Category Archives: Design Trends

Measuring flash speed with AVR


How fast is your flash?


Whether you’re a Maker or a photographer, there’s nothing more interesting than learning about timers, interrupts and input capture on AVR MCUs. And, if you’re a flash fanatic like Matt Kane of Vela Labs, you’re sure to love his latest project: a low-cost, high-speed timer for camera flashes as an Arduino shield.

flahs

When it comes to measuring flash speed, it is typically done in one of two ways. One is determining the lag time between the trigger signal at the hotshot or sync cable and the light emitting from the flash. If this remains consistent, everything is fine. The other is the speed of the pulse width, which refers to the amount of time that the lamp is shining. This is analogous to shutter speed, and combined with the luminosity of the flash gives the exposure. When varying the “power” of a speed light, it doesn’t actually change the brightness of the flash; instead, it simply alters the pulse width. This is why for high-speed photography you need your flash to be on its lowest power setting.

“For most high speed photography, lag isn’t a major problem as long as it’s consistent. If you’re capturing a bullet you can compensate for lag by simply moving the camera further from the gun. If it’s inconsistent then it’s more of a problem, as this makes it very hard to align shots. The really important thing is the pulse width. The longer the pulse, the more motion blur you’ll get in your shot. Sure you can test this by trial and error, but it’s a lot easier if we measure it first as it means we can easily calculate what sort of speed of object we can capture with the flash,” Kane explains.

While usual equipment like a photodetector and oscilloscope that can do the trick, it will generally set someone back quite a few bucks. However, Kane’s DIY project is a much more affordable, easy-to-use way to measure both types of flash speed. In fact, the Maker used a $0.50 photodiode that is sensitive to visible light and a 3.5mm jack that ties into the flash remote, both of which are wired to an Arduino Leonardo (ATmega32U4). The current measured through the device indicates the brightness of the shining light, while an added RC filter helps avoid high frequency noise interfering with their readings. Meanwhile, a 50ohm load resistor provided Kane with enough voltage to measure with the Arduino.

schematic

A push button was tasked with the triggering. To get a reading for just the pulse width, Kane pointed the flash towards the detector and fired away. It then printed the pulse width over serial. As Kane advises, if you want to measure the lag as well, then the flash must be connected the shield and pointed at the detector, while pressing the shield’s button. This will then allow the user to receive both values over serial.

So why turn to AVR for the project? “ATmega chips have a built-in analog comparator which is great for this. This measures whether the voltage on one pin is higher or lower than the reference voltage and generates an interrupt or sets a register accordingly. The reference voltage can either be the micro’s internal reference voltage, or a voltage on an external pin. We’ll be using the latter so that we can set our threshold. Once the voltage from the photodiode goes over that threshold it will trigger an interrupt. A little trial and error with the oscilloscope showed that 100-200mV was a good threshold, so I used a voltage divider to generate this.”

With just some work around high-speed timers and interrupts on Arduino, you too can determine the speed of your flash. Head over to the project’s official page to get an in-depth breakdown of the build.

Analyzing real-time tweets with PubNub’s Data Stream


How’s America feeling? With PubNub’s real-time Twitter Stream, you can find out.


By now, many of us have become used to the ubiquity of streams when it comes to consuming content online, ranging from RSS feeds and blogs to social media channels and services. Drinking from a data firehose API is a powerful and fast way to stream data from any source in realtime, whether it be weather reports, stock quotes or tweets, updated as they change. To do this, one needs a robust and fast data stream network to transfer the data packets through, presenting it to your end users in real-time.

B4WdZ2pCAAAtC8_1

Subsequently, PubNub recently released a demo Twitter Stream published through their hosted websockets, which can be consumed on a variety of platforms using one of their many SDKs. This enables a developer to skip the complicated process of long polling and writing the front-end code with JavaScript, as well as sending and receiving JSON data. Now, with its new realtime Twitter Firehose Stream, users can consume and turn this public data into visualizations.

PubNub2

Just as its name implies, Twitter Stream is a realtime steam of actual tweets on Twitter at a maximum rate of 50 tweets per second. With it, you can build cool things like realtime tweet boards, as well as crunch data for social interactions in specific regions, or based on specific keywords. To demonstrate its speed and scalability, the PubNub devised a demo to display tweets by analyzing how people throughout the U.S. are feeling emotionally at any given moment. The demo works by looking for certain words and emoticons in the incoming Twitter Firehose Stream that indicate the person’s mood, then mapping that person by state.

PubNub_1-1

Through its collaboration with the social network, another one of PubNub’s streams included a list of Spotify albums people are listening to on Twitter. Inspired by the iTunes album artwork screensaver, the team created a visualization of the latest album artwork appearing on their Twitter firehouse sample. The result is an ambient background fueled by real listeners, which can be viewed here.

“Thanks to PubNub, Twitter and Embedly, this app exists entirely on the front end.” Ian Jennings writes. “You can even fork and edit the app in CodePen.”

