Viewing 1 to 3 of 3
2017-10-24 ...
  • October 24-25, 2017 (8:30 a.m. - 4:30 p.m.) - Shanghai, China
  • October 30-31, 2017 (8:30 a.m. - 4:30 p.m.) - Cleveland, Ohio
Training / Education Classroom Seminars
The international standard titled DO-178C - Software Considerations in Airborne Systems and Equipment Certification is the primary standard for commercial avionics software development. This standard provides recommendations for the production of airborne systems and equipment software. Compliance with the objectives of DO-178C is the primary means for meeting airworthiness requirements and obtaining approval of software used in civil aviation products. This two-day seminar will introduce attendees to industry best practices for real-world software development and how to avoid common DO-178C mistakes.
2017-10-16 ...
  • October 16-17, 2017 (8:30 a.m. - 4:30 p.m.) - Troy, Michigan
Training / Education Classroom Seminars
Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for a large number of devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked into. So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices?
Training / Education Classroom Seminars
The automotive industry is the new "battleground" for cybersecurity. Following the path of desktops/laptops, tablets, and mobile phones, the automotive industry is now the "hot" area for both academic researchers and hackers. This will transform the automotive industry just as it transformed traditional information technology and the mobile markets; it is inescapable, but it can be beneficial and a well prepared company can find significant benefit in being a market leader. What does cybersecurity mean? Who is attacking and why? What must we change? What can stay the same? What is the larger organization's role in cyber?
Viewing 1 to 3 of 3