Category Archives: Application Highlights

EMAC releases a SODIMM-based take on the Atmel | SMART SAMA5D3


As its name implies, the ‘A5D36 is a SoM based on the Atmel | SMART ARM Cortex-A5 SAMA5D36.


EMAC has launched the SoM-A5D36, a system-on-module that runs Linux on a Cortex-A5-based Atmel SAMA5D3 processor, and offers up to 4GB of Flash, industrial temperature, and an optional carrier board. The wide temperature, fanless ARM 536 MHz SoM features 10/100/1000 BaseT Ethernet along with up to six serial ports. Beyond that, the board boasts up to 16MB of serial data flash and up to 512MB of LP DDR2 RAM, as well as supports LCD and resistive touch interfaces.

emac_som5d36

This isn’t the first time the Atmel | SMART SAMA5D3 has experienced some love from computer-on-module (COM) vendors. In fact, the Cortex-A5-based SoC has shown up on the ShiraTech AT-501, the Acme Systems Acqua A5, and the MYIR MYC-SAMA5D3X — all of which except the Acqua A5 use SODIMM connectors.

Using the same small 200-pin SODIMM form factor utilized by other EMAC SoM modules, the SoM-A5D36 packs all the core ARM processor functionality, including Flash, memory, serial ports, Ethernet, I2S audio, PWMs, timer/counters, A/D, digital I/O lines, clock/calendar, and more. The SoM-A5D36 is also designed to plug into a carrier board that contains all the connectors and any custom I/O required for an application. This approach enables a user to design a custom carrier board that meets for I/O, dimensional and connector requirements without having to worry about the processor, memory and standard I/O functionality.

Key specs of the SoM-A5D36 include:

  • Processor: Atmel | SMART SAMA5D36
  • Memory:
    • Up to 512MB LP DDR2 SDRAM
    • 16MB serial data flash
    • Up to 4MB eMMC flash
  • Networking: Gigabit Ethernet PHY; optional 2x GbE
  • Primary I/O:
    • 3x USB 2.0 host (1x includes device support)
    • 6x serial (4x defined) — 1x full, 3x RTS/CTS, 2x no handshake
    • 2x I2C
    • 2x CAN
    • I2S audio
    • 2x SD
    • 22x GPIO
  • Secondary I/O:
    • 24-bit LCD controller
    • 12-bit, 4-wire, analog resistive touch controller
    • 2x CAN
    • 2x SPI (“3 SPI CS”)
    • 2x I2C
    • 4x PWM
    • 6x ADC (12-bit)
    • 5x timer/counters, 3x prog. clock, RTC, reset, LEDs
    • External address data bus
  • Operating temperature: -40 to 85°C
  • Power: +3.3V
  • Dimensions: 67 x 60mm (200-pin SODIMM)
  • Operating system: EMAC OE Linux

Interested in learning more? Head over to EMAC’s official page here.

Atmel’s new car MCU tips imminent SoC journey


The fact that these MCUs are targeting highly-sophisticated connected car applications like infotainment and ADAS means that the journey toward bigger and more powerful chips is now inevitable.


The automotive industry has reached a new era marked by giant initiatives like infotainment, connected car and semi-autonomous vehicles. And, no one seems more excited than the MCU guys who have been a part and parcel of in-car electronics for the past two decades. However, the humble microcontroller is going through a profound makeover in itself in order to come to terms with the demands of the connected car environment.

Take Atmel Corporation, one of the top MCU suppliers, who has launched its SAM DA1 family of microcontrollers at Embedded World 2015 in Nuremberg, Germany. The automotive-grade ARM Cortex-M0+-based MCUs come with capacitive touch hardware support for human-machine interface (HMI) and local interconnect network (LIN) applications. The SAM DA1 series integrates peripheral touch controller (PTC) for capacitive touch and eliminates the need for external components while minimizing CPU overhead. The feature is aimed at capacitive touch button, slider, wheel and proximity sensing applications.

Moreover, SAM DA1 microcontrollers offer up to 64KB of Flash, 8KB of SRAM and 2KB read-while-write Flash. The other key features of SAM DA1 series include 45 DMIPS and up to six serial communication interface (SERCOM), USB and I2S ports. SERCOM is configurable to operate as I2C, SPI or USART, which gives developers flexibility to mix serial interfaces and have greater freedom in PCB layout.

Atmel | SMART SAM DA1 ARM based Cortex-M0+  microcontrollers

Atmel | SMART SAM DA1 ARM based Cortex-M0+ microcontrollers

The automotive-grade MCUs — operating at a maximum frequency of 48MHz and reaching a 2.14 Coremark/MHz — are qualified to the AEC Q-100 Grade 2 (-40 to +105degreeC). According to Matthias Kaestner, VP of Automotive at Atmel, the company is targeting the SAM DA1 chips for in-vehicle networking, infotainment connectivity and body electronics.

Atmel-Automotive-Touc-Surface-Demo-PTC demo board

Automotive touch surface demo at Embedded World 2015

The fact that the SAM DA1 devices are based on powerful ARM cores clearly shows a trend toward more performance and the ability to run more tasks on the same MCU. The Cortex-M0+ processor design comes with a two-stage pipeline that improves the performance while maintaining maximum frequency. Moreover, it supports a new I/O interface that allows single cycle accesses and enables faster I/O port operations.

That’s no surprise because the number of electronic control units (ECUs) is on the rise amid growing momentum for connected car features like advanced driver assistance systems (ADAS). However, a higher number of ECUs will make the communication among them more intense; so automotive OEMs want to reduce the number of ECUs while they want more value from the MCU.

Moreover, car vendors want to bring down the number of ECUs to avoid complexity within the larger car network. The outcome of this urge is the integration of more performance and functionality onto the MCU. Each ECU has at least one microcontroller.

Atmel and the Evolution of MCU

Atmel’s SAM DA1 device is another testament that the boundaries between MCU and SoC platforms are blurring. The fact that these MCUs are targeting highly sophisticated connected car applications like infotainment and ADAS means that the journey toward bigger and more powerful chips is now inevitable.

Atmel is an MCU company, and this product line has played a crucial role in its transformation that started in the late 2000s. At the same time, however, the San Jose, California–based chipmaker seems fully aware of the critical importance of the system-level solutions. Atmel calls the SAM DA1 family of chips MCUs; however, its support for more peripherals, larger memories and intelligent CPU features show just how much the MCU has changed over the course of a decade.

 Memory Protection Unit in Cortex-M0+

Memory Protection Unit in Cortex-M0+

Atmel has a major presence in the automotive market with its MCUs and touch controllers being part of the top-ten car vendors. It’s interesting to note that, beyond its MCU roots, Atmel has a lot of history in automotive electronics as well. Atmel was one of the first chipmakers to enter the automotive market.