Interested in learning more? First, check out this Twitter emotion stream app, then continue on to its album visualization, and finish up by reading the team’s entire tutorial. Don’t forget to check out PubNub’s Doron Sherman’s latest piece on securing the Internet of Streams, too!

What’s ahead this year in digital insecurity?


Here’s a closer look at the top 10 cyber security predictions for 2015.


In 2014 worries about security went from a simple “meh” to “WTF!” Not only did high-profile attacks get sensational media coverage, but those incidents led to a pivotal judicial ruling that corporations can be sued for data breaches. And as hard as it is to believe, 2015 will only get worse because attack surfaces are expanding as mobile BYOD policies overtake enterprises, cloud services spread, and a growing number of IoT networks get rolled out. Add m-commerce, e-banking, and mobile payments to the questionable tradition of lax credit card security infrastructure in the U.S. and you get a perfect storm for cybercrime.

In fact, 92% of attacks across the range of segments come from nine basic sources (seen in the diagram below), according to Verizon. More numerous and sophisticated cyber crimes are anticipated for this year and beyond.

z1

 1. More companies to get “Sony’d”

2014 saw the release of highly-evolved threats from criminals that in the past only came from governments, electronic armies and defense firms. A wide-range of targets included organizations in retail, entertainment, finance, healthcare, industrial, military, among countless other industries. As a repeat offender, Sony is now the cyber-victim poster child, and the term “Sony’d” has become a verb meaning digital security incompetence. Perhaps Sony’s motto should be changed from “make.believe.” to “make.believe.security.” Just saying!

Prior to 2014, companies on a wholesale basis tended to simply deny cyber vulnerabilities. However, a string of higher profile data breaches — such as Sony, Heartbleed, Poodle, Shellshock, Russian Cyber-vor, Home Depot, Target, PF Chang’s, eBay, etc. — have changed all of that. Denial is dead, but confusion and about what to do is rampant.

2. Embedded insecurity rising

Computing naturally segregates into embedded systems and humans sitting in front of screens.  Embedded systems are processor-based subsystems that are “embedded” into other machines or bigger systems.  Examples are routers, industrial controls, avionics, automotive engine and in-cabin systems, medical diagnostics, white goods, consumer electronics, smart weapons, and countless others.  Embedded security was not a big deal until the IoT emerged, which will lead to billions of smart, communicating nodes.  15 to more than 20 billion IoT nodes are being forecast by 2020, which will create a gigantic attack platform and make security paramount.

IoT Installed

A recent study by HP revealed that 70% of interconnected (IoT) devices have serious vulnerabilities to attacks. The devices they investigated consisted of “things” like cloud-connected TVs, smart thermostats and electronic door locks.

“The current state of Internet of Things security seems to take all the vulnerabilities from existing spaces — network security, application security, mobile security and Internet-connected devices — and combine them into a new, even more insecure space, which is troubling,” HP’s Daniel Miessler stated.

Issues HP identified ranged from weak passwords, to lack of encryption, to poor interfaces, to troubling firmware, to unencrypted updating protocols. Other notable findings included:

  • 60% of devices were subject to weak credentials
  • 90% collected personal data
  • 80% did not use passwords or used very weak passwords
  • 70% of cloud connected mobile devices allowed access to user accounts
  • 70% of devices were unencrypted

Investigators at the Black Hat Conference demonstrated serious security flaws in home automation systems. At DEFCON, investigators hacked NFC-based payment systems showing that passwords and account data was vulnerable. They also revealed that the doors of a Tesla car could be hacked to open while in motion. Nice! Other attacks were exploited on smart TVs, Boxee TV devices, smartphone biometric systems, routers, IP cameras, smart meters, healthcare devices, SCADA (supervisory, control and data acquisition) devices, engine control units, and some wearables. Even simple USB firmware was proven to be highly vulnerable… “Bad USB.”

These are just the tip of the embedded insecurity iceberg. Under the surface is the entire Dark Net which adds even more treacherousness. Security companies like Symmantic have identified home automation as a likely early IoT attack point. That is not surprising because home automation will be an early adopter of IoT technologies, after all. In-house appliances also represent an attractive attack surface as more firmware is contained in smart TVs, set top boxes, white goods, and routers that also communicate. Node-to-node connectivity security extends to industrial settings as well.

Tools like Shodan, which is the Google of embedded systems, make it very easy for hackers to get into the things in the IoT.  CNN recently called Shodan the scariest search engine on the Internet. You can see why since everything that is connected is now accessible. Clearly strong security, including hardware-based crypto elements, is paramount.

 3. More storms from the cloud

z5

It became clear in 2014 that cloud services such as iCloud, GoogleDrive, DropBox and others were rather large targets because they are replete with sensitive data (just ask Jennifer Lawrence). The cloud is starting to look like the technological Typhoid Mary that can spread viruses, malware, ransomware, rootkits, and other bad things around the world. As we know by now, the key to security is how well cryptographic keys are stored.   Heartbleed taught us that, so utilizing new technologies and more secure approaches to maintain and control cryptographic keys will accelerate in 2015 to address endemic cloud exposure. Look for more use of hardware-based key storage.

