Category Archives: Design Trends

Introducing the SAM DA1 series of Atmel | SMART MCUs


Atmel launches automotive grade ARM Cortex-M0+-based MCUs with capacitive touch hardware support for HMI and LIN applications.


Just in time for Embedded World 2015, Atmel has officially launched its next-generation family of automotive-qualified ARM Cortex-M0+-based MCUs with an integrated peripheral touch controller (PTC) for capacitive touch applications.

177145

The SAM DA1 is the first series in this Atmel | SMART MCU automotive-qualified product family, operating at a maximum frequency of 48MHz and reaching a 2.14 Coremark/MHz. Atmel’s SAM DA1 series is ideal for capacitive touch button, slider, wheel or proximity sensing applications and offers high analog performance for greater front-end flexibility. The new devices are available down to a very compact QFN 5x5mm package with wettable flanks for automated optical inspection.

Eliminating external components and offering more robust features, devices in the SAM DA1 series come with 32 to 64 pins, up to 64KB of Flash, 8KB of SRAM and 2KB read-while-write Flash and are qualified according to the AEC Q-100 Grade 2 (-40 to +105°C).

B-nxyLfUEAE1pUu-1.jpg-large

“As a leader in both automotive touch and LIN solutions, we are committed to bringing innovative, cost-effective solutions to next-generation vehicles,” explained Atmel’s VP of Automotive Matthias Kaestner. “With a comprehensive peripheral set for connectivity and state-of-the-art touch support, the SAM DA1 series allows system designers to perfect the human-machine interface in the automobile with capacitive touch. We are committed to offering a wide range of cost-optimized auto-qualified products for in-vehicle networking, infotainment connectivity and body electronics.”

Key features of the SAM DA1 series include:

  • Atmel | SMART ARM Cortex-M0+-based processor
  • 45 DMIPS
  • Vcc 2.7 to 3.63V
  • 16kB to 64kB Flash; 32 to 64 pins
  • Up to six SERCOM (Serial Communication Interface), USB, I2S
  • Peripheral Touch Controller
  • Complex PWM
  • AEC Q100 Grade 2 Qualified

To accelerate the design development, the ATSAMDA1-XPRO development kit is available to support the new devices. Furthermore, the new SAM DA1 series is also supported by Atmel Studio, Atmel Software Framework and debuggers.

sam-da1_hp_980x352_021815

Interested? The company is currently working on the SAM DA1 series with lead customers, with general sampling slated to begin at the end of April 2015. In the meantime, you can head over to the MCU family’s page here.

The politics of IoT privacy


Kaivan Karimi, Atmel VP and GM of Wireless Solutions, explores the ongoing privacy issues around the Internet of Things.


When it comes to the Internet of Things (IoT), most people use the security and privacy issues of IoT as a two-in-a-box item that go hand-in-hand. This means, if you don’t have security, you cannot have privacy and vice versa, right? Well, yes and no. There is a lot being said and done to secure the end-to-end IoT systems via advanced policy-driven private and public keys, and threat management systems. More needs to be done, and we will have to figure it out. That is, until someone finds a vulnerability and the technology race starts over with new best practices being promoted. I plan to blog on some of the pitfalls we are experiencing in security technology rollouts in the future. But, for this specific blog, I will only focus on the privacy issues of IoT, since privacy issues can only be resolved through strong legislation and enforced by governments (aided by privacy and security technologies).

IoT

Today, I am promoting Privacy by Design (PbD). In the U.S., I am less hopeful that we will get real privacy legislation correct. As an IoT evangelist, my issue with the privacy requirements of IoT is not with the governments collecting meta data for fighting terrorism, but more so with private sectors having access to my personal data. Specific to this angle, my views are very similar to Blackberry CEO John Chen, who articulated his views here. (My hats off to John for a piece well done on this topic.)

A couple of years ago, I talked about my privacy concerns of private sectors having access to my personal data at a Gigaom conference. The Internet of People is the Wild Wild West. Today in the Internet of People, any time someone is surfing the web, there are over 200 private entities shadowing you. Unfortunately, our laws in the U.S. support “Opt Out,” meaning you have to opt out of a “service” in order to get out of it — unlike in most European countries that have implemented “Opt in” policies. In the U.S., companies have made it extremely difficult to opt out of this intrusion with methods that are still entirely legal. So in my humble opinion, the American government didn’t get it right when it came to the privacy of its citizens on the Internet of People. The government caved in to special interest groups who advocated for “Opt Out” policies in their own interest to use one’s data to advertise goods and service. While for the Internet of People, our government failed us, we all know that for the Internet of Things, the stakes will be much higher.