Moreover, Atmel bought the IC division of Temic Telefunken Microelectronic GmbH for approximately $110 million back in 1998. Telefunken was an automotive electronics pioneer with an early success in electronic ignition chips that made way into Volkswagen cars back in 1980.

The release of SAM DA1 series marks a remarkable opportunity as well as a crafty challenge for Atmel in the twilight worlds of MCU and automotive electronics. Tom Hackenberg, a senior analyst at IHS, calls the phenomenon ‘SoC on wheels.’

Hackenberg says that the automotive industry consumed approximately a third of all MCUs shipped in 2013. However, now there is an SoC on the road, the brain behind the connected car, and it commands a deeper understanding of the AEC-Q100 standard for automotive quality and ISO 26262 certification for car’s functional safety.

Atmel’s AvantCar touchscreen demo at the CES 2015

Atmel’s AvantCar touchscreen demo at the CES 2015

The integration of touch controller into SAM DA1 chips can be an important value proposition for the car OEMs who are burning midnight oil to develop cool infotainment platforms for their newer models. Next, while AEC Q100 Grade 2 qualification is a prominent part of the SAM DA1, Atmel might have to consider augmenting the ISO 26262 certification for functional safety, a vital requirement in ADAS and other connected car features.


Majeed Ahmad is author of books Smartphone: Mobile Revolution at the Crossroads of Communications, Computing and Consumer Electronics and The Next Web of 50 Billion Devices: Mobile Internet’s Past, Present and Future.

 

A look at some of today’s wearable microcontrollers


This list is sew awesome!


Created by Leah Buechley of MIT, and introduced commercially with SparkFun back in 2007, the LilyPad was the first board to feature sew-through contacts for stitching soft circuits. Since then, a number of “ready-to-wear” electronics platforms have emerged, each of which have helped usher in a new generation of textiles that look to redefine wearable technology. In fact, a recent Gartner report revealed that the emergence smart garments will potentially disrupt the market. So much so that embedded clothing shipments are projected to rise from a mere 0.1 million units in 2014 to 26 million units in 2016.

As first noted by MAKE: Magazine’s Boris Kourtoukov, “there’s a plethora of options” when it comes to these microcontrollers. What’s more, they all possess one common trait: they’re powered by Atmel. These so-called body boards are now giving Makers the ability to easily (and affordably) produce their own projects in ways that otherwise would have been unimaginable.

So, without further ado, here’s a look at some of today’s most prominent boards ready for adornment.

The Favorites

LilyPad Arduino

09266-04

LilyPad is a wearable e-textile technology developed by Leah Buechley and cooperatively brought to life with SparkFun. Each LilyPad was creatively designed to have large connecting pads to allow them to be sewn into clothing. LilyPad can sense information about the environment using inputs like light and temperature sensors and can act on the environment with outputs like LED lights, vibrator motors, and speakers. And yes, they’re even washable.

MCUATmega328

FLORA

Mega

FLORA is Adafruit’s fully-featured wearable electronics platform. The round, sewable microcontroller weighs in at 4.4 grams and measures only 1.75 inches in diameter. 100% Arduino-compatible, the platform is one of the most beginner-friendly ways to create some amazing wearables. The FLORA family includes an assortment of sensors and RGB LEDs that let you add lighting to your projects, not to mention also boasts built-in USB support, eliminating the need for pesky special cables and extra parts.

MCUATmega32U4

GEMMA

100212_1024x1024

Those who are seeking the awesomeness of FLORA but in a tinier package are sure to love another one Adafruit’s wearable platforms: the GEMMA. The board, which packs all of its features in a 1″ diameter package, is programmable with an Arduino IDE over USB. An upcoming Arduino IDE-supported version will feature an on/off switch and microUSB connector.

MCUATtiny85

TinyLily Mini

2

A brainchild of TinyCircuits, the TinyLily Mini is an Arduino-compatible module in an ultra-compact package. Geared towards Makers looking to devise e-textile and wearable applications, the board is very similar to the Arduino LilyPad, with the same processing power and software compatibility – but at 1/12th of the size. The TinyLily Mini also is equipped with sew tabs for eight I/O (four digital, four analog/digital) and four power sew tabs (two for power, two for ground).

MCUATmega328

SquareWear

Sqw

SquareWear is an open-source, wearable board. The Arduino-compatible MCU measures 1.7″x1.7″ in size, and is equipped with a built-in rechargeable Lithium coin battery. It is designed to be sewable, which allows Makers to stich conductive threads through its large pin pads, solder a wire directly onto the pads, or solder snaps onto the pads for quick attachment or detachment from textiles and fabrics. Additionally, the MCU packs an on-board miniUSB port that can be used for programming, charging batteries and serial communication, as well as a color LED, a pushbutton, a buzzer, a light and temperature sensor, and three MOSFETs to drive the high-current load. See, it’s hip to be square!

MCUATmega328

Xadow

Xadow_MainBoard

Seeed Studio’s Xadow is a high-performance, low-power board that is perfectly suited for wearable projects. The microcontroller can be powered either via USB or a Lithium battery. Also, there is charge circuit on this module that you can charge for the Lithium battery through the USB port. Xadow has a diverse selection of compatible modules, including a barometer, UV sensor, LED, OLED and even a full GPS antenna.

MCU: ATmega32U4

Trinket

adafruit-trinket-5v

Trinket goes to show that big things really can come in small packages. In fact, the tiny MCU is one of the lowest-cost Arduino IDE programmable boards on the market today. Adafruit designed a USB bootloader so Makers could easily plug it into any computer and reprogram it over a USB port just like an Arduino. It comes in two different versions: 3V and 5V. Both work the same, but have different operating logic voltages.

MCU: ATtiny85

Pro Trinket

MFG_2000

A bigger sibling of the aforementioned board, this 5V unit combines everything you love about Trinket along with the familiarity of the common core found in Arduinos. It’s like an Arduino Pro Mini with more pins along with built-in USB. The Pro Trinket, which still only measures 1.5″ x 0.7″ x 0.2” in size, features 18 GPIO, two extra analog inputs, 28K of flash, as well as 2K of RAM. Like its older brother, the MCU has onboard USB bootloading support and Optiboot support, so Makers can either program their Pro Trinket over USB or with a FTDI cable just like the Pro Mini. (Recently, paying homage to our friends at Hackaday, the Adafruit crew even unveiled a Hackaday.io branded board — black solder mask, Jolly Wrencher and all. And, it’s stunning.)

Atmel MCU: ATmega328

Ones to Watch

BITalino

Bit

BITalino is a low-cost, easy-to-use toolkit designed for anyone looking to build self-tracking applications based on information from their body. The platform enables Makers to quickly bring projects entailing body signals and quantified self wearable devices to life, as well as learn how to create actual medical devices — which otherwise can cost upwards of $10,000. BITalino is described by its creators as an out-of-the-box solution that offers an array of Arduino-compatible software and hardware blocks equipped with sensors for electrocardiography (ECG), electromyography (EMG), electrodermal Activity (EDA), accelerometry (ACC), and ambient light (LUX).