4. Cyber warfare breaks out

eBay, PF Chang’s, Home Depot, Sony, JP Morgan, and Target are well-known names on the cybercrime blotter, and things will just get worse as cyber armies go on the attack. North Korea’s special cyber units, the Syrian Electronic Army, the Iranian Cyber Army (ICA), and Unit 61398 of the People’s Liberation Army of China are high profile examples of cyber-armies that are hostile to Western interests. Every country now seems to have a cyber-army units to conduct asymmetric warfare. (These groups are even adopting logos, with eagles appearing to be a very popular motif.)

z6

Cyber warfare is attractive because government-built malware is cheap, accessible, and covert, and thus highly efficient. Researchers have estimated that 87% of cyber-attacks on companies are state-affiliated, 11% by organized crime, 1% by competitors, and another 1% by former employees. Long story short, cyber war is real and it has already been waged against non-state commercial actors such as Sony. It won’t stop there.

 5. Cybercrime mobilizes

According to security researchers, mobile will become an increasingly attractive target for hackers. Fifteen million mobile devices are infected with malware according to a report by Alcatel-Lucent’s Kindsight Security Labs. Malvertising is rampant on untrusted app stores and ransomware is being attached to virtual currencies. Easily acquired malware generation kits and source code make it extremely easy to target mobile devices. Malicious apps take advantage of the Webkit plugin and gain control over application data which hands credentials, bank account, and email details over to hackers. What’s more, online banking malware is also spreading. 2014 presented ZeuS, which stole data, and VAWTRAK that hit online banking customers in Japan.

Even two-factor authentication measures that banks employ have recently been breached using schemes, such as Operation Emmental. Emmental is the real name of Swiss cheese, which of course is full of holes just like the banking systems’ security mechanisms.  Emmental uses fake mobile apps and Domain Name System (DNS) changers to launch mobile phishing attacks to get at online  banking  accounts and steal identities. Some researchers believe that cybercriminals will increasingly use such sophisticated attacks to make illegal equity front running and short selling scams.

z7

6. Growing electronic payments tantalize attackers

Apple Pay could be a land mine just waiting to explode due to NFC’s susceptibility to hacking. Google Wallet is an example of what can happen when a malicious app is granted NFC privileges making it capable of stealing account information and money. M-commerce schemes like WeChat could be another big potential target.

z8

E-payments are growing and with that so will the attacks on mobile devices using schemes ranging from FakeID to master key. Master key is an exploit kit similar to blackhole exploit kit that specifically targets mobile, where FakeID allows malicious apps to impersonate legitimate apps that allow access to sensitive data without triggering suspicion.

7. Health records represent a cyber-crime gold mine

Electronic Health Records (EHR) are now mandatory in the U.S. and a vast amount of personal data is being collected and stored as never before. Because information is money, thieves will go where the information is (to paraphrase Willie Sutton). Health records are considered higher value in the hacking underground than stolen credit card data. Criminals throughout both the U.S. and UK are now specializing in health record hacking. In fact, the U.S. Identity Theft Resource Center reported 720 major data breaches during 2014 with 42% of those being health records.

8. Targeted attacks increase

Targeted attacks, also known as Advanced Persistent Threats (APTs), are very frightening due to their stealthy nature. The main differences between APTs and traditional cyber-attacks are target selection, silence, and duration of attack. According to research company APTnotes, the number of attacks by year went from 3 in 2010 to 14 in 2012 to 53 in 2014. APT targets are carefully selected, in contrast to traditional attacks that use any available corporate targets. The goal is to get in quietly and stay unnoticed for long periods of time, as seen in the famous APT attack that victimized the networking company Nortel. Chinese spyware was present on Nortel’s systems for almost ten years without being detected and drained the company of valuable intellectual property and other information. Now that’s persistent!

9. Laws and regulations try to play catch up

A number of cyber security laws are being considered in the U.S. including the National Cybersecurity Protection Act of 2014, which advocates the sharing of cybersecurity information with the private sector, provide technical assistance and incident response to companies and federal agencies.   Another one to note is the Federal Information Security Modernization Act of 2014 that is designed to better protect federal agencies from cyber-attacks. A third is the Border Patrol Agent Pay Reform Act of 2013 to recruit and retain cyber professionals who are in high demand. Additionally, there is the Cybersecurity Workforce Assessment Act, which aims to enhance the readiness, capacity, training, recruitment, and retention of the cybersecurity workforce. President Obama stated that wants a 30-day deadline for notices and a revised “Consumer Privacy Bill of Rights.”

One of the more interesting and intelligent recommendations came from the FDA, who issued guidelines for wireless medical device security to ensure hackers could not interfere with things such as implanted pacemakers and defibrillators. This notion was is part stimulated by worry about Dick Cheney’s pacemaker being hacked. In fact countermeasures were installed by on the device by Cheney’s surgeon. More regulation of health data and equipment is expected in 2015.

