December 20 - Day 5: Mitigation Strategies
Continuing Education Center 12/20/2013 Post a comment This class puts everything from the previous four days together. We will review general security mitigation principles and then learn how to apply knowledge of SCADA specific threats, vulnerabilities, and attack methods to formulate pragmatic and efficient mitigation strategies that are safe for SCADA systems and tailored to their environment.
December 19 - Day 4: Attack Methods
Continuing Education Center 12/19/2013 Post a comment Once you know the threat sources and the vulnerabilities within your own systems, knowing the methods of how these systems can be attacked is a key component to formulating a pragmatic and efficient mitigation strategy. This class will look at the entire anatomy of an attack from start to finish and how hackers go about attacking SCADA systems specifically.
December 18 - Day 3: Vulnerabilities
Continuing Education Center 12/18/2013 Post a comment From people to processes to technology, vulnerabilities are the reason security is needed. Unfortunately, the sheer number of vulnerabilities in existence makes dealing with them a daunting task. This class helps students understand vulnerabilities by examining the root cause of vulnerabilities from a high level and then provides strategies to help reduce the mitigation effort by grouping them into common mitigation categories.
December 17 - Day 2: Threat Sources
Continuing Education Center 12/17/2013 Post a comment Before you can protect your systems from a threat, you must know what the threats are. This class takes a comprehensive look at the different threat sources that could affect SCADA operations environments, along with their motivations and objectives.
December 16 - Day 1: State of the Industry
Continuing Education Center 12/16/2013 Post a comment This class will take a high level look at the evolution of SCADA systems over the past decade and compare traditional IT networks with SCADA networks in terms of their security and mitigation differences and pitfalls. We will then review significant exposures and incidents that have affected SCADA systems.
December 6 - Day 5: Example Designs
Continuing Education Center 12/6/2013 2 comments This class will pull together information from all the previous classes and illustrate the described techniques using several example designs from different market segments and application areas. This will solidify your understanding of both the key security concepts and the various design techniques illustrated in the course.
December 5 - Day 4: Protecting Your Embedded System in the Field
Continuing Education Center 12/5/2013 200 comments Once your embedded system is deployed it is a target, either directly by “invasive” probing of the actual board or via network-based attacks. Protecting your systems from these threats requires the use of advanced techniques like establishing a Root-of-Trust, secure remote update, and/or a secure boot process.
December 4 - Day 3: Cryptographic Techniques to Protect Your Embedded System
Continuing Education Center 12/4/2013 234 comments Modern techniques for security and authentication use a few key cryptographic concepts and algorithms to protect data and processes in embedded systems. This class provides an introduction to the most common techniques and standards, so you can better understand how these approaches may be used in your designs.
December 2 - Day 1: Security Threats to Your Embedded System
Continuing Education Center 12/2/2013 290 comments This class will identify the most common security threats to network-connected, embedded systems all along the system lifecycle. We will start with the component supply chain and follow a typical embedded system all the way to system decommissioning, while identifying many common security threats along the way.
November 22 - Day 5: Writing a Memory-Mapped Driver for a Timer
Continuing Education Center 11/22/2013 303 comments This session will pull together all the methods from the sessions by looking at how a reusable, configurable timer driver can be developed. The session will quickly move through setting up the driver and then the implementation of a memory-mapped timer driver that achieves these objectives.
November 21 - Day 4: Organizing & Developing Reusable Code
Continuing Education Center 11/21/2013 389 comments This session will explore techniques that can be used to develop code that can be reused across multiple applications. In order to accomplish this, software implementation will be explored in order to understand how a project should be organized and source modules developed in order to accomplish this feat.
November 20 - Day 3: A Review of C Programming Techniques
Continuing Education Center 11/20/2013 341 comments This session will dig into the details of writing embedded software using C. A review of using pointers and a look at commonly misused keywords will be examined. A brief discussion on how to control scope will also be discussed. These techniques will be used in later sessions when memory-mapped devices are explored.