MCUATmega328

Printoo

Printoo

Launched by Ynvisible, Printoo is a printed electronics prototyping platform that is capable of bringing everyday objects to life. Comprised of various hardware modules that can all be connected to each other, it is currently the only platform that appears to have a robust flexible form-factor. This enables Makers to quickly and seamlessly create first product concepts for smart wearable devices. Moreover, the board is fully-compatible and programmable with the Arduino IDE.

MCUATmega328

SuperDuino

SuperDuino

Introduced by Maker Mohsin Farooq, SuperDuino is a coin cell operated, Arduino-compatible board with a built-in 1.7-inch color display and a three-axis accelerometer. As you can imagine, this makes the MCU a suitable match for a wide-range of DIY games, gadgets and most of all, wearable devices.

MCU: ATmega328

Atmel launches new radiation-hardened mixed-signal ASICs for space apps


ATMX50RHA ASIC delivers flexible analog capabilities for up to 22 million routable gates simplifying the design process for next-generation space applications.


Atmel has announced a new radiation-hardened (rad-hard) mixed-signal ASIC platform for high-performance and high-density solutions for space applications. Manufactured on 150 nm Silicon on Insulator (SOI) process, the ATMX150RHA adds to Atmel’s portfolio of rad-hard solutions.

Space

Providing a platform that simplifies the design process for space application, the new ATMX150RHA delivers up to 22 million routable gates, includes non-volatile memory blocks, flexible form factor with compiled SRAM and DPRAM blocks, and supports 2.5/3.3/5V and high-voltage (25-45-65V) I/Os with pre-qualified analog IP. This flexible and highly-integrated ASIC brings an overall lower bill of materials for space applications, which range from transportation and communication to Earth observation to scientific research. The ATMX150RHA ASIC platform is supported by a combination of state-of-art third-party and proprietary design tools such as Synopsys, Mentor and Cadence.

Leveraging Atmel’s nearly 30 years of flight heritage, the ATMX150RHA integrates Atmel’s proven rad-hard solution and offers a full service option for customers designing ASICs up to the qualified flight models. As previous Atmel ASIC platform generations, all ATMX150RHA products are fully designed, assembled, tested and qualified in Europe.

“With our long-standing flight heritage and more than 3,500 flight models delivered, we are a leading ASIC provider for space applications with proven, reliable solutions,” explained Patrick Sauvage, General Manager of Atmel’s Aerospace Business Unit. “Atmel’s ATMX150RHA ASIC adds to our proven aerospace portfolio, and delivers a fully integrated solution that allows aerospace designers a flexible, yet complete solution to help accelerate their space mission. The new ASIC is further testament to our aerospace leadership.”

Key features of the ASIC:

  • Comprehensive library of standard logic and I/O cells
  • Up to 15 usable Mgates equivalent NAND2
  • Operating voltage 1.8+/-0.15V for the core and 5V +/-0.5V, 3.3+/-0.3V, 2.5+/-0.25V for the periphery
  • High voltage I/O’s 25-45-65V
  • Memory cells compiled (ROM, SRAM, DPRAM, Register file memory cells) or synthesized to the requirements of the design
  • 32KB NVM memory block
  • Cold sparing buffers
  • High-speed LVDS buffers 655Mbps
  • PCI buffers
  • Set of analog IPs
  • Low-cost NRE with a Space Multi Project Wafer (SMPW) option
  • No single event latch-up below a LET threshold of 75 MeV/mg/cm² at 125°C
  • SEU hardened flip-flops
  • TID test up to 300kRads (Si) for 1.8V and 3.3V devices and 150kRads (Si) for 5V and HV I/OS according to Mil-Std 883 TM1019
  • CCGA, CLGA and CQFP qualified packages catalog
  • ESD better than 2000V
  • Applications include satellites, space probes and space station launchers

Interested in learning more? Soar over to the ATMX150RHA’s official page here.

Open-source hardware is eating the world


Our good friend and Hackster.io founder Adam Benzion explores the latest advancements in open hardware and what it means for our future.


Open-source hardware has been making headlines in industry publications and tech communities for years, but only now is it finally enjoying the same mainstream adoption that the Creative Commons and open-source software have enjoyed for over two decades. With growing numbers of hardware designs publicly available to study, modify, distribute, and replicate, resistance is futile!

06a5a8e

Move Over Patent Trolls

Much like its immediate software relative, open-source hardware uses existing hardware design licenses rather than creating new ones, to co-innovate and share it forward. In a stark shift from the usually guarded patent world of hardware, we find a new environment for the sharing of ideas. Literally hundreds or thousands of hardware designs—circuit design, component integration, machines, tools, processors and practically anything that can be physically invented—are getting published and made available for anyone to use. There are many upsides to this, although it also seems to be encouraging more red-faced patent trolls to sue unsuspecting users of open-source hardware on Kickstarter and Indiegogo, because someone, some time ago, was already awarded a patent. (It’s just my opinion, but if you filed without the intention to ever build or share your invention, you deserve to get out-innovated.)

You’re Either In Or On The Way Out

Right now it seems like everyone is joining, but you might be less enthusiastic if you’re a Fortune 100 that established itself on the grounds of proprietary technology. Remarkably, however, many of the companies I would have bet on being slow in adapting into this new world are actually fully endorsing it. From Intel, to Atmel, Freescale, and TI, these silicon tankers have proved agile and responsive, powering most of the kits we all know and love (and maybe by doing so, they will start opening up some of their core chip designs?) Maybe it shouldn’t be surprising: They’ve been publishing reference designs for their boards for decades as a way to make it easy for customers to get started. And now they’re also learning from open-source electronics royalty like Arduino, while juggernaut creative hits like SparkFunSeeed Studio and Adafruit, show how to further adapt, share more, and be part of a community.

I’d rather build on the shoulders of giants, share everything we’ve learned, and learn a thing or two from others. At the end of the day, SparkFun is successful because of the products, value and service we deliver, not our IP portfolio.

Nathan Seidle Founder & CEO, SparkFun Electronics

And it doesn’t stop with electronics. Just take a look at Toyota’s CES 2015 announcement. The company is following the example of Tesla Motors, making all of its 5,680 patents related to fuel cell technology available, royalty-free, to anyone in hopes of driving more innovation. Sure, you can argue that all of this is done in the name of self-servitude: They save on R&D resources while broadening the market, and eventually sell more products as a result. Autodesk is also working on a similar initiative with Spark: an open platform that allows any hardware manufacturer, software developer or material scientist to automate, simplify and improve 3D printing. Regardless of the motivation, this is happening, and the beauty of it is that it taps the collective crowd for exponential brainpower and innovation.

atmelbooth

A Freeway Without Speed Limits

By distributing hard earned engineering IP via the Creative Commons Attribution and the GNU General Public License and a widespread “Copylefting” attitude, innovators are transforming the world of hardware creation at speeds we’ve never seen before. The implications reverberate across the playing field, affecting everyone from hardware hackers to major players, and beyond.