“Security — or the lack of it — will largely determine the success or failure of widespread adoption of internet-connected devices,” the FTC Commissioner recently shared in an article. The FTC also released a report entitled, “Privacy & Security in a Connected World.”

10. Hardware-based security may change the game

According to respected market researcher Gartner, all roads to the digital future lead through security. At this point, who can really argue with that statement? Manufacturers and service providers are seeing the seriousness of cyber-danger and are starting to integrate security at every connectivity level. Crypto element integrated circuits with hardware-based key storage are starting to be employed for that. Furthermore, these crypto elements are a kind of silver bullet given that they easily and instantly add the strongest type of security possible (i.e. protected hardware-based key storage) to IoT endpoints and embedded systems. This is a powerful concept whose fundamental value is only starting to be recognized.

IoT Node Chart 1

Crypto elements contain cryptographic engines to efficiently handle crypto functions such as hashing, sign-verify, ECDSA, key agreement (e.g.  ECDH), authentication (symmetric or asymmetric), encryption/decryption, message authentication coding (MAC), run crypto algorithms (e.g. elliptic curve cryptography, AES, SHA) and many other functions.

The hardware key storage plus crypto engine combination in a single device makes it simple, ultra-secure, tiny, and inexpensive to add robust security. Recent crypto element products offer ECDH for key agreement and ECDSA for authentication. Adding a device with both of these powerful capabilities to any system with a microprocessor that can run encryption algorithms (such as AES) brings all three pillars of security (confidentiality, data integrity and authentication) into play.

2014-Crypto-Security-at-our-Core-Atmel-Has-You-Covered

With security rising in significance as attack platforms increase in size and threats become more sophisticated, it is good to know that solutions are already available to ensure that digital systems are not only smart and connected, but robustly secured by hardware key storage. This could be the one of the biggest stories in security going forward.

Doctors create a trachea using a MakerBot 3D printer


3D printing has helped Feinstein Institute researchers create cartilage designed for tracheal repair or replacement.


It’s not so much a question as to if 3D printing will be an integral part of medical procedures in the future, it’s more so when. And apparently, we are closer than ever before. While we’ve seen everything from 3D-printed splints to prosthetics to organs, a team of researchers at The Feinstein Institute for Medical Research has made yet another medical breakthrough using a MakerBot Replicator 2X.

trachea-blog-header

This time, the scientists created cartilage designed for tracheal repair or replacement. Also known as the “windpipe,” the trachea is the tube that connects the upper respiratory tract to the lungs. Never before has a regular PLA filament been used to print custom tracheal scaffolding, not to mention combined with living cells to create a tracheal segment. Traditionally speaking, there has been two traditional means of reconstructing a damaged trachea — both of which present a number of constraints. Both treatments have involved removal of the affected tracheal segment.

As a solution to the growing problem, Feinstein Institute investigator Todd Goldstein along with Dr. Daniel A. Grande of the Orthopedic Research Laboratory inquired as to whether 3D printing could be a suitable alternative.

“Three-dimensional printing and tissue engineering has the potential for creation of a custom-designed tracheal replacement prosthesis in the lab so that the affected tracheal segment can be ‘swapped out’ instead of removed,” explained Goldstein. “Our results show that three-dimensional printing can be combined with tissue engineering to effectively produce a partial tracheal replacement graft in vitro. Our data demonstrate that the cartilage cells seeded on the graft retain their biological capability and were able to proliferate at the same rate as native cells.”

Similar to earlier efforts we’ve seen around bioresorbable splints that have saved the life of infants, The Feinstein Institute’s research combined two emerging fields: 3D printing and tissue engineering. Tissue engineering is like other kinds of engineering, except instead of using steel or computer code to make things, living cells from skin, muscle or cartilage are the raw material. Already knowing how to construct cartilage from a mixture of cells called chondrocytes, nutrients to feed them and collagen, a 3D printer can craft scaffolding, which can be covered in a mixture of chondrocytes and collagen, which then grows into cartilage.

3d-printed-trachea

“Making a windpipe or trachea is uncharted territory,” noted Goldstein. “It has to be rigid enough to withstand coughs, sneezes and other shifts in pressure, yet flexible enough to allow the neck to move freely. With 3D printing, we were able to construct 3D-printed scaffolding that the surgeons could immediately examine and then we could work together in real time to modify the designs. MakerBot was extremely helpful and consulted on optimizing our design files so they would print better and provided advice on how to modify the MakerBot Replicator 2X Experimental 3D Printer to print with PLA and the biomaterial. We actually found designs to modify the printer on MakerBot’s Thingiverse website to print PLA with one extruder and the biomaterial with the other extruder.”

Demonstrating the cost-effectiveness and efficiency of Atmel based desktop 3D printers, The Feinstein Institute had previously sought out a number of machines that could extrude living cells; however, such devices run upwards of $180,000. This would be fine and dandy, except for the fact that the researchers hadn’t even proven the concept nor confirm it would indeed be a viable option. Luckily, the MakerBot Replicator 2X Experimental 3D Printer only set them back $2,500.

