Electronics & Applications 2025
23 - 25 September 2025
|
Jaarbeurs Utrecht, Stand 9B056
Where Electronics and Application design and Test meet their destiny: Manufacturing, Stand 9B056

In this year's edition of the E&A trade fair, Logic Technology will be prominently showcase embedded development tools, software components and computer modules in the Development Paviljon .
Showcased Logic Solutions:
- Embedded Security compliant to RED / CRA
- Software and System Structure Decomposition and Analysis
- UI Design Framework
- Scalable CoMs
- Software Test, Quality and Certification Tools
- Embedded Middleware for Datamanagement and Communication
- Development Tools and Debuggers
- Boundary Scan tools
Order your free entrance ticket now and let us know you are coming so we can reserve time to catch you up on the latest innovations in embedded cyber security, UI-design tools, CoMs, Test, Quality & Certification Tools, middleware, debuggers and our partner for the Benelux: SEGGER.
Embedded Software Seminar @ E&A 2025
Logic Technology is the driving force behind the FHI embedded Software Cluster, because we believe that it is software that drives innovation in electronics. One of the activities the embedded software cluster is involved in is sharing of knowledge. The programming of the Embedded Software Seminar this year puts emphasis on the EU RED directive with focus on EU CRA, embedded system security by software and GenAI for system engineering.
Our contribution:

A practical approach for developing secure and EU CRA ready embedded systems
This seminar, presented by Giovanni Alberto Falcione, CTO at our partner exein SpA, offers a hands-on roadmap for developing secure embedded systems that are not only resilient to modern threats but also aligned with the evolving requirements of the EU Cyber Resilience Act (CRA). Through real-world examples and practical guidance, we will explore how to embed security throughout the product lifecycle, from design and development to deployment and maintenance, while ensuring regulatory readiness. Attendees will gain actionable strategies for implementing security-by-design principles, managing software supply chain risks, and leveraging automated tooling to streamline CRA compliance. This talk is tailored for engineers, security leads, and product managers working at the intersection of embedded development and regulatory oversight.
Showcasing partners





Cookie Consent
We use cookies to improve your experience on our site. By using our site, you consent to cookies.
This website uses cookies
Websites store cookies to enhance functionality and personalise your experience. You can manage your preferences, but blocking some cookies may impact site performance and services.
Essential cookies enable basic functions and are necessary for the proper function of the website.
Google Tag Manager simplifies the management of marketing tags on your website without code changes.
Statistics cookies collect information anonymously. This information helps us understand how visitors use our website.
Google Analytics is a powerful tool that tracks and analyzes website traffic for informed marketing decisions.
Service URL: policies.google.com
Clarity is a web analytics service that tracks and reports website traffic.
Service URL: clarity.microsoft.com
Marketing cookies are used to follow visitors to websites. The intention is to show ads that are relevant and engaging to the individual user.
Facebook Pixel is a web analytics service that tracks and reports website traffic.
Service URL: www.facebook.com
LinkedIn Insight is a web analytics service that tracks and reports website traffic.
Service URL: www.linkedin.com
You can find more information in our Cookie Policy and Privacy Policy.