  1. Startups. With little to no hardware engineering experience, startups can now hack their way into building hardware prototypes, fully capable of connecting to the “internet of things”, skipping months and thousands of dollars traditionally associated with such creations.
  2. Community. Open-source hardware is creating new communities that share recipes of creation. For me this became a personal obsession. Myself and Ben Larralde, co-founders of Hackster, are helping people everywhere co-create and learn open-source hardware. We see a massive wave of hardware innovation resulting from this movement, with firmware, schematics and inventive combination of electronics being developed, shared, redesigned and shared again from every corner of the planet in speeds we never seen before.
  3. Kids. If you are a parent like me, you are starting to see how this movement is accelerating your child’s abilities to design complex creations. My daughter who is only 4 years old can assemble strangely beautiful hardware creations using littleBits and thinking through “what if” scenarios. What happens when she’s 10 and can actually build complex blocks using LittleBits version 8.0? Does she even buy hardware at Best Buy or just build it herself because it’s more fun and possible better? When everything is open, big changes are inevitable.

Hardware innovation is driven by demand chain not supply chain, and open hardware provides the creative engine.

Eric Pan, Founder and CEO of Seeed Studio

Why Is This Happening Now?

We’ve lived through many decades since the computer revolution, the invention of the microprocessor, and the mainstream Internet. Maybe it’s not a surprise that all of the technology required to create software and hardware has finally come together, simplified and affordable to almost anyone on earth. Today, all you need is free cloud computing account from Microsoft’s Azure, an Intel Edison or Spark’s new Photon, basic programming skills and an access to a 3D printer. Voila, you are well on your way to creating a basic, functioning, piece of hardware. Unfathomable even 5 years ago. When I built my first hardware company in 2010, much of the above was generally unavailable.

RepRap_v2_Mendel

Disrupted Again

Built on the heels of open-source software and the new sharing economy, open hardware is a disruptive evolution. It will create massive changes to how hardware innovation is co-created and monetized in rapid new cycles. It will shift the tight hold of old power that was jealously guarded by the few, to the new power which is open, participatory, and peer-driven, forceful as it surges.

But the real change in open-source hardware will come when you see a consumer product released as fully open-source — not something for programmers, hackers and hobbyists. The day that Samsung release a phone or a GE a washing machine that ships open will be the signal that the value in hardware openness is here to stay.

This post was originally published on LinkedIn by Adam Benzion along with the help of Nathan Seidle, Tom Igoe, Sean Geoghegan and Eric Pan. You can also learn all about Hackster.io and explore a wide-range of the latest Maker projects here.

Securing the Internet of Streams


The evolution of IoT is now at a point that it will require a comprehensively redesigned approach to security threats in order to ensure its continuous growth and expansion.


The relentless flow of new product introductions keeps fueling the gargantuan estimates of billions of connected communicating computing devices which is projected to imminently make the Internet of Things ubiquitous within every facet of our lives. The IoT has been portrayed as the key enabler of a smarter world with compelling use cases that cut across a wide array of both personal and industrial ecosystems.

A great description is that the IoT is the global nervous system. This could be a pun, as IoT is increasingly producing troubling headlines. Stories abound, detailing security breaches that sound as if they were taken from a sci-fi movie, from hacked security cameras to a spamming refrigerator.

IoT-Global-Nervous-System

Figure 1 (Source: re-workblog.tumblr.com)

The explosive growth of the IoT coincides with an alarming increase in reported rates of identity theft and hacker attacks on everyday gadgets and appliances. Security researchers have easily established the feasibility of attacks against TVs, cars, security cameras, and medical equipment. There is much more than stolen money on the line if these types of attacks are carried out. The evidence demonstrates that existing security mechanisms are insufficient or ill-suited to address the risks inherent with the ubiquitous deployment of the IoT.

The need for a new original approach

The traditional approach to security, applied to both consumer and business domains, is one of separation – preventing those who are considered bad actors from accessing devices and networks. However, the dynamic topology of the network environments in which IoT applications are deployed largely invalidates the separation approach, making it both impractical and overly rigid. For example, with BYOD (bring-your-own-device), enterprises struggle to apply traditional security schemes to devices that may have been compromised while outside the perimeter firewall.

Many IoT devices self-configure and run autonomously. User interaction is limited to the devices’ operations, and there are no means to change security parameters. These devices rely on the manufacturer to implement security, both in the hardware and the software.

Moreover, manufacturers have to consider the broader ecosystem, not just their own products. For example, recent research has revealed inherent security flaws in USB memory stick controller hardware and firmware. Users must be concerned not only about the safety of the data on the memory stick, but if the memory stick controller itself has somehow been compromised.

To thwart similar issues, IoT device vendors are rushing to upgrade their product portfolios to low-power, high-performance microcontrollers that include firmware upgrade and data encryption mechanisms.

Atmel's IoT Layered Security Solutions

Figure 2 (Source: Atmel’s White Paper: Integrating the Internet of Things)

In the hyper-connected world of IoT, security breaches will gravitate towards the weakest link in the chain. It will become very hard to maintain the confidence that any particular device, user, application or service maintains its integrity; instead, the assumption will be that things will occasionally break for a variety of reasons, over which there is little control and no method for fixing. As a result, IoT will force the adoption of new concepts for the establishment of trust.

A smarter network combined

In the loosely coupled world of IoT, security issues are driving a need for greater collaboration among the vendors participating in the ecosystem, recognizing their respective core competencies. Hardware vendors make devices smarter. Software developers make applications and services smarter. The connective tissue, the global Internet with its myriad of communication transports and protocols, is tasked with carrying the data that powers IoT. This begs the question – can the network be made an enabler of IoT security by becoming smarter in its own right?

Context is essential for identifying and handling security threats and is best understood at the application level, where the intent of information is processed. This points towards a higher-level communication framework for IoT – the Internet of Data Streams. This framework enables apps and services to view things as consumers and producers of data. It allows for descriptive representations of devices’ operational status and real-time detection of their presence or absence.

Elevating the functional value of the Internet, from a medium of communication to a network of data streams for IoT, would be highly beneficial to ease collaboration among the IoT ecosystem participants. The smarter network can provide apps and services with the ability to implement logic that detects things that break or misbehave, flagging them as suspect while ensuring graceful and consistent operation using the redundant resources.