“The ability to prototype, examine, touch, feel and then redesign within minutes, within hours, allows for the creation of this type of technology,”  said Lee Smith, MD, Chief of Pediatric Otolaryngology at Cohen Children’s Medical Center. “If we had to send out these designs to a commercial printer far away and get the designs back several weeks later, we’d never be where we are today.”

Originally, the team thought that a special PLA would be required in order to maintain sterility and be dissolvable within the body. However, in light of time, they decided to try regular MakerBot PLA filament. Through testing, Goldstein found that the heat from the extruder head sterilized the PLA as it printed, so he was able to use ordinary MakerBot PLA Filament.

B8dIBIdIAAAUTEg.jpg-large

The process consisted of extruding bio-ink he bio-ink to fill the gaps in the PLA scaffolding, which transforms into a gel on the heated build plate. Once the bio-ink adheres to the scaffolding, it goes into a bioreactor to keep the cells warm and growing evenly.

“The research being done at the Feinstein Institute is exciting and promising,” noted Jenny Lawton, MakerBot CEO. “We are continually amazed by what is being created with 3D Printers. To know that a MakerBot Replicator 3D Printer played a role in a potential medical breakthrough is inspiring.”

The results of the study illustrate how the 3D printed windpipe or trachea segments held up for four weeks in an incubator. According to Mr. Goldstein’s abstract, “The cells survived the 3D printing process, were able to continue dividing, and produced the extracellular matrix expected of tracheal chondrocytes.” In other words, they were growing just like windpipe cartilage.

While the work still remains a proof-of-concept, the researchers still have their work ahead of them before establishing a new protocol for repairing damaged windpipes. According to Dr. Smith, at least one patient comes through the North Shore-LIJ Health System each year who can’t be helped by the two traditional methods. What’s more, he expects in the next five years to harvest a patient’s cells, grow them on a scaffolding, and repair a windpipe. This customized approach may prove to be especially useful for treating children.

“Do you remember the Six Million Dollar Man?” Dr. Grande asks. “The Bionic Man is not the future, it’s the present. We have that ability to do that now. It’s really exciting.”

The Maker Movement has used Atmel powered 3D printers, ranging from MakerBot to RepRap, for quite some time now — but it is abundantly clear that the next-gen technology is quickly entering a new and important stage. Interested in learning more? You can read all about the project on MakerBot’s official blog, as well as watch the video below.

McFly! Self-lacing shoes really are coming this year


Aside from the time-travelling DeLorean DMC-12 and hoverboard, there was another notable design from Back To The Future II we’ve all been waiting for to come to fruition: self-tying laces.


At last, Nike has confirmed that they are indeed working on the Hollywood-inspired shoe. Earlier this month, shoe designer Tinker Hatfield (who had also created Marty McFly’s shoes for the film) expressed that the self-lacing Nike MAGs will be available later this year coinciding with the 30th anniversary of the original BTTF flick.

The new footwear will feature power laces, in which motorized rollers in the sole sense weight and tighten when someone steps into the shoes, as seen in the iconic film. To support evidence that this innovation is more than just a clever concept, Nike has already filed a patent for the futuristic footwear. This should come with little surprise, as the idea has been in the works for a while now. If you recall, the company has already experienced incredible demand for such a sneaker back in 2011 when they had auctioned off 1,500 pairs of limited edition MAGs. At the time, the proceeds went to the Michael J. Fox Foundation.

nike-mag-1

This announcements follows in the footsteps of recent reports, which indicate the rise of smart clothing. While wrist-adorned devices will continue on, Gartner believes the emergence of less invasive devices, particularly embedded garments, will potentially disrupt the wearables space. So much so that shipments of smart attire is projected to increase from a mere 0.1 million units in 2014 to 26 million units in 2016 — and maybe more, pending on the popularity of the power laces!

While we await the arrival of these high-tech high-tops, a San Francisco-based Maker Blake Bevin has already created her own kicks capable of tying themselves using ATmega168. When a person steps into the shoe, a force sensor reads the pressure of their foot and activates two servo motors, which apply tension to the laces, thus tightening the shoe.

To commemorate this next-gen footwear, we’ve compiled 10 high-tech shoes indicating that the future has arrived.

Shoes that play music

The adidas MEGALIZER lets breakdancers create their own music with their moves.

Shoes that light up

Using an Adafruit NeoPixel strip and FLORA (ATmega32U4), anyone can add some flare to their high-tops.

Shoes that give directions

Bluetooth-enabled Lechal sneakers sync with Google maps and help guide you to your destination.

Shoes that are 3D-printed

Nike’s Vapor Laser Talon cleats not only used 3D printing for prototyping, but implemented a 3D-printed plate into the final product that made its debut at Super Bowl XLVIII.

Shoes that start fire

The sole of Rocky S2V Substratum hiking boots feature a small compartment specially designed to fit a fire-starting kit.

