top of page


Arm Keynote : Building the future – Arm microcontroller solutions update

The majority of IoT solutions today are based on Arm based microcontrollers. But we keep improving our offerings, for example with strong ML capabilities. In addition to creating better processors, a great portion of the efforts are to make development on Arm easier, and to enrich the Arm ecosystem support. In this presentation, we will provide an overview of various new technologies and solutions that we have been working on, including hardware IP, software, toolchains, utilities.

Hitex: Managing sensor data with the SDS Framework and  CMSIS Stream

 An IoT device is often required to manage streams of data from local sensors. This can present a range of challenges due to limited device resources, real-time requirements and synchronisation of multiple algorithms.
The ARM Synchronous Data Stream (SDS) Framework is designed to address the challenges of real-time, efficient, and synchronized data stream processing in microcontroller systems. Synchronous Data Stream (SDS) Framework provides data stream management through a standardised API along with helper tools to develop and optimise embedded applications that integrate DSP and ML algorithms. This framework may be used stand-alone, but also in combination with the new CMSIS-Stream specification that efficiently combines algorithms using a “compute graph” to optimise data flow.


Keil : MLOps development flows for AI applications using Keil Studio and the cloud

This workshop provides an introduction on how to work with Keil Studio and the Arm Virtual hardware. In this workshop we will present how to setup the new toolchain and show how sophisticated applications can be built and debugged with the AVH both locally and as part of a CI/CD build process.

  • Tool installation: VS Code extensions

    • Test of installation with simple "Hello world" running on AVH

  • Keyword spotting (KWS) Application

    • Explain the application and the problem.

    • Run OOB with pre-recorded WAV file (baked in)

    • Record your own WAV file with your PC

    • Send this WAV to the model using Virtual Streaming Interface

  • Observe how the project changes (streaming input vs. static buffer)

  • GitHub CI/CD Flow using AVH

  • Live AVH video streaming using PC Camera live feed with object detection in the AVH model


Anglia : Introduction on Edge AI: The Analog Devices MAX78000

This workshop provides a clear introduction to Edge AI and Machine Learning for Edge IoT devices. During the workshop we will cover the following points

  1. What is AI? 

  2. What is ADI selling

  3. Edge AI (Why/How/…)

  4. Maxim SDK

  5. Toolchain

  6. AI Training

  7. Q & A session

The workshop will include use cases and working example demos.

Hitex :Cryptography and secure communications for IoT devices

 This workshop will provide an introduction to essential cryptographic primitives using the open-source mbedTLS library. The features covered will include.

  • Symmetrical Ciphers

  • Hashing Algorithms

  • Message Authentication Codes

  • Random Number Generation

  • Public Key Cryptography and the Public Key Infrastructure

We will then move on the look at establishing a secure communication channel using the Transport Layer Security (TLS) protocol.


Hitex : Developing ML models for Arm Cortex and the Ethos NPU

This workshop will provide a beginners guide to adding ML algorithms to Cortex-M based microcontrollers. We will also introduce the Ethos Neural Processing Unit (NPU) and show how to convert ML models to run on the Ethos NPU

  • MDK and Arm Virtual Hardware

  • Creating a simple Neural Network

  • Convolutional Neural Network

  • Introduction to the Ethos NPU

  • Compiling the models for Ethos

  • Using Pre-Trained Models

  • CMSIS-Streaming for data acquisition

All of the workshop examples will be provided on the conference USB stick.


CSA : Overview of Functional Safety Development and Certification

This workshop  will provide an overview of  functional safety concepts, typical standards and certification approaches. Key functional safety requirements relating to embedded software will be summarised, and general  lessons from typical product certifications discussed.


Hitex : Dynamic Software Test Made Easy

Software testing is indispensable for safety systems, ensuring they function flawlessly to protect lives and assets. However, achieving comprehensive testing in safety-critical software can be arduous and time-consuming. Safety systems must account for a multitude of real-world scenarios and potential failures, demanding exhaustive test cases. Efficient testing is therefore essential and benefits from a high level of automation that includes the generation of test harnesses.

In this workshop we will present the theory and practice of unit and component test from coding up to automated test report generation. These examples introduce the new TESSY version v5.1. We will show the new Test Cockpit View supporting both, the Code Access Coverage and the Hyper Coverage. The workshop will also discuss advanced testing methods such as mutation testing that helps validate the existing test suite
All examples are available for the attendees after the event.


LDRA: Safety and security: An integrated development approach

The development of embedded software has seen dramatic changes in recent years. The rise of functional safety standards and the disruption to development practices in their wake. A near exponential rise in embedded software content, and corresponding increases in software engineering complexity.  And now, connected cars, medical devices, and industrial plant are all falling under the spotlight with their vulnerability to attack from malicious hackers. 


Although cybersecurity is important, there are always commercial considerations too. The most secure device in the world is useless if the overhead involved in its development prices it out of the market.


This workshop will assert that no single software or hardware technology offers a “silver bullet” to guarantee security, and that no connected system is ever going to be both useful and entirely impenetrable. It will argue that safe and secure application code has a critical part to play in a “defence-in-depth” approach that also leverages protection mechanisms offered by underlying hardware and software.


It will promote a development approach that integrates security into the more familiar functional safety development processes, concluding that such an approach presents a commercial optimal way to ensuring levels of safety and security that are proportionate to risk.

bottom of page