InternetOfThingsHorizontal

For example, a smarter network can detect that a connected sensor stopped functioning (e.g. due to a denial of power attack, possibly triggered through some obscure security loophole) and allow the apps that depend on the sensor to provide uninterrupted service to users. Additionally, a network of data streams can foster a global industry of security-as-a-service solutions, which can, as an example, send real-time security alerts to app administrators and device manufacturers.

The evolution of IoT is now at a point that it will require a comprehensively redesigned approach to security threats in order to ensure its continuous growth and expansion. Addressing the surfaced issues from an ecosystem standpoint calls for apps, services and “things” to explicitly handle communication via a smarter data network, which has the promise of placing IoT in safer hands, courtesy of the Internet of Streams.

element14 debuts new Atmel SAMA5D4 Xplained board


The latest Atmel | SMART development kit features video decoder and advanced security features.


element14 has debuted the Atmel | SMART SAMA5D4-XUL Xplained board, featuring an ARM Cortex-A5 microprocessor. The newly-announced development kit enables users to evaluate, prototype and create high performance, application-specific designs. The SAMA5D4 Xplained Ultra is packed with 4Gb DDR2 external memory, one Ethernet physical layer transceiver, two SD/MMC interfaces, two host USB ports and one device USB port, one 24-bit RGB LCD and HDMI interface and debug interfaces.

60d37bec6b8da5029546c79a70c60635

The 720p video decoder and playback at 30fps alongside the LCD controller with graphics accelerator are targeted for consumer and industrial designs, including terminals and Internet of Things (IoT) applications. In addition, the SAMA5D4-XULT leverages the advanced security features found on the board’s microprocessor, like ARM Trust Zone, secure boot, encrypted DDR bus, tamper detection pins and secure data storage.

Seven headers, compatible with both the Arduino Uno and Due and two Xplained headers are available for various shield connections.

“Our partnership with Atmel continues to grow with the latest addition to the Atmel Xplained family of development kits,” explained David Shen, Premier Farnell Group CTO. “The comprehensive security features and display capabilities of the SAMA5D4-XULT are key to the advancement and implementation of IoT applications where the user interface and security information are critical.”

SAMA4d

As we’ve previously discussed on Bits & Pieces, the SAMA5D4 is optimized for control panel/HMI applications requiring video playback and is well suited for other use cases that require high levels of connectivity in the industrial and consumer Internet of Things market. The new ARM-based series is a high-performance, power-efficient Cortex-A5 MPU capable of running up to 528 MHz. Furthermore, the device integrates the ARM NEON SIMD engine for accelerated signal processing, multimedia and graphics as well as a 128 KB L2-Cache for high system performance.

The SAMA5D4 Xplained – priced at $93.50 – is now available and can be found on the element14 Design Center. Those interested in learning more can also head over to the development kit’s official page here.

Symmetric or asymmetric encryption, that is the question!


With the emergence of breaches and vulnerabilities, the need for hardware security has never been so paramount.


Confidentiality — one of the three foundational pillars of security, along with data integrity and authenticity — is created in a digital system via encryption and decryption. Encryption, of course, is scrambling a message in a certain way that only the intended party can descramble (i.e. decrypt) it and read it.

pillars

Throughout time, there have been a number of ways to encrypt and decrypt messages. Encryption was, in fact, used extensively by Julius Caesar, which led to the classic type of encryption aptly named, Caesar Cipher. The ancient Greeks beat Caesar to the punch, however. They used a device called a “Scytale,” which was a ribbon of leather or parchment that was wrapped around a rod of a diameter, of which only the sender and receiver were aware. The message was written on the wrapping and unfurled, then sent to the receiver who wrapped on on the rod of the same diameter in order to read it.

Skytale

 

Modern Encryption

Modern encryption is based on published and vetted digital algorithms, such as Advanced Encryption System (AES), Secure Hashing Algorithms (SHA) and Elliptic Curve Cryptography (ECC), among many others. Given that these algorithms are public and known to everyone, the security must come from something else — that thing is a secret cryptographic “key.” This fundamental principal was articulated in the 19th century by  Auguste Kerckhoffs, a Dutch linguist, cryptographer and professor.

Kerckhoffs’ principle states that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. In other words: “The key to encryption is the key.” Note that Kirchoffs advocated what is now commonly referred to as “open-source” for the algorithm. Point being, this open-source method is more secure than trying to keep an algorithm itself obscured (sometimes called security by obscurity). Because the algorithms are known, managing the secret keys becomes the most important task of a cryptographer. Now, let’s look at that.

kirchoff 1

Symmetric and Asymmetric

Managing the key during the encryption-decryption process can be done in two basic ways: symmetric and asymmetric. Symmetric encryption uses the identical key to both encrypt and decrypt the data. Symmetric key algorithms are much faster computationally than asymmetric algorithms because the encryption process is less complicated. That’s because there is less processing involved.

The length of the key size directly determines the strength of the security. The longer the key, the more computation it will take to crack the code given a particular algorithm. The table below highlights the NIST guidelines for key length for different algorithms with equivalent security levels.  You can see that Elliptic Curve Cryptography (ECC) is a very compact algorithm. It has a small software footprint, low hardware implementation costs, low bandwidth requirements, and high device performance. That is one of the main reasons that ECC-based asymmetric cryptographic processes, such as ECDSA and  ECDH, are now being widely adopted. The strength of the sophisticated mathematics of ECC are a great ally of all three pillars of security, especially encryption.

table

Not only is symmetric faster and simpler; furthermore, a shorter key length can be used since the keys are never made public as is the case with asymmetric (i.e. Public Key Infrastructure) encryption. The challenge, of course, with symmetric is that the keys must be kept secret on both the sender and receiver sides. So, distributing a shared key to both sides is a major security risk. Mechanisms that maintain the secrecy of the shared key are paramount. One method for doing this is called Symmetric Session Key Exchange.

Asymmetric encryption is different in that it uses two mathematically related keys (a public and private key pair) for data encryption and decryption.  That takes away the security risk of key sharing. However, asymmetric requires much more processing power. Unlike the public key, the private key is never exposed. A message that is encrypted by using a public key can only be decrypted by applying the same algorithm and using the matching private key.

A message that is encrypted by using the private key can only be decrypted by using the matching public key. This is sort of like mathematical magic. Some of the  trade offs of symmetric and asymmetric are summarized below.

Symmetric

  • Keys must be distributed in secret
  • If a key is compromised the attacker can decrypt any message and/or impersonate one of the parties
  • A network requires a large number of keys

Asymmetric

  • Around 1000 times slower than symmetric
  • Vulnerability to a “man-in-the-middle” attack, where the public key is intercepted and altered

Due to the time length associated with asymmetric, many real-world systems utilize combination of the two, where the secret key used in the symmetric encryption is itself encrypted with asymmetric encryption, and sent over an insecure channel.Then, the rest of the data is encrypted using symmetric encryption and sent over the insecure channel in the encrypted format. The receiver gets the asymmetrically encrypted key and decrypts it with his private key. Once the receiver has the symmetric key, it can be used to decrypt the symmetrically encrypted message. This is a type of key exchange.