With IoT on the cusp of rapid growth, and intelligent sensors being integrated into every aspect of one’s lives, without sound privacy laws there will be a few thousand “intruders” following you, via your homes, cars roads, at work, in school, and more. Add your contextual compute platforms (smart devices) along with local and remote data analytics engines to the mix, and the “intruders” would know everything about you — even better than you do. Are you comfortable with that? Not to mention what criminal elements would do with that data.

Among the many benefits of IoT, I believe the healthcare industry will be revolutionized through discoveries on many scientific parallel fronts and the evolution and convergence of disciplines that are disjointed today (e.g. biogenetics, data analytics, sensor fusion, database linkages, etc.). One such technology is the impact that wearables with integrated biometric sensing will have on the future of healthcare. This new category of wearables will put the focus on prevention versus disease management, but new privacy laws need to be in place so that people are not turned off by their “fitness” data (politically correct with the new FDA ruling – subject of another blog) in the hand of these “intruder-advertisers.” Here’s a link to one of my talks on “healthcare revolution,” which includes the required privacy laws, from Toronto’s Smart Week 2014 held last October. The talk starts at 2:55:00 here.

A couple of years ago, I wrote a blog entitled “The need for Internet of Things (IoT) Consumer Bill of Rights.” There, I talked about the privacy and security concerns of IoT and posted a link to What your Telco knows about you: six months of data visualized.

If you click on the link and press the “play” button below the map, you will see how cell phones are being tracked by various towers and all that data is available through your wireless operators. Die Zeist (which means “The Time” or “Times”) is the most widely read and highly-accredited German weekly newspaper. This paper is not a news outlet from the fringes of sanity. In this paper, you can see ‘black-and-white’ how easily your center of universe (your smart phone) is allowing you to be tracked. Nothing new here, but It has a different effect when you can actually visualize it in black and white. With the Internet of Things, this would be the tip of the iceberg.

Regarding opting out, when you are using a screened device (your computer or smart device) and have no clue how to “Opt out,” how are you expected to “Opt out” through a ‘headless’ (screenless) device or sensor? The only way is to enforce privacy laws through legislation.

Due to these scenarios and (the lack of) privacy of our web, I have been keenly following FTC’s hearings and positions on IoT privacy issues. The first FTC conference on IoT was held in November 2013, a time when there was lot of talk around IoT privacy — especially after FTC’s 2012 Privacy Report — where it defined a number of categories deemed to be ‘sensitive’ data. One of the more fascinating talks at that conference was the keynote by Mr. Vint Cerf, Vice President and Chief Internet Evangelist of Google. For those of you who don’t know, Mr. Cerf was a lead engineer on the Army’s early 1970s Internet prototype, ARPANET, hence a celebrity around the web and one of the pioneers of the Internet.

During the keynote, Mr. Cerf mentioned: “Privacy is something which has emerged out of the urban boom coming from the industrial revolution. [Therefore] privacy may actually be an anomaly [and not the norm].” In fact, this is a creation of the industrial age. He basically promoted the idea that privacy rules of the Internet of Things should be as hopeless as the privacy laws for the Internet of People. I was amazed at the cavalier approach displayed with that keynote by Mr. Cerf at the FTC event, making the wrong impression on the FTC officials who were considering making policy choices.

The topic surfaced again at CES this year during a keynote by FTC Chairwoman Edith Ramirez discussing the three privacy challenges of IoT including:

  • The ubiquitous data collection of personal information, habits, location and physical condition over time
  • The unexpected uses of consumer data flowing from smart cars, smart device and smart cities
  • The heightened security risks of the Internet of Things

According to Ramirez, “In the not­-too-­distant future, many, if not most, aspects of our everyday lives will be digitally observed and stored. That data will contain a wealth of revealing information that, will present a deeply personal and startlingly complete picture of each of us when patched together.” She promoted the ideas of security by design, minimizing and anonymizing data for privacy, and increasing transparency by companies as key steps that need to be taken.

It was a brilliant speech and you can find it here. There is an array of hope for all individuals who want to accelerate the adoption of IoT technologies and the benefit these technologies can bring to society. Ramirez’s views on the privacy laws required for the IoT is a stark contrast to the laws in the book protecting the privacy of individuals in the Internet of People. For a few days I was grateful, and hopeful that the lobbyists wouldn’t bully the legislators into a meaningless version of Ramirez’s speech.

