This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
The Digi-Key Continuing Education Center, presented by Design News, is a well-established program with an extensive archive of content at your disposal. View any previous course by simply navigating through previous semester content and selecting the course of your choosing.
The CEC will get you up to speed quickly on a host of technologies you've been meaning to study via a series of 45-minute online lessons taught by our faculty of expert tutors.
The OpenMV IDE uses MicroPython and a collection of libraries to allow a developer to quickly and easily develop and deploy machine vision applications. In this session, we will learn how to write an application for the OpenMV camera. Attendees...
The ability for a system to “see” can dramatically increase its capabilities. Machine vision has traditionally been not only expensive, but also has required a niche expertise. In this session, we will explore machine vision and look at the...
For our last class, we will look at how we can use data science to gather our models for training and testing then use those data sets to carry out those tasks. We will cover some of the principles of how to divide our data sets between the...
Now that we have acquainted ourselves with TensorFlow and the development environment, in this penultimate class we will look at how we can take the ANN definitions we worked with early in the week and program them into our own networks.
Implementing a secure solution from scratch can be intimidating, but the fact is that developers don’t have to start from scratch. There are several secure frameworks and solutions already available that developers can leverage in order to...
One common mistake that teams often make when attempting to secure their systems is to try to bolt security on at the end. A security threats analysis must be performed early in the development cycle in order to appropriately identify the assets...
One of the biggest challenges facing embedded software developers that need to implement security is understanding how much security is needed. It’s not uncommon to dramatically undershoot or overshoot the right amount which either leads to...