Configuration & Productivity Tools
Explore how configuration and productivity tools within CodeFusion Studio enable system tools, accelerate technical discovery, and enable efficient data flow through the system.
At embedded world North America, Analog Devices gave users a live look at a brand-new embedded software development platform, open tooling, integrated security, and more. Watch our videos below to learn more about the technology ADI showcased to accelerate embedded development.
Tanmaya Mishra
Senior Engineer at Analog Devices
Machine-Learning Based Anomaly and Intrusion Detection for Cyber-Resilience in Microcontrollers (PDF)
Regulations, particularly in automotive and medical devices, are continuing to emphasize intrusion detection as a key requirement for addressing cybersecurity. In this presentation, we provide an overview of a proposed cybersecurity architecture and software stack, for microcontrollers. The cyber-resilience security architecture includes a microcontroller-based Intrusion Detection System (IDS) capable of rapidly detecting a broad range of attacks in real-time with high detection rates and low false positives. We present an overview of an IDS approach using IoT-optimized machine learning algorithms to classify execution of software tasks/processes/applications as normal or anomalous in real-time and the resilience architecture it runs within.
Alan Hehir
Director of User Experience (UX), Software & Security Group
Human Factors and User Interface Design for Embedded Systems
Embedded and mobile devices are a part of life for billions of users today. These devices will help us communicate and relate in better ways and become more creative and more efficient in our working lives. From a user interface perspective, we must shift the design perspective away from technology as the end all to usability for these devices. This course will review human factors and user interface design techniques for embedded and mobile technology interfaces, including innovating, interaction design techniques, prototyping, controlling complex functions, information access, using images, and evaluation. Several case studies will be used to support the techniques presented.
Explore how configuration and productivity tools within CodeFusion Studio enable system tools, accelerate technical discovery, and enable efficient data flow through the system.
Attendees got a chance to try out key features of CodeFusion Studio™ ranging from heterogeneous debug to ELF file explorer, and pushed code to an ADI MCU in minutes to experience how it can accelerate their embedded development.
Learn how projects can be profiled for size optimization, how the final compiled firmware image can be verified visually to ensure the right compilation flags were used when building the image, and exactly how much flash or SRAM a function or variable uses, including where it has been placed in memory.
Discover how CodeFusion Studio™ facilitates heterogeneous application & system development, debugging, and optimization from a unified interface. Bringing this set of capabilities together accelerates developer time to market and is extensible via OpenAPI integration with 3rd party solutions and platforms for developers, partners, and customers.
Witness the critical role security plays in our modern energy infrastructure. Our energy systems demo with data provenance shows how to deploy ADI’s Data Trust Framework at critical endpoints to unlock provenance capabilities at the source of where your data is created. In EV charging infrastructure, it establishes a highly secure, immutable record of energy transactions for improving clean energy utilization, verifying critical transactions, and analyzing conditions that may affect energy distribution. Our Trust Framework can enable further extraction of value from data being generated at the Edge.
Learn about ADI’s cyber-resilience security architecture that includes a microcontroller-based IDS capable of rapidly detecting a broad range of attacks in real-time with high detection rates and low false positives. One of the most security-sensitive industries is medical, where we show how to further enhance cyber-resiliency at the edge with ADI’s cyber-resilience architecture. We are launching our solution on ADI’s study watch, taking advantage of IoT-optimized machine learning algorithms to classify execution of software tasks, processes, and applications as normal or anomalous in real-time.
Available as an extension within CodeFusion Studio, ADI’s Trusted Edge Security Architecture auto-compiles your security subsystem across varying MCUs and security platforms while maintaining a common security API for development. Dive deeper into scalable security that reduces time-to-market for new product designs by making it easy to leverage a single security API when switching MCUs or Security platforms.
Trusted Edge Security (PDF)
The shift towards extending IP connectivity to the edge is driving the requirement for integrating secure 10BASE-T1L Ethernet connectivity into resource-constrained embedded devices. Visit our industrial network demo to see multiple embedded nodes running Zephyr RTOS firmware interconnected over 10BASE-T1L, securely passing sensor data and I/O commands between devices, utilizing IIoT protocols like TCP/IP, MQTT, and TLS for security.
Learn how ADI's leadership in industrial connectivity, paired with the power of the Zephyr RTOS embedded software ecosystem, allows customers to rapidly develop secure networked devices.
Zephyr® is a proven RTOS ecosystem, created by developers, for developers, and ADI is an active contributing member of the project. Zephyr recently passed more than 100,000 contributions and launched its 3.7 Long Term Support (LTS) Release. Learn how to contribute to this open-source project, participate in discussions, and access vibrant community resources.
Embedded Development Using Zephyr & Open Source Tooling (PDF)