Since CES, several legislators have come out against Ramirez’s speech, stating that legislating privacy of IoT will suppress innovations. They’ve continued to argue against Ramirez’s view and stating that the report issued after that was “without examining costs or benefits… encourages companies to delete valuable data…primarily to avoid hypothetical future harms.” These legislators have also argued that the FTC hasn’t done enough economic analysis to issue industry guidelines or legislative proposals for what he called the “still-nascent Internet of Things.” I have seen this movie before, and it seems again as if the interest of a handful of very large advertising companies strong-arming the legislators will be taking precedence over promoting sound IoT privacy laws.

With the recent talk on Capitol Hill chastising Ramirez’s speech, I am now not very hopeful that the IoT privacy laws in the U.S. are going to be any better than our privacy laws for the Internet of People here. Hence I stand my ground and effectively promote the Privacy by Design principals, as the next best thing to strong privacy laws.

Interested in reading more from Kaivan Karimi? Be sure to check out his recent pieces on both Bluetooth Low Energy connectivity and net neutrality.

IFTTT debuts three new apps to automate your connected world


Do empowers you to create your own personalized button, camera, and notepad.


With the rise of the Internet of Things and smart devices, a growing number of Makers and developers alike have turned to IFFTT (“If This, Then That”) to automate online and mobile actions through “recipes.” Since its launch in 2011, IFTTT has expanded throughout the consumer market, offering integration with many of today’s most popular gadgets from Fitbit to HP printers to Hue lightbulbs.

DoButton.0

Despite its popularity, the barrier to entry has been a bit limited to techies willing to browse through channels to create recipes. That was until now. The company has announced the launch of three free new apps for both iOS and Android — Do Button, Do Camera and Do Note — that will make setup as simple as a touch of a button. The suite of Do apps are designed to dumb-down the process by letting users drag-and-drop tools they want to connect and customize recipes through a minimalistic UX. Along with that, IFTTT has rebranded its original app to a much more simple “IF.”

ifttt-do-button-nest

Do Button enables users pair web tools and turn the function into a shortcut widget right on their home screen for everything from their Google Drive to Nest Thermostat, among countless other apps. For instance, you can now set the living room to your favorite temperature or open the garage door all with the tap of a button.

Do Camera possesses similar functionality, allowing users to create actions to share their photos in a much more expedited manner. Now, you can post photos to the Facebook album of choice, or quickly distribute on Tumblr or WordPress pages.

Do Note is a quick text entry app that will take a particular command and instantaneously send it out, whether it’s an appointment in Google Calendar, an added item on the grocery list, or even a quick tweet. You can also use voice commands to trigger a recipe.

do_note_example_evernote@2x-600x359

At the moment, you can only program up to three recipes on the Do apps. However, IFTTT CEO Linden Tibbets says the team is working on ways to make saving recipes easier for swapping, as well as offering recommended recipes they might enjoy. As the number of connected devices continues to proliferate, expect Do to have a supporting role in the automation process.

IF you’re interested in learning more, THEN you should read more here.

Kanega is like a “wearable OnStar for seniors”


UnaliWear’s latest watch offers discreet support for falls, medication reminders, and a guard against wandering.


Most of you who’ve lived through the late ‘80s and ‘90s can distinctly recollect those Life Alert commercials with Mrs. Fletcher yelling, “Help! I’ve fallen, and I can’t get up!” Lo and behold, the catchphrase would go on to become a pop culture phenomenon throughout the United States. Since then, there have been numerous attempts to develop solutions geared towards providing the elderly real-time support in the event of an emergency, especially when they’re unable to reach a phone. And, as we enter the era of constant connectivity, it’s no wonder more brands are turning to ARM-based wearable technology to help bring senior citizens online.

watch_on_rock

Inspired by her own 80-year-old mother who refuses to wear some of today’s bulky emergency alert products, UnaliWear CEO Jean Anne Booth decided to take matters into her own hands. Not only are a number of gadgets available today socially stigmatizing and downright ugly, they’re also limited to use in homes unless tethered to a mobile device — something many seniors do not have in their possession.

Dubbed a “Wearable OnStar for seniors,” Kanega is a stylish watch that provides discrete support for falls, medication reminders and a safeguard against wandering, as well as uses an easy-to-use speech interface rather than buttons. The Bluetooth-enabled wearable — which recently made its Kickstarter debut — is connected to a cellular network, meaning that it isn’t reliant upon Wi-Fi or having to be synced to a smartphone much like the Apple Watch or Samsung Gear.