Shoes that power devices

German researchers have built shoe-sized devices that harvest power from the act of walking.

Shoes that receive tweets

For the 2012 Summer Olympics in London, Nash Money Design teamed up with adidas to create the Social Media Barricade shoe. Equipped with a two-line LCD screen, the sneaker were able to receive Twitter updates.

Shoes that repair themselves

Developed by London designer Shamees Aden, the self-healing concept shoes are 3D-printed from material using protocell technology.

Shoes that save lives

A new sensor-laden shoe made by Swedish researchers allows firefighters to be tracked in places where GPS fails.

Shoes that know when you need a new pair

apple-smart-shoes

Apple has applied for a patent of “smart shoes” that would come with embedded sensors to track your activity and tell you when you need a new pair.

Report: 1 in 5 cars will be connected by 2020


The increased consumption and creation of digital content within cars will lead to sophisticated information and entertainment systems.


If you buy a car within the next five years, it’s likely that it will be Internet-enabled. That’s the prediction Gartner has shared, anyway. The market research firm has released its latest report that expects there to be approximately 250 million connected cars on the road by 2020, paving the way for new in-vehicle services and automated driving capabilities. In other words, one in five vehicle will boast some sort of wireless network connection.

vehicleswithcircleshighway-660

During the next five years, the proportion of new vehicles equipped with this capability will increase dramatically, making connected cars an integral element of the rapidly-growing Internet of Things (IoT) — an area Gartner forecasts will entail 4.9 billion connected things in use this year and will reach 25 billion by 2020.

“The connected car is already a reality, and in-vehicle wireless connectivity is rapidly expanding from luxury models and premium brands, to high-volume midmarket models,” explained James F. Hines, Gartner Research Director. “The increased consumption and creation of digital content within the vehicle will drive the need for more sophisticated infotainment systems, creating opportunities for application processors, graphics accelerators, displays and human-machine interface technologies. At the same time, new concepts of mobility and vehicle usage will lead to new business models and expansion of alternatives to car ownership, especially in urban environments.”

atmel-avantcar-780x530

The proliferation of vehicle connectivity will have implications across the major functional areas of telematics, automated driving, infotainment and mobility services. Driving the adoption of connected car technology is the expansion of high-bandwidth wireless network infrastructure, rising expectations for access to mobile content and better service from smartphones and tablets. While many of the major automakers have rolled out connected cars in a number of limited models, in-vehicle wireless connectivity is rapidly expanding from luxury and premium brands to high-volume mid-market versions. Take for instance, General Motors, Hyundai and Chrysler, who have each partnered with telecoms AT&T, Verizon and Sprint, respectively.

By 2018, two automakers will have announced plans to become technology companies and expand their connected-vehicle value experiences to other industries and devices, Gartner said in a report last year. And over the next five years, at least one auto company will achieve 10% of its total revenues from connected mobility and service offerings.

“The increased consumption and creation of digital content within the vehicle will drive the need for more sophisticated infotainment systems, creating opportunities for application processors, graphics accelerators, displays and human-machine interface technologies,” Hines stated.

As the amount of information being fed into in-car head unit or telematics systems grows, vehicles will be able to capture and share not only internal systems status and location data, but also changes in surroundings in real-time, Computer World writes. Ultimately, your car will become just another part of your mobile data plan.

avantcar2

“To facilitate that kind of shift, connected-vehicle leaders in automotive organizations need to partner with existing ecosystems like Android Auto or Apple CarPlay that can simplify access to and integration of general mobile applications into the vehicle,” Gartner Analyst Thilo Koslowski shared in last year’s report.

The Gartner report follows recent revelations from IBM, who in the company’s Automotive 2025 study found that a majority of executives believe cars will become more personalized for drivers over the next 10 years, but autonomous vehicles and self-driving cars will not yet be ubiquitous. In fact, IBM anticipates that by 2025, vehicles will be intelligent enough to configure themselves to a driver and other occupants. In other words, cars will be able to learn, heal, drive and socialize with others on the road, and their surrounding environment through vehicle-to-vehicle communication.

Without question, the demand for advanced driver assistance systems (ADAS) is on the rise as well. According to ABI Research analysts, the market is expected to grow from $11.1 billion last year to $91.9 billion by 2020, hitting the $200 billion mark by 2024. Fueling that growth is the expansion of the technology from high-end luxury vehicles to more affordable cars and mini automobiles. One of the most popular systems on high-end vehicles, adaptive cruise control (ACC), will continue to gain popularity across all vehicle segments, with shipments experiencing a CAGR of 69% between 2014 and 2020.

 

Video: Rob Valiton discusses the future of automotive at CES 2015


The car of the future could have a curved center display with tons of real estate for driver information and entertainment. 


It’s no surprise that automotive technology has emerged as an integral component of our digital lifestyle, as more and more consumers are looking to bring their mobile devices seamlessly into their vehicles. During CES 2015, ARMdevices.net had the chance to catch up with Rob Valiton, Atmel Senior Vice President & General Manager, to discuss the connected car — most notably, the next generation of infotainment user interfaces.

