification is continuing to evolve with the release of Bluetooth 5 and a new mesh networking model. Bluetooth is traditionally a short-range communications path. However, Bluetooth mesh is promising to change that. In this session, we will highlight the Bluetooth mesh technology, its applications, and show how it might solve some of the problems that have plagued Bluetooth in the past. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Optimizing SoC Functional Safety Mechanisms for Arm-based ISO 26262 Compliant Systems - Sponsored By Arm 3:30PM - 4:20PM Diego Botero Galeano, Arteris IP show more Description This session describes how to integrate Arm CPUs and CPU clusters into a SoC with safety goals while maintaining data protection throughout the system. By taking advantage of transaction protection provided by the armv8-R architecture and Arm Cortex-R5 and R7 CPUs, the network-on-chip (NoC) interconnect can protect this information using error-correcting code (ECC) until it is transmitted to its destination. Furthermore, functional safety mechanisms like EEC, parity bit, hardware duplication, and consistency checkers can be implemented throughout the NoC interconnect to augment system diagnostic coverage so that it can attain the ISO 26262 ASIL D safety integrity level. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Running Microcontrollers in the Browser 3:30PM - 4:20PM Jan Jongboom, Arm show more Description Embedded development seems stuck in the 1990s. Compiling and flashing a new application can take minutes, stepping through code requires an external debugging probe, and many tools are only available on Windows. What if we would be able to run a Cortex-M microcontroller straight in the browser? Development times would be much faster, simulation would be instant, and debugging would go through the normal browser development tools – all while still writing normal C code. Sounds insane?! The Mbed simulator makes it possible by cross-compiling Mbed OS to WebAssembly, offering peripheral simulation, networking interfaces, and even LPWAN radio support. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Understanding the Principles of a Secure Development Workflow - Sponsored By IAR Systems AB 3:30PM - 4:20PM Chris Jones, Secure Thingz; Shawn Prestridge, IAR Systems AB show more Description What are the aspects to consider when it comes to security during the development of a secure device-based product? What process should you have when provisioning a secure device, such as a secure MCU or secure element, to offer protection from remote attacks? Security best practices require choices in design, features, implementation, testing, configuration, and maintenance. There are a great many considerations including protocols, encryption, technology, software, APIs, platforms, and more. This session will cover what basic principles to consider, the workflow when developing a secure product, the process of securely manufacturing a secure product, and finally, the detailed mechanisms of implementing a secure product through its lifecycle. Second speaker: Shawn Prestridge Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C Utilizing Complex SoC’s for Innovative Software Architectures, Including Mixed Safety Criticality Support - Sponsored By Mentor, a Siemens Business 3:30PM - 4:20PM Jeff Hancock, Mentor, a Siemens Business show more Description The most recent system-on-chips (SoCs) have significantly more capability and associated complexity than previous generations. These chips include a significant number of dissimilar heterogeneous processing cores, multiple levels of cache, and various types of hardware-enabled separation mechanisms, etc. These capabilities enable the consolidation of disparate software elements onto a single chip, which can improve performance and save power, weight, and cost. However, it can be very difficult and daunting to implement a multifaceted software solution on a modern complex SoC. Effectively realizing such a runtime solution can be significantly enabled by the use of a comprehensive software platform that is tailored for the specific SoC. Such a platform should include support for Linux, real-time operating systems, a hypervisor, as well as enabling the boot, interprocess communication, and lifecycle management of the dissimilar software elements. Additionally, it should enable the use of the SoC hardware separation mechanisms for enabling the implementation and certification of mixed safety criticality or enhanced security solutions. This talk will present an example of a comprehensive software solution for the Xilinx MPSoC. The solution is also applicable to similar modern complex SoCs. Time Thursday, Oct 18 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210A
3:45pm Fluid Computing Defining the Next Evolution of IoT - Sponsored By Wind River 3:45PM - 4:15PM Pavan Singh, Wind River show more Description The Industrial Internet of Things (IIoT) is leading the transformation of mission-critical industries such as discrete manufacturing, oil and gas, renewables, and transportation. The next generation of IIoT will drive an evolution of the entire technology stack, from the mission-critical devices to cloud-scale applications. This requires the convergence of operational technology (OT) with information technology (IT)—for example, when connecting OT and physical assets to IT-like computing resources and systems. The promise of this convergence is to yield IT scale, innovation, and efficiencies to traditionally isolated or monolithic embedded systems. The challenge is that the underlying infrastructure within the operational domain typically has very different, and often more stringent, quality of service requirements, such as latency, safety, or reliability characteristics. In this presentation, Wind River® will outline the vision of fluid computing that is needed to enable the autonomous, software-defined world for critical infrastructure. The presentation will outline a gradual transition from today’s monolithic embedded systems to a completely software-defined world while leveraging the advantages of virtualization, standards, and open source. Time Thursday, Oct 18 3:45PM - 4:15PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
