Category Archives: Hardware

Report: Organizations not doing enough to prevent data breaches


Verizon’s annual Data Breach Investigations Report shows which threats — new and old — to watch. 


Just the other day, Verizon released its annual Data Breach Investigations Report, which analyzed more than 2,100 confirmed data breaches and approximately 80,000 reported security incidents. This year’s study offered an in-depth look at the cybersecurity landscape, including a first-time overview of mobile security, Internet of Things (IoT) technologies and the financial impact of intrusions.

150415_DBIR_Graphic_640x400

Upon delving deeper, the report revealed that though cyber attacks are getting a lot more sophisticated, decades-old tactics like phishing and hacking haven’t lost much ground either. According to Verizon, the majority of the cyber attacks (70%) used a combination of these techniques and involved a secondary victim, adding complexity to a breach.

Another troubling area singled out in the analysis is that many existing vulnerabilities remain open, primarily because security patches that have long been available were never implemented. In fact, many of those flaws go back almost eight years.

As in prior reports, this year’s findings again pointed out what Verizon researchers call the “detection deficit,” which refers to the time that elapses between a breach occurring until it’s discovered. Sadly, in 60% of breaches, attackers are able to compromise an organization within minutes. On the bright side, the study does note that a number of cyber attacks could be prevented through a more vigilant approach to security.

“We continue to see sizable gaps in how organizations defend themselves,” explained Mike Denning, VP of Global Security for Verizon Enterprise Solutions. “While there is no guarantee against being breached, organizations can greatly manage their risk by becoming more vigilant in covering their bases. This continues to be a main theme, based on more than 10 years of data from our ‘Data Breach Investigations Report’ series.”

As expected, a hot topic that was added to this year’s report centered around security issues related to the burgeoning IoT. Verizon examined several security incidents in which connected devices were used as entry points to compromise other systems, with some IoT devices were co-opted into botnets that were infected with malicious software for denial-of-service attacks. The findings on connected devices “reaffirms the need for organizations to make security a high priority when rolling out next-generation intelligent devices.”

B290-VES.com_GraphicsDBIR2015-150417-06-01

Verizon security researchers also discovered that nearly all (96%) of the 80,000 security incidents analyzed this year can be traced to one of nine basic attack patterns that vary across industries. As identified in the 2014 report, the nine threat patterns include miscellaneous errors, malware aimed at gaining control of systems, insider/privilege misuse, physical theft or loss, web app attacks, cyber espionage, as well as point-of-sale intrusions and payment card skimmers.

This year’s report found that 83% of security incidents by industry involve the top three threat patterns — up from 76% in 2014. Needless to say, the longer it takes for organizations to discover breaches, the more time attackers have to penetrate defenses and cause damage, the report points out. More than a quarter of all breaches take an organization weeks, and sometimes months, to unearth and contain.

Want to continue reading? You can download Verizon’s entire report here. As if you needed any additional proof, it has becoming increasingly clear that embedded system insecurity affects everyone and every company. What’s worse, the effects of insecurity can be very personal like theft of sensitive financial and medical data. For a company the impact can be quite profound. Products can be cloned, software copied, systems tampered with and spied on, and many other things that can lead to revenue loss, increased liability, and diminished brand equity. Explore the SMARTER choice of embedded hardware-based security into your next design here.

FreeRTOS+Trace v2.7.4 is now available


FreeRTOS+Trace v2.7.4 features improved Atmel Studio integration, making it very convenient to use with any Atmel debugger. 


Our friends over at Percepio have revealed that an updated version of FreeRTOS+Trace is now available. While there may only be minor changes, updating is not strictly required, although recommended. According to the team, this will most likely be the last v2.7 release, as they are now focusing on finalizing v2.8.

views

For those unfamiliar with the program, FreeRTOS+Trace is a run-time diagnostic tool for embedded software systems based on FreeRTOS. Trace captures valuable dynamic behavior information for offline display in more than 20 graphically interconnected view, thereby giving developers a new level of understanding and allowing for better designs, faster troubleshooting and higher performance to accelerate time to market.

FreeRTOS+Trace is comprised of two components: a PC application and a trace logging library provided as C source code for easy inclusion in a project. It can be used side-by-side with a traditional debugger and complements the debugger view with a higher level perspective.

What’s more, Atmel Studio 6.2 seamlessly integrates with Trace to provide unprecedented insight into the run-time of embedded software with leading-edge trace visualization. Percepio Trace for Atmel Studio features control-flow trace (tasks and interrupts), custom data plots, application debug output, statistical code profiling, support for viewing MCU event counters and RTOS awareness.

So what are some of the upgrades you can expect to see in v2.7.4 from v2.7.0?

– Improved integration with Atmel Studio, making it very convenient to use with any Atmel debugger.
– Added support for ARM Cortex-M0/M0+
– Enhanced J-Link integration and updated J-Link driver
– Minor changes in the recorder and demo application

As always, users can find the latest version on Percepio’s downloads page here. The team notes that, if you are using Atmel Studio, you should install the FreeRTOS+Trace version from Atmel Gallery (.vsix) — not the stand-alone version (“.exe” or “.tgz” packages).