UnaliWear_Images_r4_c2

Better yet, UnaliWear’s latest product can be worn 24/7 thanks to its waterproof casing. This allows for the band to be used in the shower or bath, where a majority of falls occur. Its well-lit display and other built-in features can even assist with issues that may arise at night, such as trips to bathroom or the kitchen for a snack.

Aesthetically it appears no different than a traditional watch, thereby eliminating the ignominy often associated with “needing” assistance. Instead, it first requests permission to speak by buzzing on a wearer’s wrist — something that will surely come in handy when in public. The device can even communicate over Bluetooth to newer generation hearing aids, as well as serve as a communications gateway for home telemedicine devices.

Shall an emergency arise, voice-activated assistance will connect you directly to a monitor who will confirm assistance should be dispatched to a location. If a user happens to activate help and doesn’t respond immediately, UnaliWear will call an emergency contact first or dispatch local medical assistance, depending on the preferences set.

CAzRYYhUsAAls3n.jpg-large

At its core, the gadget is based on an Atmel | SMART SAM4L Cortex-M4 MCU and a ATWINC1500 module. While it may appear to be another smartwatch, it’s so much more. Aside from its “work anywhere” support, Kanega packs 200% more battery life, continuous speech recognition, patent-pending quick-swap batteries, GPS for proper tracking, and a 9-axis accelerometer. Detected falls trigger a watch-based query, which significantly reduces false alerts, and eliminate the need to be near a base station or smartphone.

What’s more, data is collected and sent to Verizon’s HIPAA-compliant cloud, which offers an analysis of the wearer’s lifestyle. Artificial intelligence learns the wearer’s lifestyle to determine likelihood of wandering, and updates the information on the watch — including activity and medication reminders — every night while asleep. This also helps a wearer obtain directions home or get help if they happen to stray from home.

Interested in a Kanega for a loved one in your life? Hurry over to its official Kickstarter page, where UnaliWear is currently seeking $100,000. Delivery for early backers is expected to begin in February 2016, while shipments to all other consumers slated for Summer 2016.

UPDATE: UnaliWear has completed a successful crowdfunding campaign, having raised $110,154 from 306 backers.

Forward secrecy made real easy


Taking a closer look at how ATECC508A CryptoAuthentication devices can help in providing robust authentication.  


Forward secrecy, which is often referred to as Perfect Forward Secrecy (PFS), is essentially the protection of ciphertext with respect to time and changes in security of your cryptographic session keys and/or primary keying material over time.

A cryptographic session key is used to authenticate messages and encrypt text into ciphertext before it is transmitted. This thwarts a “man in the middle” from understanding the message and/or altering that message. These keys are derived from primary keying material. In the case of Public Key Cryptography, this would be the private key.

Unless you are implementing your own security in the application layer, you probably rely on the TLS/SSL in the transport layer.

The Problem

One can envision a scenario in which ciphertext was recorded by an eavesdropper over time. For a variety of reasons out of your control, your session keys and/or primary keying material are eventually discovered and this eavesdropper could decipher all of those recorded transmissions.

Release of your secret keys could be the result of a deliberate act, as with a bribe, a disgruntled employee, or even someone thinking they are “doing the right thing” by exposing your secrets. Or, it could be the result of an unwitting transgression from protocol. Equipment could be decommissioned and disposed of improperly. The hard drives could be recovered using the infamous dumpster dive attack methodology, thus exposing your secrets.

If you rely solely on transport layer security, your security could be challenged knowingly or unknowingly by third parties controlling the servers you communicate with. Recently leaked NSA documents shows powerful government agencies can (and do) record ciphertext. Depending on how clever or influential your snoopers are, they could manipulate the server system against you.

There are many ways your forward security could be compromised at the server level, including server managers unwittingly compromise it due to bad practices, inadequate cipher suites, leaving session keys on the server too long, the use of resumption mechanisms, among countless others.

Let’s just say there are many, many ways the security of your session keys and/or primary keying material could eventually be compromised. It only takes one of them. Nevertheless, the damage is irreversible and the result is the same: Those recorded ciphertext transmissions are now open to unintended parties.

The Solution

You can wipe out much of your liability by simply changing where encryption takes place. If encryption and forward secrecy are addressed in the application layer, session keys will have no relationship with the server, thereby sidestepping server based liabilities.This, of course, does not imply transport layer security should be discarded.

A public/private key system demonstrates the property of forward secrecy if it creates new key pairs for communication sessions. These key pairs are generated on an as-needed basis and are destroyed after a single use. Their generation must be truly random. In fact, they cannot be the result of a deterministic algorithm. Once a session key is derived from the public/private key pair, that key pair must not be reused.

