This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
The Digi-Key Continuing Education Center, presented by Design News, is a well-established program with an extensive archive of content at your disposal. View any previous course by simply navigating through previous semester content and selecting the course of your choosing.
The CEC will get you up to speed quickly on a host of technologies you've been meaning to study via a series of 45-minute online lessons taught by our faculty of expert tutors.
The ARM microcontroller’s second USART will be used to interface to a smart LCD touch display. Today, we will generate code to enable the USART and establish a logical bidirectional communications channel to the touch display.
We begin by translating our hardware components into logical elements. Data paths to and from the ARM microcontroller will also be defined. We will use a J-link PRO for debugging and programming. An alternate debugging portal consisting of one of...
The best way to remove defects is to not have them in the first place. In this session, we will explore the different design processes that developers can use before implementation in order to minimize the opportunities for defects to enter the...
It’s important to understand what errors, defects and bugs are and the deficiency most development teams have in accepting bugs. In this session, we will explore not just the definition but how bugs are handled and should be handled. We will...
RTOSs can still play an important role in TrustZone applications. So how does a developer use an RTOS when there is a secure and unsecure world executing on the processor? In this session, we will explore several different options developers...
Security starts with developing a Chain of Trust. In this session, we will walk developers through how a TrustZone application starts and the steps necessary to develop a Chain of Trust. Attendees will also learn how the secure zone affects...
In this session, attendees will dive in and learn how to create their first application using TrustZone. Developers will be able to follow along using Keil MDK to simulate their application or they can use available TrustZone hardware. Attendees...
Once a developer understands the methods and strategies used to a secure a system, they can more appropriately decide how to use the technology available to them. In this session, we will dig deeper into the armv8-M architecture and the TrustZone...
Security is often misunderstood by embedded systems engineers working with microcontrollers. In this session, we will explore embedded system security concepts that every IoT developer needs to know. We will start with what security is and the...
Now that we have our communication I/O designed, we will build and test a representative solution for our Industrial Internet of Things design in our final class. We also will look at how we can implement the safety and security features that will...