10929927_1014246888592481_347934713395376436_n

With up to a hundred million lines of code, at least 30 MCU-controlled devices — and some with as many as 100 — the vehicle is the ideal application to bring smart, connected devices in the era of the Internet of Things (IoT). Not only will these automobiles be packed with futuristic functionality ranging from navigation and parking assistance to diagnosis and road conditions, they will become much more intuitive and integrated with smartphone-like interfaces. In order to provide this, the car of tomorrow will feature a curved center console display offering a large amount of real estate for information to drivers. And, the newly-announced AvantCar 2.0 will make this possible.

Luckily, the AvantCar 2.0 brings advanced connectivity into the vehicle through an advanced HMI console connected to a concept car highlighting car access, car networking, MCUs, audio-over-Ethernet, MHL support and security technologies. Focusing on user requirements, the fully-functional console concept boasts curved touchscreens using maXTouch touchscreen controllers and XSense flexible touch sensors, as well as Atmel’s QTouch with proximity sensing, and LIN networking for ambient lighting controls.

Internet of Things value creation requires net neutrality


Kaivan Karimi, Atmel VP and GM of Wireless Solutions, explains how neutrality is the only way to bring next-gen service providers to the IoT table.


While it has now become the common understanding of the technology community that the Internet of Things (IoT) will impact every aspect of our lives and create massive value by improving processes and conserving resources, no one has started pointing at specifically how this whole “value creation” will happen, and how will it get managed? When GE talks about the addition of over $17-$30T dollars to the GDP of the world because of IoT, from where does that money come? Is it just because we connect a bunch of gadgets inside our homes to talk to each other? Really?

From my perspective, true IoT value is created through managed services, where a new generation of service providers will come to the table and offer differentiated services that do not exist today. Since everyone can, in one way or another, relate to “in-house IoT,” the best home automation has become the battle ground d’jour. Here’s an old cartoon that I had used a few years back to point at new generation of service providers that soon will be servicing your connected home.

Slide1

In order for this vision to take place, it requires common open systems that can be leveraged by the new generation of service providers, regardless of who initially installed those boxes and gadgets. The same goes for the “connectivity pipes” linking the home to these services providers in the cloud, which also needs to be open for access by these new service providers. In other words, broadband access “pipes” need to become open and shared between the service providers other than the current ISP sitting at the table. This isn’t any different than today one using HuluPlus services to what movies, except instead of HuluPlus pumping content to your television, it will be your new “home automation” service provider monitoring your connected home and smart gadgets to reduce your energy consumption, improve your quality of life, alert you of an appliance malfunction before it happens, in addition to a number of other useful services that’ll surely save you money and improve your quality of life (create value).

In advance of the new service providers coming to the table, current ISP providers decided that they can block and favor certain broadband traffic, over other ones. Those of you who have attended my IDTechEx classes or other conferences know, that for most part, there will be minimal traffic going to the cloud for command and control types of applications. So, it is not about the amount of traffic, but rather pipe owners (ISP providers) wanting a bigger piece of the pie by denying the new services providers equal access. In reality, an open system with the ability for new content and service providers offering new services without asking for permission from ISP gate keepers will enable the innovation that we are and will be experiencing in a bigger way in the future.

Slide2

For this, we need regulatory safeguards to protect against the risk that ISP/broadband providers favoring some Internet traffic over others, and become self appointed gate keepers. At the same time, heavy-handed regulations can stifle innovation in other ways and actually interfere with legitimate network management. Subsequently, there must be a balance and both sides need to come to the table to establish that equilibrium. This requires the U.S. government to force ISP/Broadband providers to play ball. From an IoT perspective, that’s what net neutrality debate is all about.

On November 10, 2014, President Barack Obama called on the Federal Communications Commission (FCC) to reclassify broadband Internet access service under Title II of the Communications Act. To decode the language, it means to reclassify broadband as a utility (note that nowadays, in most markets you have choices on whom your electricity service provider can be and are not stuck with just one provider like the old days). When I was at CES a few weeks ago I heard that FCC Chairman Tom Wheeler had announced that his office will vote on an official proposal for net neutrality on February 26th.

“We’re going to circulate it to the commissioners on February 5th and vote on it February 26th,” Wheeler told CEA President Gary Shapiro in a public interview. When Shapiro asked him about Title II, Wheeler talked about the need to find a balance between the allowances for innovation, while incentivizing the ISPs’ continued investment in broadband. In the past, the FCC has also addressed hybrid approaches to this problem.

“We’re going to propose rules that say that no blocking, no throttling, paid prioritization, all that list of issues, and that there is a yardstick against which behavior should be measured,” Wheeler added at CES. “And that yardstick is ‘just and reasonable.’”

