Semana Gorda: Dois Mini cursos

Caro(a) Colega,

confira os mini cursos e demais treinamentos programados para essa semana.

Aproveite! Abraço,



consulte sempre um engenheiro eletrônico


10 a 14/11/2014 – Mini curso: Protect your Hardware from Hacking and Theft

You put incredible time and effort into designing your hardware whether it’s a complete embedded system or a small power management subsystem. Do you want to make it easy for a competitor or unscrupulous contract manufacturer to reverse engineer your design and steal your valuable design intellectual property? You don’t need to. Some modern components have security and tamper protection features that can help you protect your design. This course provides a practical and implementation-oriented follow-up to a class given in December 2013 that introduced many high level security concepts. Continuing from those concepts, this class will describe implementation details and devices you can use to protect your design from reverse engineering or theft.

  • November 10 – Day 1: Stealing and Hacking Your Design is Easier than You Think
    This class will review key concepts from the December 2013 class and lay the groundwork for describing the implementation details you need to be able to select, program and design with devices you can use to protect your valuable IP. Protection from reverse engineering, copying, cloning, hacking and tampering will be the focus of the course.
  • November 11 – Day 2: How do you Implement Secure Hardware?
    This class will cover the key techniques used by modern devices to protect design IP from the most common threats. Starting with simple approaches to tamper protection, and then moving on to protection from copying and cloning, this class will begin to introduce key devices and features needed to successfully protect your design.
  • November 12 – Day 3: Secure Devices – An Overview
    This class will review several of the current devices that include security capabilities that can be used to protect your design from hacking and theft. Some MCUs, FPGAs and CPUs now include key security features that can be used to protect your design. Additionally, specialized peripherals, memories and accelerators are also available for adding protection. Examples of all of these devices will be described.
  • November 13 – Day 4: Protecting Your System in the Field
    Once your hardware is deployed it’s a target, either directly by “invasive” probing of the actual board or via network based attacks. Protecting your hardware from these threats requires additional levels of protection and more complex algorithms and techniques. Luckily manufacturers provide simplifying features and capabilities that can be used to protect field deployed systems.
  • November 14 – Day 5: An Example Implementation in Detail
    This class will pull together information from all the previous classes and illustrate the described techniques using a detailed example design. Several techniques outlined in the previous classes will be used to protect the example design from tampering, reverse engineering, copying and from network-based attacks on security keys and boot blocks, which are two of the most common and most aggressive forms of remote attacks.

11 a 13/11/2013 – Mini curso: Keep the Lights On: Safeguard LED Lighting with Proper Circuit Protection

Creating designs for LED lighting applications presents several challenges, including the need to protect the sensitive electronics and circuits against lightning, transient surges and electrostatic discharge (ESD). These electrical threats may jeopardize the safety of personnel and endanger the consumer’s ROI. If proper safeguards are not used, there could also be compliance issues with regulatory and safety standards related to overvoltage transients.

This Focus on Fundamentals course will help LED lighting designers better understand how to enhance the reliability and overall safety of LED lighting electronics through proper circuit protection and compliance with standards. Presented by Littelfuse, the global leader in circuit protection.

  • November 11 – Day 1: LED Lighting Market Overview & the Importance of Circuit Protection
    The future of LED lighting technology is certainly bright. In spite of fluctuations in the economy and the general lighting industry, LED lighting occupies a significant portion of the overall lighting market. To succeed in this market, electronics engineers must incorporate reliable circuit protection that deliver a strong ROI for their LED designs. This session addresses the LED lighting market growth and answers these questions: What is circuit protection? Why is it important to LED lighting?
  • November 12 – Day 2: Circuit Protection for LED Lighting Applications
    As the LED lighting market continues to grow across several application segments, the demand for both high-reliability and ROI continues to increase. Regardless of the LED application, circuit protection is needed to safeguard sensitive electronic circuits from electrical threats and meet industry standards for safety and reliability. This session addresses numerous circuit protection applications – from outdoor street lights to indoor area lighting – identifying the problems and best solutions.
  • November 13 – Day 3: Understanding LED Lighting Standards
    Compliance standards have been established by EnergyStar, DOE, IEC and other regulatory organizations, providing guidelines for manufacturers to follow when designing, producing and testing LED lighting designs. There are also global standards to keep in mind. Learn more about the various standards that designers should be aware of in order to be compliant. This session also includes time for questions and answers on related LED lighting circuit protection, applications and standards topics.


  • 11/11/2014 – Internet of Things (IoT) Costs, Connectivity, Resources and Software;
  • 12/11/2014 – Ten Oscilloscope Innovations You’ll Want that Didn’t Exist Three Years Ago;
  • 12/11/2014 – Ethernet Hardware Webcast;
  • 12/11/2014 – Wireless Sensor Networks Solutions;
  • 13/11/2014 – Four Keys to Securing Distributed Control Systems and the Industrial IoT;
  • 13/11/2014 – Optimizing Performance and Lifecycle of proprietary systems using Intel Architecture.

“Clicke” na figura abaixo, para ver a agenda completa.

Novembro 2014


Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do

Você está comentando utilizando sua conta Sair /  Alterar )

Foto do Google

Você está comentando utilizando sua conta Google. Sair /  Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair /  Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair /  Alterar )

Conectando a %s