Atmel’s newly-revealed ATECC508A CryptoAuthentication device meets this set of criteria. It has the ability to generate new key pairs using a high quality truly random number generator. Furthermore, the ATECC508A supports ECDH, a method to spawn a cryptographic session key by knowing the public key of the recipient. When these spawned session keys are purposely short-lived, or ephemeral, the process is known as ECDHE.

Using this method, each communication session has its own unique keying material. Any compromise of this material only compromises that one transmission. The secrecy of all other transmissions remains secure.

The Need for Robust Authentication

Before any of the aforementioned instances can occur, the identity of the correspondents needs to be robustly authenticated. Their identities need to be assured without doubt (non-repudiation), because accepting an unknown public key without robust authentication of origin could authorize an attacker as a valid user. Atmel’s ATECC508A provides this required level of authentication and non-repudiation.

Not only is the ATECC508A a cost-effective asymmetric authentication engine available in a tiny package, it is super easy to design in and ultra-secure. Moreover, it offers protective hardware key storage on-board as well a built-in ECC cryptographic block for ECDSA and ECDH(E), a high quality random number generator, a monotonic counter, and unique serial number.

With security at its core, the Atmel CryptoAuthentication lineup is equipped with active defenses, such as an active shield protecting the entire device, tamper monitors and an active power supply circuit which disallows the ability to “listen” for bits changing. The ECC-based solutions offer an external tamper pin, so unauthorized opening of your product can be detected.

Report: 1.2 billion smartphones were sold in 2014


Worldwide sales of smartphones with larger screens grew 180% in 2014.


According to the latest report from Germany-based GfK, there were 1.2 billion smartphones sold in 2014, up 23% on the year before and surpassing the billion-unit point for the first time. Yet, the analysts project sales to slow down to 14% growth in 2015, which will lead to approximately 1.37 billion devices.

Furthermore, last year saw a tremendous $381.1 billion worth of smartphones sold, up from $330 billion in 2013. Global smartphone sales set a new milestone at the tail-end of 2014 by reaching $115 billion for the Q4, an increase of 20% year-on-year. The number of units sold worldwide had also risen to nearly 346 million, up 19% on Q4 2013. Just about every region experienced YoY growth in smartphones — both in terms of units and value — except for “developed” APAC. Meanwhile, the Latin America smartphone market enjoyed the highest growth with 36 million units sold in Q4 2014, a 43% YoY jump. This region also saw the value of units sold increase by 37% year-on-year to around $10 billion.

Chart2

Moving ahead, China will remain the largest market in terms of both unit and value sales for the foreseeable future. Nevertheless, growth slowed dramatically in the second half of 2014. Analysts revealed that during the fourth quarter smartphone unit sales were flat year-on-year, although the value of units sold increased by 21% YoY to $28 billion, the highest ever quarterly figure. Still, however, there were nearly 400 million smartphones sold in China — almost one-third of the global total.

“The increase in the value of units sold in China, despite the recent plateauing of unit sales, is due to consumers’ rapid adoption of higher priced smartphones with larger screen sizes. This is a trend seen in most markets and GfK global data shows that the 5 to 5.6 inch segment grew by more than 130% year-on-year in the last quarter of 2014 and by nearly 150% in the full year. In 2015, we forecast this segment to become the dominant screen size band, surpassing 4 to 4.5 inch for the first time,” explained Kevin Walsh, Director of Trends and Forecasting at GfK.

While prices may be shrinking, the screens are doing anything but. In fact, global unit sales of smartphones with larger screens (5”+) grew 180% in 2014, with GfK forecasting this to be the largest segment in 2015. The most resilient two regions in 2015 — both forecast to grow by 33% in unit terms — are “emerging” APAC and Middle East/Africa. Both areas still have significant room for growth as consumers migrate from feature phones and existing smartphones to trade up to a bigger screen.

As TechCrunch points out, “It’s a revealing picture of just how strong Android is in certain markets at the moment. As you can see, globally when you exclude North America, at the start of 2014, the majority of mobile sales were still feature phones, accounting for 68% of all sales. By Q4, Android held a 57% of all sales, while feature phones were just at 29%. ‘Other smartphones,’ which are primarily iPhone devices, ended 2014 just as it started: with 14% of sales.”

Unlike other research firms, GfK’s numbers are worth noting given that the company tracks actual sales, not just shipments, of devices from more than 90 markets. Interested in reading more? You can find the entire report here.

Atmel launches next-generation CryptoAuthentication device


Atmel becomes first to ship ultra-secure crypto element enabling smart, connected and secure systems.


