19-08-2025 | Wireless Logic | Semiconductors
Wireless Logic will be speaking and exhibiting at Microelectronics UK (24-25 September, London). The event is focused on the microelectronics, semiconductors, photonics and embedded systems industries and will highlight the UK’s expertise in R&D, design innovation and advanced manufacturing.
At stand F11 in the Embedded Systems UK section, company experts will be available to discuss connecting the physical and digital worlds through seamless, secure, and scalable IoT solutions.
As IoT becomes paramount to operations across industries, product teams face growing pressure to design devices that satisfy customer needs while keeping pace with fast-moving regulations, cyberthreats and technical innovation. In a complex and competitive connectivity landscape, building devices to last takes meticulous planning from the very start.
“IoT devices must be designed to not only meet the demands of connectivity, but also withstand emerging security threats, evolving global regulation and ensure reliable operation,” said Toby Gasston, Mobile Core Product Lead at Wireless Logic. “At this year’s event, we’ll explore how resilient IoT devices are the result of deliberate decisions made early in the design process.”
At the event, Gasston will deliver two sessions on the Embedded Systems UK Stage, providing engineers, designers and developers a clear view of how early design choices can shape the long-term success of connected products.
10:00 BST – Welcome and Opening Presentation
Using real-world examples, Gasston will guide the audience through a familiar but flawed device development path – where rushed decisions lead to security gaps, integration challenges and scalability problems. Drawing on real-world examples, he will show how early, consultative design can prevent costly mistakes and deliver resilient, scalable deployments.
10:20 BST – Panel Discussion: Embedded Cybersecurity in the Age of IoT
Moderated by Gasston, this panel of experts will explore how to identify IoT attack surfaces and embedded vulnerabilities, the potential of machine learning for threat detection and response and different strategies for ensuring long-term protection.