Leading the Embedded World
Green Hills Software at embedded world
Overview

Green Hills Software's embedded software technology thought-leaders will present technical sessions in the Exhibitor Forum, embedded world Conference and demonstrate optimised solutions on our stand (Hall 4, Stand 325). See compelling solution demonstrations that tackle real-world challenges. Experience the power of proven products and expertise with the support from our customers and partner ecosystem.

Click the button on the right below to register for your free-of-charge exhibition ticket in advance (saving of €25.00 on-site). A separate ticket must be purchased for the conference—see link below.

Featured Technologies
  • RTOS & Hypervisors for Microprocessors & Microcontrollers
  • Mixed-Criticality Consolidation
  • Safe & Secure Virtualisation
  • Signal-to-Service Translation
  • eSync OTA Updates and AWS Cloud
  • Radar Detection
  • Computer Vision
  • Zonal-Based E/E Vehicle Architecture
  • High-Performance Graphical Interfaces
  • Virtualised Android
  • Advanced Software Development Tools for Safety-Critical Embedded Devices
  • Secure Credential Management, Security Appliances, Supply Chain Security, Device Lifecycle Management
Our Partners

Brought to you in cooperation with our partners at Arm, Altia, Excelfore, Google, Smart Eye, Synopsys, and others. Running on the newest processors from Infineon, Microchip, NXP, Qualcomm, Renesas, ST and TI.

Exhibitor Forum (Hall 5)

Green Hills Software is participating in embedded world's Hall 5 Exhibitor Forum, offering two sessions open to all attendees on the show floor in Hall 5-210.

Is Your Safety Case Complete? An Examination of the Process of Developing Safe Systems
Chuck Brokish, Director of Automotive Business Development
Tuesday, April 9 | 10:30 am - 11:00 am

Safety-critical systems are present across many industries. These systems rely on real-time, deterministic execution to ensure critical operations are performed correctly. Their requirements are multi-leveled, starting with the system requirements and continue through the development process and validation.

We will discuss the foundational capabilities required to build upon for critical systems; we'll extend that to the development process and the tools and expertise to accelerate the development and validation.

We will propose an approach to develop software that never fails and discuss what is entailed to ensure that not only does the system not have bugs, but the system does what it is supposed to do no matter if the end market is industrial, medical, automotive, aerospace, or any other critical industry.

Chuck Brokish
When Evolution Isn’t Enough: Revolutionizing Software Development
Chuck Brokish, Director of Automotive Business Development
Wednesday, April 10 | 10:30 am - 11:00 am

There are many tools available in the industry to aid in software development. Some of these tools are used before silicon is even available to run the software and some of them are used for application development within well-defined embedded systems. In many cases, these are very different tools which come from different vendors, require very different skills, and enable very different viewpoints into the system.

It is possible to create consistent visibility into systems from initial concept to final product. Making such tools compatible by using a common interface enables software teams to span the development process and leverage silicon-level visibility at application-level development. Such capability reduces convolution of development platforms, maximizes the developers’ efficiency, and gives revolutionary visibility into embedded software operation, all contributing to a drastic reduction in time to market.

Conference Classes
Modern C++ Thread and Memory Models
Dr. Carmelo Loiacono, Field Applications Engineer
Tuesday, April 9 | 9:30 am -1:00 pm | Class 6.2

Embedded operating systems provide the foundation for managing system resources and enable the concurrent execution of multiple tasks on resource-limited hardware platforms. This class focuses on two key aspects of embedded system development: embedded operating system architectures and the use of the modern C++ thread and memory models. We will discuss the main embedded operating system architectures and analyze their operation and main features, highlighting advantages and disadvantages with real use case examples. We will also cover scheduling and multi-threading techniques by highlighting the features of modern C++ when used with embedded operating systems.

Dr. Carmelo Loiacono
C++ and Modern C++ for Embedded Development
Dr. Carmelo Loiacono, Field Applications Engineer
Tuesday, April 9 | 2:00 pm - 5:30 pm | Class 6.5

Embedded systems are becoming more complex, requiring higher performance and more features, leading to an increased demand for modern programming languages such as C++. In this class, we will discuss the use of C++ and modern C++ for embedded development, focusing on its benefits and challenges.

Conference Sessions
A Comparative Study of Interrupt Management Methods on Embedded Virtualized Systems
Dr. Carmelo Loiacono, Field Applications Engineer
Wednesday, April 10 | 1:45 pm - 2:15 pm | Session 3.5, Virtualization

As embedded systems become increasingly complex, virtualization is being used more frequently to manage these tasks. Virtualization is the process of running multiple operating systems on a single hardware platform. Each operating system runs as a guest, with its own set of resources, including interrupt handlers. Interrupts are used to signal the CPU to interrupt its current task and handle an external event. Interrupt management is a critical component of embedded systems, as it affects system performance and responsiveness. However, virtualization also introduces overheads, particularly in interrupt management. Interrupts are a critical component of embedded systems, as they enable communication between the system and external devices. In this session, we compare different interrupt management methods on embedded virtualized systems to determine which is the most efficient one depending on the system requirements.

Principles of High-Assurance Security Engineering
Andre Schmitz, Senior Field Applications Engineer
Wednesday, April 10 | 2:45 pm - 3:15 pm | Session 4.5, Architectures & Technology 2

For decades we have been trying to improve the cybersecurity of our computers and embedded devices. But still every month we hear news about security breaches into smart phones, medical devices, cars, corporate servers or computers in public authorities. We add additional firewalls and security layers and encrypt our communication, but still the hackers find their way into the system. What are we doing wrong?

Typically, the root cause is that security is usually added as an afterthought into a system not designed for security. This does not work. We need to think about the security of the embedded system from the start. This is mainly done by selecting the right the software architecture and following the correct development process. If we look at products where the highest security is mandatory, we find a certain set of principles being applied to the software architecture and the engineering process which are proven to result in high assurance software. This session will discuss how a process for high assurance security engineering can help to prevent cybersecurity problems.

Andre Schmitz
Meet Us

To request a meeting with a Green Hills representative, click here. Once you have submitted the form, we will contact you to confirm the meeting appointment.

Click here to register for your free-of-charge exhibition ticket in advance (instead of €25.00). A separate ticket must be purchased for the conference.

For information on all the classes and sessions in the embedded world conference and to register, click here.