Just announced, the Atmel ATECC508A is the first device to integrate ECDH (Elliptic Curve Diffie–Hellman) security protocol — an ultra-secure method to provide key agreement for encryption/decryption, along with ECDSA (Elliptic Curve Digital Signature Algorithm) sign-verify authentication — for the Internet of Things (IoT) market including home automation, industrial networking, accessory and consumable authentication, medical and mobile, among many others.

Atmel_September2014_pg2

Atmel’s ATECC508A is the second integrated circuit (IC) in the CryptoAuthentication portfolio with advanced Elliptic Curve Cryptography (ECC) capabilities. With built-in ECDH and ECDSA, this device is ideal for the rapidly growing IoT market by easily providing confidentiality, data integrity and authentication in systems with MCU or MPUs running encryption/decryption algorithms (such as AES) in software. Similar to all Atmel CryptoAuthentication products, the new ATECC508A employs ultra-secure hardware-based cryptographic key storage and cryptographic countermeasures which are more secure than software-based key storage.

This next-generation CryptoAuthentication device is compatible with any microcontroller or microprocessor on the market today including Atmel | SMART and Atmel AVR MCUs and MPUs. As with all CryptoAuthentication devices, the ATECC508A delivers extremely low-power consumption, requires only a single general purpose I/O over a wide voltage range, and available in a tiny form factor, making it ideal for a variety of applications that require longer battery life and flexible form factors.

“As a leader in security, Atmel is committed to delivering innovative secure solutions to the billions of devices to be connected in the IoT market,” explained Rob Valiton, SVP and GM of Atmel’s Automotive, Aerospace and Memory Business Units. “Atmel’s newest CryptoAuthentication IC is the first of its kind to apply hardware-based key storage to provide the full complement of security capabilities, specifically confidentiality, data integrity and authentication. We are excited to continue bringing ultra-secure crypto element solutions to a wide range of applications including IoT, wireless, consumer, medical, industrial, and automotive, among others.”

CryptoSecurityALT_HPBanner_980x352_Final_v_2

Key security features of the ATECC508A include:

  • Optimized key storage and authentication
  • ECDH operation using stored private key
  • ECDSA (elliptic-curve digital signature algorithm) sign-verify
  • Support for X.509 certificate formats
  • 256-bit SHA/HMAC hardware engine
  • Multilevel RNG using FIPS SP 800-90A DRBG
  • Guaranteed 72-bit unique ID
  • I2C and single-wire interfaces
  • 2 to 5.5V operation, 150-nA standby current
  • 10.5-kbit EEPROM for secret and private keys
  • High-Endurance Monotonic Counters
  • UDFN, SOIC, and 3-lead contact packages

In the wake of recent incidents, it is becoming increasingly clear that embedded system insecurity impacts everyone and every company. The effects of insecurity may not only be personal, such as theft of sensitive financial and medical data, but a bit more profound on the corporate level. Products can be cloned, software copied, systems tampered with and spied on, and many other things that can lead to revenue loss, increased liability, and diminished brand equity.

Data security is directly linked to how exposed the cryptographic key is to being accessed by unintended parties including hackers and cyber-criminals. The best solution to keeping the “secret key secret” is to lock it in protected hardware devices. That is exactly what this latest iteration of security devices have, are and will continue to do. They are an inexpensive, easy, and ultra-secure way to protect firmware, software, and hardware products from cloning, counterfeiting, hacking, and other malicious threats.

Interested in learning more? Discover the latest in hardware-based security here. Meanwhile, you may also want to browse through recent articles on the topic, including “Is the Internet of Things just a toy?,” “Greetings from Digitopia,” “What’s ahead this year for digital insecurity?,” and “Don’t be an ID-IoT.

FemtoUSB is an open-source Cortex-M0+ board


The latest board from Femtoduino is designed to help those looking to migrate from AVR to ARM-based designs.


You may recall Femtoduino from their recent campaign around the highly-popular IMUduino BTLE. Now, the crew is back with their latest device, an uber-mini Cortex-M0+ MCU that they call FemtoUSB. The board was designed as a basic starting point for those interested in ARM-based projects, particularly for those transitioning from 8-bit AVR.

“Before the release of the FemtoUSB, learning to design for ARM chips was very difficult,” the team writes. “Compiling a toolchain? What does the most basic schematic for an ARM chip even look like? What in the world is JTAG?”