Note that the man in the middle vulnerability can be easily addressed by employing the other pillar of security; namely authentication. Crypto engine devices with hardware key storage, most notably Atmel’s CrypotoAuthentication, have been designed specifically to address all three pillars of security in an easy to design and cost-effective manner. Ready to secure your next design? Get started here.

Is the Internet of Things just a toy?


While some sort of IoT is possible without security, without security it would really just be a toy.


The Internet of Things (IoT) is arguably the most hyped concept since the pre-crash dot-com euphoria. You may recall some of the phrases from back then such as “the new economy,” “new paradigm,” “get large or get lost,” “consumer-driven navigation,” “tailored web experience,” “it’s different now,” among countless other media fabrications.

Picture1

The IoT is the new media darling. In fact, it has been dubbed everything from the fifth wave of computing, to the third wave of the Internet, to the next big thing, to the next mega-trend, to the largest device market in the world, to the biggest efficiency booster/cost reduction technology. You get the picture.

Now, the question is whether or not the IoT will indeed be more real than just hype, as is the case with any media powered feeding frenzy. Let’s start by looking at the numbers.

Respected market researchers and giant networking companies are predicting gigantic numbers of connected devices to the tune of 20 to 50 billion units of installed base by 2020 or 2025, with some estimates even going higher. With numbers like that coming from the world’s most-followed, reputable sources, it won’t be long before high roller investors start placing enormous bets on who will be the winners of the IoT game; a game that will be make Vegas action look like a game of marbles. The IoT casino is now open.

Picture2

There is really big money at stake because IoT represents a perfect storm of opportunity for venture capitalists and bold corporate acquirers — that is because many believe that half the successful IoT companies don’t even exist yet. Conditions don’t get much more attractive than that when it comes to risk capital.

Here’s a hot tip: Only bet on the companies offering systems that articulate a clear strategy that put strong security (especially authentication) as a top priority. This tip is derived from the observations of Dr. Vint Cerf (the acknowledged creator of the Internet) who declared that the IoT will require strong authentication. And, he’s right. Note well that the strongest authentication comes from hardware-based cryptographic key storage because hardware key storage beats software-based key storage every time. Inexpensive and easy-to-use integrated circuit devices already exist to do just that. The media should grasp that but don’t seem to get it yet.

The dirty little secret of the constantly-connected era is that without security, the IoT will just be a toy that consumers, governments, and corporations cannot take seriously. What good is a system of billions of interconnected things sensing and sending data (often through the cloud)  that can be  intercepted, corrupted, and spoofed? Not very much. IoT growth is dependent upon security. 

Charting the Growth

The graphs below show estimated unit shipments and the resulting installed base of IoT devices. What has also been called out in each chart are devices with on-board security, mainly hardware-based security, and those that do not have built in hardware security. Most market estimates out there tend to show the growth of the IoT in terms of installed bases, growing to many billions by 2020. Typically speaking, you will see a chart like the one below, but without the divisions between secure and insecure nodes.This is a case of the devil being in the details, because installed base charts can be very misleading. Data jockeys such as market researchers and statisticians know very well that installed base is a tricky way to present data. Fair warning: Beware of drawing conclusions from installed base charts only.

IoT Installed

The IoT case is a perfect example of how to hide the important information, because even if you remove the secure nodes, the chart still looks like there will be enormous growth. However, that masks the fact that growth will plateau without the secure nodes being a part of the picture. It is a an illusion caused by the fact that the early days of the IoT will build a base of significant numbers, but the volume shipments will fall off quickly as users reject insecure solutions precisely because they are insecure.

The installed base IoT chart is analogous to chart of automobiles in the time of Henry Ford showing the installed base of black cars (remember Model Ts came in any color as long as it was black).  That would show that black cars were the overwhelming color and it would be impossible from that chart to conclude anything other than they always would be. Obviously, such a chart would mask the market changes that in fact happened and the inflection points as to when the changes happened. Masking is exactly what the IoT installed base chart does.

It fails to show that the inflection point towards secure nodes that is starting right now, which is a shift that will happen quickly. Reason being, the need for security is becoming clear (just ask Sony, Target, Home Depot, JP Morgan, and Iranian nuclear scientists about that). As aforementioned, inexpensive hardware-based devices are available now that can provide strong security to IoT nodes.

IoT Node Chart 1

The unit shipment slide is what tells the real story. And, that is that security is becoming a requirement of IoT if growth is to be sustainable.  Simply stated: Without real security, the IoT will falter.

BxLpafwIcAAMcG0

Security Maters

Security matters because users must trust that the nodes are who they say they are (i.e. are authentic). Additionally, confidentiality of the data is important to keep unauthorized third parties from getting the data and misusing it. Also, without data integrity mechanisms there is no way to ensure that the data have not been tampered with or corrupted. All three of these matter. A lot.

However, with all the press that the IoT receives and all the tremendous predictions of giga-volumes, you just don’t hear much other than passing comments about security. Security should, in fact, be the prerequisite of any article, discussion, or plan for IoT-based anything. Talking about the Internet of Things without addressing the security question (with specifics) is like talking about scuba diving without mentioning water.

Security gets short shrift even though it is pivotal to the IoT’s existence (and important to literally everyone in the digital universe, including the readers of this article). One main reason is that the meaning of security is not really well understood. As a result, engineers, executives, investors, and researchers alike have been mainly whistling past the graveyard hoping that their digital interests will not be attacked too badly. However, with the increasing frequency, variety, and creativity of security breaches and especially with the advent of breach-based litigation, the danger is increasing and finally more attention is getting paid. It is not hard to envision ambulance-chaser legal firms moving from class action suits regarding asbestos, medical devices, and pharmaceuticals to seeking data-breach damage rewards. In actuality, this has already started. You can almost hear the cloying ads already.

lawsuits

Security Defined

There are two important and fundamental questions about security and the IoT:

1. What is IoT security?

2. How do you implement it now?

To address the first item, the best way to understand it is to break it down into the three pillars of security, which are confidentiality, data integrity, and authentication (ironically referred to as “CIA”). The second inquiry is related directly to the first because implementing security is a function of how well you address the three pillars.

pillars

It is critical to address security right now because putting insecure systems into the world is just asking for trouble. There is no time to wait. Assembling a network or product dependent on a network that is filled with vulnerabilities is bad practice. The good news is that thanks to cryptographic engine integrated circuits with hardware-based secure key storage powerful solutions are clear and present.