4:30pm A Data-first Approach to IoT with Pelion IoT Platform - Sponsored By Arm 4:30PM - 5:20PM Kazuki Ota, Arm Treasure Data show more Description IoT devices are everywhere, and so is their data. But the data is hidden inside a variety of those devices that may be deployed in many locations on-premise or in the cloud and connected across many types of networks. Until that data is extracted and organized, its value is limited. However, when the IoT data is harnessed, unified with non-IoT data from other enterprise and third party sources, it is ready for analytics that provide insights for business acceleration. This session will discuss how Arm’s Pelion IoT Platform provides connectivity management, device management, and data management for faster time to value of IoT. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C A More Secure IoT: Fact or Fake News? 4:30PM - 5:20PM Ed Sperling, SemiEngineering; Anthony Ambrose, Data I/O Corporation; Haydn Povey, Secure Thingz; Andrew Frame, Arm show more Description In the past year, Arm rolled out its Platform Security Architecture program and has introduced targeted security solutions, such as the Arm Cortex-M35P processor and Arm Musca-A1 test chip board. Multiple stakeholders including silicon vendors, OEMs, and software developers are collaborating to align a fragmented supply chain. But is the IoT more secure today than one year ago? Has the industry actually moved the needle when it comes to more secure IoT? This panel pulls together a range of perspectives to consider the progress made around IoT security and discuss possible areas that Arm and its ecosystem still could address. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Arm, Community and Cloud: Enabling ASICs for IoT 4:30PM - 5:20PM Mohamed Kassem, efabless.com; Mark Woods, Arm; Michael Wishart, efabless Corporation show more Description The emerging world of massively connected devices will be accelerated by advances in complex, mixed-signal integration through customized ASICs. Making these ASIC solutions broadly available and cost-effective, however, will require new approaches that use cloud-based collaborative development platforms and community business models. This talk will show how through secure, cloud-based platforms, all the resources and processes required to design ASICs and IP are offered in one place, enabling a worldwide network of developers and customers to collaborate, model, and verify custom SoCs. When custom SoC creation becomes less risky and more cost-effective, innovation is unleashed. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F Building Edge Applications on Microcontrollers 4:30PM - 5:20PM Cheng-Fu Tan, Arm show more Description Many have believed that machine learning was computationally infeasible on microcontrollers (MCUs). Recent works in algorithm and software engineering have reduced the computational requirement for deep learning significantly. This enables deep learning models to be deployed on affordable and simple systems, the MCUs. Intelligence on the edge will allow us to build smarter devices and serve new applications. In this talk, we will look at how to train a simple model in Tensorflow, then use uTensor and CMSIS-NN to deploy it on Mbed. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G Functional Safety – Where Are We Going and How Do We Get There? 4:30PM - 5:20PM Harry Foster, Mentor, a Siemens Business; Kurt Shuler, Arteris IP; Sanjay Pillay, Mentor, a Siemens Business; Ghani Kanawati, Arm show more Description Everything from cars to factories to the world around us is more intelligent and automated, and the decision-making is shifting from humans to machines. Semiconductors are at the center of this innovation.The concept of functional safety is not new, but with the move to autonomous driving, functional safety is in the spotlight for IC development. There is no debate around the importance of functional safety to drive down failures resulting from malfunctioning electronics. However, applying functional safety, with standards like ISO 26262, to complex supercomputers raises questions on how to get “there” – and what does “there” look like? Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E Introducing the Mbed Linux OS 4:30PM - 5:20PM Mark Knight, Arm show more Description As OEMs race to bring entirely new classes of connected product to market, engineers face many common problems that are best solved by an IoT operating system rather than by individual projects. Building on the success of Arm's Mbed OS platform for Cortex-M devices, Arm will shortly be releasing a developer preview of a new Linux based platform called Mbed Linux OS. In this session, we'll introduce the essential problems that the Mbed Linux OS will solve and how we'll work with the community to ensure developers are liberated to focus on creating unique applications rather than building their own essential infrastructure. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210D Securing The World by Starting With Your Application - Sponsored By IAR Systems AB 4:30PM - 5:20PM Shawn Prestridge, IAR Systems AB; Rafael Taubinger, IAR Systems AB show more Description Security can no longer be an afterthought or a patch. It needs to be there from the very beginning of the design of your application. By simplifying the configuration of security, from the Root of Trust and key storage on your secure device, to the creation of security profiles and projects, you will be able to take complete control of your security development workflow and ensure trust in your next application. This session will show how integrate security into an existing workflow of development, debugging, mastering and manufacturing. The session will go through the steps necessary for creating a secure application in a straightforward way, leveraging the secure hardware built into next-generation microcontrollers to provide the low-level trust anchors and secure services needed for trustworthy IoT solutions. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Executive Ballroom 210C StarlingX and Akraino Edge Stack: Building the Open Source Distributed Edge Cloud We Planted a Seed—Will You Help Us Make It Grow? - Sponsored By Wind River 4:30PM - 5:00PM Glenn Seiler, Wind River show more Description Distributed edge computing is one of the hottest technology trends in networking and telecommunications. If you’d like to be part of this trend, or just want to learn more about what it is, join us for this session. As critical infrastructure companies explore edge cloud opportunities, they need to ensure that their solutions will meet challenging requirements in areas such as scalability, security, ultra-low latency, telco-grade service uptime, small-footprint deployments, and streamlined operation. Recognizing that no single open source solution has existed to address all these challenges, OpenStack is hosting the StarlingX open source project to create an open source software platform to enable critical infrastructure applications and services to be deployed at the network edge. In addition, the Linux Foundation recently formed the Akraino Edge Stack open source project, which will include code from StarlingX. Wind River® is contributing technology from Wind River Titanium Cloud™, and we expect that this project will accelerate the industry toward a common open source edge platform that spans a wide variety of use cases. We invite you to join this exciting, groundbreaking work. Download the StarlingX source code, try it out, and join the discussion at this session and at starlingx.io. Time Thursday, Oct 18 4:30PM - 5:00PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
Close Filters
Day


Time



















Topic











Session Type






Pass Type