B9Bzm0vIUAMOIp1.jpg-large

Recently launched on Tindie, FemtoUSB is built around an Atmel | SMART ATSAMD21E18A, featuring 256KB of Flash and up to a 48MHz operating frequency. Its creators note that its schematic follows the suggested design found in the SAM D21 data sheet. The device features 3.3V on-board regulator (VIN line), a supply up to 10V, and a regulated down to 3.3V on the 3V3 line. The FemtoUSB comes with a standard 0.1″ (2.54mm) pin spacing design for breadboards, and a smaller 0.05″ (1.27mm) pin spacing design for tinier projects.

“Atmel has some of the best support for the open-source hardware community. They offer proper documentation, excellent chip performance, and a great foundation via the Atmel Software Framework,” Alex Albino, Femtoduino Senior Engineer, explains. “Did we mention how easy it is to get started with ARM using Atmel?”

Femtod1

Migrating from 8- to 32-bit is much easier today than it was in years prior. As the Femtoduino team points out, most microcontrollers have a similar set of requirements, which range from adding some resistors and a reset circuit to hooking up a USB port and burning a bootloader.

“You can of course, add in a reverse current protection circuit, a crystal clock source for chips that don’t have an internal one (or if you want a faster clock source), some fancy peripheral additions, etc. However, here’s where we will draw an imaginary line, and now distinguish between 8-bit AVRs and 16/32-bit ARM chips.”

When working with ARM chips, Albino advises that you will need a programmer dongle to initially burn a bootloader. Serial Wire Debug seems to be the most basic form of the JTAG interface — something provided by all ARM chips. This is akin to the “Ardiuno ISP” mode of programming. Keep in mind, though, not all chips “talk the same” between the chip and a dongle.

B96AikJCEAAtXxe.jpg-large

“It’s kind of like how two people can have the same interface (vocal chords), but speak different languages. Fortunately, it seems Atmel’s SAM D21 chips talk Cortex Microcontroller Software Interface Standard (CMSIS), which is a vendor-independent hardware abstraction layer for the Cortex-M processor series. This is another great reason to use Atmel’s line of ARM chips, for what it’s worth.”

The pins used to provide a JTAG connection vary depending on the ARM chip selected, and offer more debugging features when more pins are added. For the most part, JTAG Serial Wire Debug establishes the five necessary connections: Ground, Voltage Reference, Reset, Serial Wire Clock (SWCLK), and Serial Wire Debug Input/Output (SWDIO).

CortexM0

Albino shares that your programming dongle should have a datasheet informing you of the pinout provided, which will enable you to wire it to your board accordingly. Another key difference — and a very important one for that matter — is the voltage. You may be used to 5V logic levels working with AVR 8-bit chips, but 5V can be utterly destructive to an ARM chip as they are meant to work with less power. The usual voltage range for Atmel’s line of ARM chips is somewhere between 1.8V to 3.3V.

“As with all ARM chips, you will benefit greatly from having a programmer dongle. Some vendors lock their chips behind really expensive software tools, and even more expensive programmer dongles ($200+). Oh, and have fun trying to get their proprietary stuff working with your open source setup. Thankfully, Atmel offers their ATMEL-ICE programmer at a reasonable price of about $85. I hear you can get them much cheaper without the case, though don’t expect it to come with ribbon cables if you go the cheap route.”

B9wpwJfCEAATovl

Bringing the FemtoUSB to life required the following components:

Additionally, the project calls for some low-temp lead-free solder paste, a couple PCBs and SMD components. On the software side, the team suggests using Atmel Studio with Windows or Terry Guo’s GNU ARM Embedded Toolchain for those running Mac OS X or Linux.

B9w2SONCUAA0tr0

Regardless the operating machine, Albino stresses that Atmel Software Framework and Atmel SAM-BA In-System Programmer are required. The board also comes pre-loaded with the AT07175: SAM-BA Bootloader for SAM D21, “which is what actually gets programmed on to the chip so we can load stuff via USB instead, thanks to the open-source BOSSA utility.” (Hence, the name FemtoUSB.)

Femtoduino does reveal that they are working on getting an Arduino integration working, along with other non-Arduino tools to load things via USB. Interested? Femtoduino is now available on Tindie for $24.99. Those wishing to learn more can also head over to the project’s Github page here.

Shopping is about to get a whole lot smarter with connected carts


The carriage of tomorrow may reduce shopping times, cut down waiting in lines and offer a personalized experience. 


What do you do when you’re tired of having to schlep around a shopping cart aisle after aisle? You create an autonomous one that will carry out the tedious task for you! Or, you make them smarter at the very least.