Let’s go back to early 2000 and that generation of smartphones on closed platforms, as well as the few apps that were supported. When Apple opened iOS for apps developers, a whole new world of applications were created. After Google opened Android further in 2008, we’ve ended up with over 130,000 applications, with lots of folks hooked on them. In fact, just a few years ago, if you would have asked them about those apps, they would have no idea that they would be hooked on them upon using them. I am not asking that we need over 130,000 service providers at your home, but we definitely need more than the single broadband provider we currently have.

The bottom line is that net neutrality is the only way to open up the existing “closed system,” and to bring a new generation of IoT service providers to the table. This will lead to more choices, which will spur more innovations, which in turn will bring in more service providers. As a result, the cycle of IoT innovation will progress and create tangible value through new service provisions.

Interested in reading more insightful pieces from Kaivan Karimi? You can do so here.

16 tech trends Andreessen Horowitz is most excited about


This list lets you inside the mind of Marc Andreessen and Ben Horowitz. 


One of, if not the, most prominent VC groups in Silicon Valley has revealed the hottest tech trends changing the world right now. For those wondering, that firm is Andreessen Horowitz and we’re referring to no other than its “16 Things” list. The breakdown, which highlights the most investable spaces at the moment, unsurprisingly includes Internet of Things, digital health, crowdfunding, and security — a couple of areas in which we know a little something about.

schonfeld_andreessen-horowitz-2

“We don’t invest in themes; we invest in special founders with breakthrough ideas,” Andreessen Horowitz writes. “Which means we don’t make investments based on a pre-existing thesis about a category. That said, here are a few of the things we’ve been observing or thinking about.”

While the list — which includes several themes that were evident throughout the CES 2015 show floor — will likely change over time, it does provide a nice glimpse into the firm’s thinking at the start of this year. Just in case you don’t feel like clicking through and navigating a16z in its entirety, here’s a brief overview of those breakthrough areas.

Virtual Reality

“VR will be the ultimate input-output device. Some people call VR “the last medium” because any subsequent medium can be invented inside of VR, using software alone. Looking back, the movie and TV screens we use today will be seen as an intermediate step between the invention of electricity and the invention of VR. Kids will think it’s funny that their ancestors used to stare at glowing rectangles hoping to suspend disbelief.”

Sensorification of the Enterprise

“For enterprise, the value of the sensors is in being a shortcut for the user interface, potentially even replacing typing so we can concentrate on the easy, fun, creative things.”

Machine Learning and Big Data

“The key here is in more automated apps where big data drives what the application does, and with no user intervention.”

Full Stack Startups

“The old approach startups took was to sell or license their new technology to incumbents. The new, ‘full stack’ approach is to build a complete, end-to-end product or service that bypasses incumbents and other competitors.”

Containers

“The next step in containerization is treating the datacenter, with all its containers, like one giant computer or server. Many applications today are really just distributed systems: Applications aren’t necessarily confined to just one container.”

Digital Health

“Tomorrow? To understand your personal diagnostic data, you might soon depend more upon an iPhone app developed in a garage than on your local MD.”

Online Marketplaces

“We’re continuing to see tremendous innovation in marketplaces. The first generation of net companies saw a few big horizontal marketplace winners like eBay and Craigslist. But entrepreneurs are continuing to create the next generation of online marketplaces.”

Security

“There are two things now driving the security industry: (1) The bad guys are already inside. (2) New platforms — cloud and mobile — have arrived… Both are forcing a different set of technologies, and the creation of new kinds of companies.”

Bitcoin (and Blockchain)

“The clock has just begun on Bitcoin’s acceptance more broadly. Crash or no crash, we should expect a significant increase in the level of institutional adoption this year. Specifically, a large number of companies will put together groups focused on what Bitcoin means to them.”

Cloud-Client Computing

“Endpoints aren’t just phones; they could be wearables and other small devices and screens connected to the internet. Beyond the devices themselves, it all adds up to a massive amount of compute power. The next decade of computing will be about doing something with it.”

Crowdfunding

“Crowdfunding is going somewhere it never has — into the mainstream. That, in turn, will change all sorts of other things.”

Internet of Things

“Something often overlooked when we talk about all the shiny new connected gadgets emerging out of the Internet of Things is what happens to all the old things. I’m fascinated by the power of adding multiple sensors to old things and then connecting them to the Internet…. With the IoT we’re headed to a world where things aren’t liable to break catastrophically — or at least, we’ll have a hell of a heads up.”

Online Video

“What we do know is that online video is far from done… so it will be interesting to see what even a little competition will do here.”

Insurance

“Insurance is all about distributing risk. With dramatic advances in software and data, shouldn’t the way we buy and experience our insurance products change dramatically? Software will rewrite the entire way we buy and experience our insurance products — medical, home, auto, and life.”

DevOps

“The rise of the hyperscale cloud datacenter has now made this job much harder as developers have had to hack together tools and complex scripts for pushing code to thousands of pancake servers. This complex cloud infrastructure — coupled with the growth of the DevOps movement today — has opened up many opportunities, starting with helping developers and companies to manage the entire process … to much more.”

Failure

“The goal is not to fail fast. The goal is to succeed over the long run. They are not the same thing.”