Crypto Elements

Crypto element refers to a dedicated integrated circuit devices with crypto engines that handle crypto functions such as hashing, sign-verify (e.g.  ECDSA), key agreement (e.g.  ECDH),  authentication (symmetric or asymmetric), encryption/decryption, message authentication coding (MAC), run crypto algorithms (e.g. elliptic curve cryptography, AES, SHA), and perform many other functions. The other critical part of the equation that makes crypto elements so valuable is their ability to store cryptographic keys in ultra-secure hardware.  (The CTO of a major home networking company recently described storing cryptographic keys in software being like storing a key in a wet paper bag.)

tamper

Providing the exact type of security needed for the IoT to grow is what crypto engines like CryptoAuthentication solutions are all about. They make security both easy and cost effective. The amazing thing is that crypto engine devices were invented before the IoT even existed. Now they are arguably the ideal catalyst to drive IoT growth when they are added to the other fundamental elements of the IoT.  So, it should be clear that there are now four elements to a serious IoT node:

1. Intelligence (Microprocessors)

2. Communications (Wi-Fi, Bluetooth, etc.)

3. Sensors

4. Security

These four items will be the recurring theme of IoT nodes.   The story from here will be which  communications standards are supported, the level of integration, how security is handled (standards and methods), performance, speed, power, size, etc., not if security is there or not.

Long story short: While some sort of IoT is possible without security, without security it would really just be a toy.

Scan all your books for a dollar each

I just used 1DollarScan in San Jose to scan a bunch of old yearbooks, text books, and manuals from General Motors I have kept for 35 years. There is no “catch,” it really is a dollar a book, but there are some conditions. To be fair, their definition of a book is 100 pages. So if you have a 101 page book, then its two dollars. If it’s a 199 page book, its still two dollars. A 1001 page book is 11 dollars. It is still the best deal you will ever see. Heck, the Post Office makes more than 1DollarScan if you have to ship the books.

KONICA MINOLTA DIGITAL CAMERA

Hiroshi Nakano at 1DollarScan will make high-quality pdf files or jpegs of all your books.

You can use media mail, however, and get a really cheap rate. I like the flat-rate Post Office boxes, and there is always UPS and FedEx ground. If you have a pallet of books maybe freight is the cheapest way. For folks like me that live in Silicon Valley, you can just drop the books off.

Now, if the books are copyrighted, 1DollarScan intends to dispose of them after they scan them, so that there is no copyright issues. You just changed the form of the copyrighted material you already paid for, and the Supreme Court has decided that issue decades ago. If the material is your own, or something like a high-school yearbook, 1DollarScan can return the material, if you pay for the shipping.

KONICA MINOLTA DIGITAL CAMERA

I had two big bags of books for 1DollarScan.

Since they count 100 pages as a “set” and every book is at least one “set” it did not take long for me to see that I had over 67 sets. I just stopped counting, since they have a 100-dollar a month platinum deal, where several premium services are included free.

So I want to point out the downsides since you are engineers and analytical. But first, rest easy, because Hiroshi Nakano, the founder of 1DollarScan is also an engineer. He came to Silicon Valley working for a big corporation. After a few years, he returned to Japan. There he noticed similar scanning services growing in popularity, since space is at such a premium in Tokyo. So Nakano returned to Silicon Valley and started 1DollarScan. As you would expect from a fellow engineer, the pricing is rational, the website is clear and it works great, and everything seems too good to be true.

As to those downsides? Well, since he uses very light compression on the pdf files, they are huge. My General Motors Institute yearbook came in at 350MB. That was 242 pages of high-res and mostly images. Because I sprung for the 100-dollar a month deal, the file was named with the title of the book and I can use their “tune up” online service to make smaller pdfs suited for phones or tablets, Kindles or other devices. Alternatively I believe they will provide you with the raw jpeg files, and for an extra dollar, they can do 600dpi jpegs. For me, the pdfs just make more sense, and hundreds of separate jpeg files are too unwieldy to handle.

The only other downside is the OCR (optical character recognition) was not perfect. I had 1DollarScan scan in a big 1960s magazine from the Cleveland Plain Dealer called “Cleveland, a city grows to greatness.” The preface has a small biography of the two authors. The type was tiny and the magazine was 50 years old. The page image is perfect, and you can’t see the OCR errors until you highlight and cut-and-paste the text into a notepad or some other editor. Here is what the OCR produced:

George J. Barmann, coculhor of l{ris work, has been on lhe staff of ihe Plain Dealer since epfember, 1942. He came lo the paper {rom the lllinoir State Journal, in Springfield, where he had gone affergraduation from flre University of lllinoir, in !937. On the Plain Dealer, Barmann spent some time in writing about education. After thal, he did general asignmenf reporting. whish meanr covering almoct the whole range of stories that daily come acro3r the City De*. Barmann, in recenl years, has done chiefly feafurer for the Plain Decler, including a greal many inierview with headline peronaliiies and people of the fheafer. Also, he ha; writlen feature stories aboul lhe Civil War. He lraveled through the Deep South, from New Orleans to Charleston, S.C., and wrole a series of arlicle: on whaf Southerners were thinling in tfii: l00th anniver:ary of ilrat wer. A nalive of Chillicolhe, Ohio, Barmann al*ended Miami Univer:ity ai Orford, O. before lramfering to iournalirm ai lhe Universify of lllinois.

Other fonts came out much better, this was the worse OCR of anything that got scanned. But there is a solution to both the big file size and the OCR accuracy. Based on the advice of analog engineer Walt Jung, I had purchased a copy of ABBYY Finereader 11. I am pretty sure it was under 100 dollars. I used ABBYY to scan in all my loose papers and tax records. I find it far better than TextBridge and other OCR programs, which I also own. ABBYY will take in a pdf file, and re-recognize the text, and save it with much higher compression. So I ran the 1DollarScan pdf into ABBYY and made another pdf file. That file of a 64-page ledger-size book was 9MB instead of 120MB. Here is the ABBYY OCR result of the Cleveland book:

G e o r g e J. Barmann, co­author of this work, has been on the staff of the Plain Dealer since September, 1942. H e came to the paper from the Illinois State Journal, in Springfield, where he had gone after gradua­tion from the University of Illinois, in 1937. O n the Plain Dealer, Bar­mann spent some time in writing about education. A fte r that, he did general assignment reporting, which means covering almost the whole range of stories that d a ily come across the C it y Desk. Barmann, in recent years, has done chiefly features for the Plain Dealer, including a great many interviews with headline personalities and people of the theater. Also, he has written feature stories about the C iv il W a r . H e traveled through the Deep South, from New Orlea ns to Charleston, S.C., and wrote a series of articles on what Southerners were thinking in this 100th anniversary of that war. A native of Chillicothe, Ohio, Barmann attended M ia m i University at Oxford, O., before transferring to journalism at the University of Illinois.