Well, that’s what a pair of new projects have done, one by a team of students at Technion-Israel Institute of Technology, the other from UK product development group Cambridge Consultants. Not only will these come in handy as you make your way up and down the grocery store each week, it can keep you from having to stop mid-aisle for a free hand to check off an item on your list, and can even prevent the transmission germs during flu season. What’s more, it doesn’t have to be limited to marketplaces either. The cart can prove to be useful throughout airports, libraries, malls and college campuses.

20141230181625-robot-shoppingcard

First, following a similar premise as we’ve seen floating orbs capable of following and replaying human activity before, Makers Ohad Rusnak and Omri Elmalech have devised a slick self-driven shopping cart using a 3D Kinect sensor, a 3D camera and an Arduino Mega 2560 (ATmega2560). Through the duo’s self-developed computer vision algorithm, the system’s 3D camera can accurately identify and follow the cart’s owner as they make their way about the supermarket, while the embedded Arduino is responsible for controlling all the movement, sensing and tracking.

duino1

“I think in the future, a few years from now, we’ll see something like this in the supermarkets,” Rusnak says.

More recently, Cambridge Consultants showed off its latest connected cart concept that, by being fitted with low-cost sensors and Bluetooth Smart, can tell a retailer where you are in a store within three feet. The embedded technology, which would appear to be much more commercial-ready than the aforementioned project, can pinpoint the cart’s whereabouts so shop owners can offer location-based promotions and eliminate checkout lines in real-time. It also means fewer carts will leave the parking lot, too. For stores, this could drastically cut the multi-million-dollar annual cost of lost carriages as businesses could set alerts when they were being removed from their premises.

smart-trolley

“The latest innovation is a small device that fits on the wheel of each trolley – and doesn’t need batteries as it is powered via energy harvesting from the rotation of the wheel. Costs are kept to a minimum by using commercially available low-cost sensors and connectivity that allows the data to be managed on a hosted server,” the firm writes.

Aside from enabling stores to target customers with relevant offers as they browse the aisles, data from smart carts could be used by retailers to understand better what their customers decide not to buy – it could help highlight areas where customers stopped to browse but did not purchase anything. Privacy advocates may also take comfort in knowing that the cart is being tracked opposed to the shopper’s smartphone.

“This is the latest example of our work in the fields of connected devices, data analytics and integrated systems across a range of sectors and with clients around the world. Connected product development has a crucial role to play in securing – and maintaining – competitive advantage in the fast-moving retail industry,” Cambridge Consultants concludes.

We couldn’t agree more. This can and will be an extremely cool concept to see catch on. So, how long before we see these roaming robotic trolleys around your nearest Target, Wal-Mart and Kohl’s?

4 key projections around IoT growth in the enterprise


Big opportunities ahead for some big industries. 


The Internet of Things (IoT) is being hailed as the next big area of growth. The specific predictions vary, but the number of smart devices is anticipated to increase dramatically, with the IoT representing tens of billions of devices in just the next several years. And, while a majority of folks may think this era of constant-connectivity is merely a future filled with ambient objects in their homes that can lower energy costs, watch the outside of their homes and open garage doors from their smartphones, the IoT is actually much more significant than that — especially to the enterprise sector.

As a recent Business Insider study revealed, connected devices and software can offer businesses tremendous benefits, including enhanced security, more effective monitoring of machinery and equipment, improved efficiency and productivity and better energy management, among countless other things. The team at 2lemetry at recently broke down four important estimations for growth surrounding the Internet of Things in the workplace. Here they are…

The global enterprise — which includes factories, office/buildings, transportation and shipping systems, hospitals and health care administration —  device count will reach 9.1 billion by 2019 with a total of 23.3 billion IoT devices. In fact, this space will account for 39% of the approximate 23 billion active smart devices expected come 2019.

BI-Graph-1

Spending on enterprise IoT products and services will hit $255 billion worldwide by 2019, up from $46.2 billion in 2014, according to BI: Intelligence‘s projections.

BI-IoT-Revenue

Several industries are already using IoT, one in particular being industrial machinery with an 18% usage rate. Not far behind are automotive, consumer electronics and telecom and high tech, all three of which have a current 17% usage rate. The fifth industry in this discussion is aerospace and defense, pulling a 15% usage rate.

8-industries-1018x1024

When it comes to the early adopters of intelligent technology, the manufacturing, logistics and information realms are certainly leading the way. Manufacturers will invest $140 billion in the next five years, while logistics and information sectors will spend roughly $112 billion and $100 billion, respectively, to accomodate the increase in data.

3-business-circles-1024x1024

Interested in learning more? Download the entire report from Business Insider here.