November 19 - Day 2: Developing a Software Architecture
Continuing Education Center 11/19/2013 319 comments This session will introduce concepts on how to design and develop embedded software architectures. Starting with an exploration of the different diagramming techniques for defining the architecture, the session will also examine strategies that can be used to design real-time systems architectures and how they get to the final code implementation.
November 18 - Day 1: Introduction to Embedded Software
Continuing Education Center 11/18/2013 426 comments This session will introduce what an embedded system is and the skill sets necessary to develop embedded software. It will then dive into some highlights of common misconceptions and problems with developing embedded software by presenting the attendee with tips and tricks for developing embedded software.
November 6 - Day 3: MiWi Node Hardware
Continuing Education Center 11/6/2013 242 comments Today’s lecture will describe the embedded hardware necessary to realize a minimal MiWi node. MiWi Stack firmware segments associated with the node’s hardware components will also be discussed.
November 5 - Day 2: ZigBee vs. MiWi
Continuing Education Center 11/5/2013 201 comments This lecture will lay out the major features that make up the ZigBee protocol. We will also describe MiWi and what makes it different from ZigBee. The remaining class time will involve understanding the MiWi Stack.
November 4 - Day 1: What Is 802.15.4?
Continuing Education Center 11/4/2013 231 comments Today’s lecture will demystify the 802.15.4 protocol by building a base two-node 802.15.4 peer-to-peer network. Hardware and firmware concepts necessary to facilitate communications between the two nodes will be examined in detail.
October 25 - Day 5: Connected World
Continuing Education Center 10/25/2013 278 comments In this final class, we will discuss a wide variety of emerging wireless applications and their requirements for network performance. In addition, we will wrap up any loose ends from the previous days’ lectures and answer any remaining questions.
October 23 - Day 3: Why MIMO & OFDM?
Continuing Education Center 10/23/2013 260 comments This class will examine wireless performance issues, such as throughput, range, and capacity. You will learn about the advantages of MIMO and OFDM over legacy wireless technologies.
October 22 - Day 2: Morphing of WiFi & LTE
Continuing Education Center 10/22/2013 284 comments Today's class will discuss how WiFi is transforming from its humble beginnings as a home networking technology to carrier-grade wireless infrastructure operating side by side with 2G/3G and LTE networks.
October 21 - Day 1: WiFi & LTE Standards
Continuing Education Center 10/21/2013 339 comments This opening session will provide an overview and history of today’s key wireless standards: IEEE 802.11 (WiFi) and 3GPP Long Term Evolution (LTE). Attendees of this class will learn about state-of-the-art wireless radio technologies and how they evolved over time. You will become familiar with the wireless standards from IEEE and 3GPP.
October 11 - Day 5: The Future & Its Challenges
Continuing Education Center 10/11/2013 159 comments As the Internet of Things continues to evolve or perhaps undergo revolutionary change, the challenges for implementers at all levels will continue to grow. To wrap up our week, we will peer into the possible future of the IoT and what major challenges engineers and system architects will still face.
October 10 - Day 4: Standards
Continuing Education Center 10/10/2013 231 comments One daunting challenge that is being faced now is the lack of an Internet of Things standard. As IoT can consist of many different applications as well as communications capabilities, there will eventually be a wide range of standards, perhaps under a single framework. We will look at the current standards efforts by various bodies as well as the standards that currently apply to certain applications or implementations.
October 9 - Day 3: Application Drivers & Their Challenges
Continuing Education Center 10/9/2013 234 comments As the Internet of Things has actually been defined and conceptualized for many areas of applications, there are many configurations that are driving the future of IoT. We will look at those drivers and their unique needs, from application level down to the physical layer.
October 8 - Day 2: Topologies & Channels
Continuing Education Center 10/8/2013 243 comments The various configurations of the IoT call for a myriad collection of communications channels, each with their own limitations of available network topologies. In this lesson we will look at networking principles and the mix of topologies that make up each piece of the overall IoT.