You can see ABBYY was much more accurate, but its problem is that it peppers extraneous spaces in the text. If you searched Google for George Barmann, it would find the 1DollarScan pdf but not the ABBYY pdf. This is because it is trying to line up the highlighted hidden OCR to the image of the text on top of the OCR. Since the font is a bit funky, is hand-typeset and has kerning, ABBYY breaks up words when it adds needless spaces. Both OCR results were a bunch of separate lines that I concatenated above so they would fit this post. Where the ABBYY version has hyphens, those are correct, there were line breaks there. Oh, I know, I can take a screen shot of the pdf images, here:

1DollarScan-OCR-sample

The 120MB 1DollarScan screenshot has way less image compression, if you click on the image you can see the author’s eyes much more clearly that the image below.

ABBYY-OCR-sample

The 1DollarScan 120MB pdf run through and re-recognized by ABBYY Finereader 11 is only 9MB, and the text quality is nearly as good. The ABBYY image quality suffers from the higher compression, so you should not erase the original 1DollarScan files.

You can see that the 9MB ABBYY is almost as good for text as the 120MB 1DollarScan pdf, but the image in the 1DollarScan pdf is clearly better. So for things like a yearbook, I definitely will keep the larger 1DollarScan file, and maybe make a ABBYY pdf out of that to send around or post online. I looked into the extraneous spaces in ABBYY and there seems to be no “cure”. I tried making a “tagged” pdf in ABBYY and it is just much bigger and even worse OCR.

OK, so you can see that 1DollarScan is the real deal, here is a photo montage.

KONICA MINOLTA DIGITAL CAMERA

Hiroshi Nakano examines the books dropped off for scanning at 1DollarScan.

KONICA MINOLTA DIGITAL CAMERA

One side of the warehouse at 1DollarScan is for books waiting to be scanned. Lead times are only a week or two.

KONICA MINOLTA DIGITAL CAMERA

Hiroshi Nakano uses this guillotine stack paper cutter to remove the bindings of your books.

KONICA MINOLTA DIGITAL CAMERA

Hiroshi Nakano shows the spine of a book that he has cut off with the guillotine stack paper cutter at 1DollarScan.

KONICA MINOLTA DIGITAL CAMERA

Here is the workstation where an employee at 1DollarScan feeds several scanners and once, while tending to paper jams and insuring you get the perfect scan.

I should mention that I asked Hiroshi Nakano if I should not show the heart of his operation above with the multiple scanners being fed by his employee. I told him that someone might see it and try to compete with him. Nakano smiled and said, “Nobody can compete with me.” I love the precision and factual nature of my fellow engineers, don’t you? Lets face it, a dollar to scan 100 pages with OCR is pretty remarkable.

KONICA MINOLTA DIGITAL CAMERA

Once the books are scanned and the pdfs are posted for your download, 1DollarScan holds your books for two weeks, in case there were any problems. After that, the copyrighted books are recycled, or un-copyrighted materials are sent back to you if you pay shipping.

KONICA MINOLTA DIGITAL CAMERA

Hiroshi Nakano from 1DollarScan patiently explained his operation to me and I was assured that it really is true that he can do high-quality scans of your books and magazines for a very low price.

There is real joy in being able to keep all my books in electronic form while dispensing with hundreds, maybe 1000 pounds of paper. Lets see if I can find a picture–

Paul-Rako-scanning

An engineers can collect a lot of paper. There were tax records for my business, project folders for jobs I worked on, letters from college girlfriends, owners manuals, and two big stacks of books you can barely see in the back right corner. The ammo boxes bottom right are full of pictures and negatives.

It took about six months, just scanning in all these loose papers. The hand-written letters from girlfriends I kept as 300dpi jpegs. Same for my hand-written printed notes, the OCR in ABBYY is pointless on handwriting anyway. For pictures, I scanned them at 600dpi, anything finer I could not see any difference on the 47-inch TV I use as a monitor. For negatives and slides I did 2400dpi, which is the same spatial resolution as doing the printed picture at 600dpi. I used ABBYY to make pdf files of any printed materials, including some booklets that I thought 1DollarScan might not want to do. But all the books, yearbooks, magazines, and manuals, well, it was just so nice to send those two big stacks to 1DollarScan and have it taken care of my by some diligent professionals. Lets face it, disk space is nearly free. I have a 2-Terabyte NAS (network-attached storage) at home that can hold all these files with room to spare.

Paul-Rako_scanning-desk

For scanning all my loose documents, I had a Canon laser MF 4890dw on the right. For 11×17 and oversize, a Brother MFC-J6710DW inkjet on the left. For pictures, slides and negatives a Canon CanoScan 8800F back-lit flatbed in the middle.

A standard desk would hold all three of my scanners, The laptop was driving my two TVs, and a wireless keyboard and mouse did the control. Lots of paper towels and Windex to keep the platens clean. It was a monumental job but now it is done. I will keep all my receipts and records on the NAS now. I back it up onto the laptops, and to a SSD (solid-state drive) I keep in the safety deposit box at the bank. I have auto titles and my birth certificate as paper, everything else is virtual. It is heaven. I gave away the two printer-scanners but kept the flatbed so I can do receipts and such as they come in. No more shoe boxes full of receipts for me.

Paul-Rako_scanned-documents

I made three runs to the Sunnyvale dump with the scanned paper. My pal said some companies will let you put your personal stuff in their shredder boxes. Either way, it is great to have all kinds of room, as long as I resist the temptation to fill it up with old test equipment or Sportster parts. And for getting rid of that stuff, you can use flea markets, Craigslist, and eBay.

Stock-engine-test_1969-Chevrolet-327-cu.in.-V-8-42p_ABBYY

Here is a link to a scan I had done by 1DollarScan and then ran through ABBYY Finereader. It went from 28MB to 2.7MB. The booklet a really cool engine test report I had from my student days at GMI. Since Mary Barra, the CEO of GM went to GMI too, hopefully she won’t sic a bunch of high-tone Detroit lawyers on me. I do note there is no copyright symbol on the document. Now the blocky shading on the title is due to the compression in ABBYY. The 1DollarScan document does not have those artifacts. But it is 10 times bigger. Note how the scan is straight and note how they scanned the both sides of the back cover, even when there was no text. You want the whole booklet scanned, they do it. Now they do charge 2 dollars for magazines, and I am not sure they counted this booklet as a magazine or thin book. In any event, that was why it was worth it to get the premium membership for a month. Hiroshi Nakano thought I was being fair and I thought the same about him. More than fair. Part of the premium service is they give the pdf file the name of the book. In this case they carefully typed: Stock engine test, 1969 chevrolet 327 cu.in.v-8, 42p.pdf. Since I am putting it on a web server, I changed the name to my convention: Stock-engine-test_1969-Chevrolet-327-cu.in.-V-8-42p_ABBYY.pdf. When pals talk trash about GM, I whip out this 45-year-old engine test. General Motors knows more about cars and good engineering than all the congressmen and lawyers put together. I still miss being an auto engineer.