September 27 - Day 5: A Review of Your Designs
Continuing Education Center 9/27/2013 281 comments This class will cover designs suggested by students and go through an example review of the design requirements to identify a "best fit" from the products we have seen during the week. It will cover designs that are common to multiple students to provide the most valuable suggestions.
September 26 - Day 4: Application Examples
Continuing Education Center 9/26/2013 256 comments This class will cover several classes of common applications targeted by specific manufacturers to try and identify the strengths of specific product families. It will provide some background used in the next class that covers your designs.
September 25 - Day 3: Tool Support
Continuing Education Center 9/25/2013 320 comments The addition of a programmable processor means that some new tools need to be added to the standard FPGA tools flow. This class will examine these new tools and will show how they are used within the FPGA development environment.
September 24 - Day 2: Architecture Details
Continuing Education Center 9/24/2013 399 comments This class will go into some specific architectural details so we better understand the strengths of the various product families that feature embedded processors. Other features that help "round out" the processor (memory interfaces, peripherals, and programmable fabric) are also covered.
September 13 - Day 5: Other Clean Energy Ideas
Continuing Education Center 9/13/2013 201 comments The mainstream energy industry does acknowledge other types of energy that can be used to create clean and sustainable solutions. We’ll not only review the established norms, fringe ideas, and conjecture, but we’ll also discuss how thinking about energy is changing and some outside-of-the-box ideas.
September 12 - Day 4: Geothermal
Continuing Education Center 9/12/2013 178 comments Geothermal is gaining acceptance and becoming a more popular type of energy system. Some parts of the world are well suited for it, and it comes cheaply and easily. Other places are still viable, but we have to work a bit harder to gain the benefits. We’ll review ground sourced, well sourced, and deep well sourced heat pumps.
September 11 - Day 3: Wind Power Systems
Continuing Education Center 9/11/2013 256 comments Wind is one of the first types of energy systems ever harnessed to supplant animal and people-powered functions like pumping water and grinding grains. Still useful for mechanical action, they are now a focus of electricity generation. We’ll discuss aero-mechanical wind systems and aero-electrical wind systems.
September 10 - Day 2: Photo-Thermal Systems
Continuing Education Center 9/10/2013 197 comments Extracting heat from solar radiation is a useful and beneficial function, especially in colder climates. We’ll examine the types of photo thermal panels, principles of operation, and orientation and tracking.
September 9 - Day 1: Photo-Voltaic
Continuing Education Center 9/9/2013 287 comments Solar is the most popular and widely used energy source, and photo-voltaic panels are the most widely deployed. We’ll review the types of panels available, solar panel technology, and principles of operation.
August 26 - Day 1: Overview & RTOS / Multitasking Basics
Continuing Education Center 8/26/2013 390 comments We will look at the basic needs for a multitasking application and will begin work on a simple example. We will set up our application requirements and look at ways that we can meet these needs through two methods: a simple, software-based state machine and a simple, non-prioritized round-robin.
August 12 - Day 1: The Brush DC Motor – an Overview
Continuing Education Center 8/12/2013 294 comments This discussion describes the brush DC motor, and how it differs from a brushless DC motor, a stepper motor, and other motor types. In this discussion, we’ll break down the brush DC motor, showing exactly how it operates. We will review manufacturer motor specifications, speed/torque curves, motor sizing, and power ratings. We will discuss motor commutation using brushes.
In a bid to boost the viability of lithium-based electric car batteries, a team at Lawrence Berkeley National Laboratory has developed a chemistry that could possibly double an EV’s driving range while cutting its battery cost in half.
Using Siemens NX software, a team of engineering students from the University of Michigan built an electric vehicle and raced in the 2013 Bridgestone World Solar Challenge. One of those students blogged for Design News throughout the race.
Robots that walk have come a long way from simple barebones walking machines or pairs of legs without an upper body and head. Much of the research these days focuses on making more humanoid robots. But they are not all created equal.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.