The CryptoCape is the BeagleBone’s first dedicated security daughterboard


The CryptoCape extends the hardware cryptographic abilities of the BeagleBone Black.


With the insecurity of connected devices called into question time and time again, wouldn’t it be nice to take comfort in knowing that your latest IoT gadget was secure? A facet in which many Makers may overlook, Josh Datko recently sought out to find a better way to safeguard those designs, all without hindering the DIY spirit. The result? The CrytpoCape — which initially debuted on SparkFun last year — is a dedicated security daughterboard for the BeagleBone that easily adds encryption and authentication options to a project.

Generally speaking, cryptography offers a solution to a wide-range of problems such as authentication, confidentiality, integrity and non-repudiation, according to Datko. SparkFun notes that the $60 Atmel powered cape adds specialized ICs that perform various cryptographic operations, amplifying a critical hardware security layer to various BeagleBone projects.

The CyrptoCape is packed with hardware, including 256k EEPROM with a defaulted I2C address (plus write protection), a real-time clock (RTC) module, a Trusted Platform Module (TPM) for RSA encryption/decryption, an AES-128 encrypted EEPROM, an ATSHA204 CrypoAuthentication chip that performs SHA-256 and HMAC-25 and an Atmel ATECC108 tasked with the Elliptic Curve Digital Signature Algorithm (ECDSA).

“You will also find an Atmel ATmega328P microcontroller and a large prototyping area available on the board. The ATmega is loaded with the Arduino Pro Mini 3.3V bootloader and has broken out most of the signals to surrounding pads,” its SparkFun page reveals.

Beyond that, each easy-to-use CryptoCape comes with pre-soldered headers making this board ready to be attached to your BeagleBone right out of the box. The only additional item a Maker will need to get the CryptoCape fully-functional is a CR1225 coin-cell battery.

Interested? You can check out the product’s official SparkFun page here. Meanwhile, those looking to learn more should also pick up a copy of Datko’s book entitled “BeagleBone for Secret Agents.” The third chapter of the resource is devoted to the CryptoCape where Makers will learn how to combine a fingerprint sensor, the on-board ATmega328P, and the crypto chips to make a biometric authentication system.

SIGFOX is bringing the IoT to fire hydrants


TALIS has tapped SIGFOX’s Internet of Things network for real-time fire hydrant monitoring. 


Envision this: Your house catches on fire and you dial 911. The fire trucks arrive, the firefighters hop down and immediately throw the hose over their shoulders and rush around the corner to the nearest hydrant. Uh oh, the hydrant isn’t working. The hydrants of today can break, leak and freeze, something which can prove to be costly in a live-or-death situation. Luckily, the Internet of Things is here to help because with the advent of smart cities, comes the rise of much smarter water hydrants.

Talis - Fire hydrant

Most recently, water flow equipment provider Talis announced that they will be tapping into SIGFOX’s rapidly growing IoT network to bring their fire hydrant monitoring technology, called COPERNIC, to connected cities. The solution will enable utility companies and other city officials to track and analyze the status of smart fire hydrants to ensure they are indeed functioning properly and to prevent other issues such as water theft.

The two companies note that COPERNIC allows for real-time monitoring of fire hydrants by time-stamping all data related to hydrant functioning. An electronic module installed on the hydrant sends SMS or email alerts via the SIGFOX network when the hydrant is being opened, closed, tampered with, or malfunctioning. What’s more, all of that data will be made instantly available on a web-based portal, while a mobile app can also access, receive and read alerts.

As previously reported on Bits & Pieces and demonstrated throughout many of our trade show booths, SIGFOX’s cellular, ultra-narrowband (UNB) network has been exclusively designed for small messages that will meet the needs of the vast majority of objects connected to the IoT. The use of UNB is key to providing a scalable, high-capacity network, with very low energy consumption, while maintaining a simple and easy to rollout star-based cell infrastructure. The company’s Atmel based connectivity solution uses license-free frequency bands (runs in the unlicensed 902 MHz band in the U.S. and the 868 MHz band in Europe).

1051891_le-francais-sigfox-a-lassaut-de-lamerique-et-de-la-bourse-web-tete-0203846360141_660x352p

The French IoT startup’s UNB network has been specifically designed for small communications within IoT applications in order to greatly improve the battery life of connected objects. COPERNIC, incidentally, runs on lithium batteries that have an estimated lifetime of 10 years.

“The SIGFOX network, with its ‘plug-and-play’ connectivity, low cost and low power consumption will enable the COPERNIC solution to efficiently deliver a wide range of essential data to water-management officials in real-time,” explained Stuart Lodge, SIGFOX EVP of Global Sales.

This is just one of many bits of news to come out of our friends at SIGFOX in recent weeks. Last month, network operator Narrownet brought SIGFOX to Portugal to enhance the country’s IoT ecosystem for device manufacturers and service providers. Want to learn more? Head here.

Report: Global 3D printing market to reach $20.2 billion in 2019


Nearly 133,000 3D printers were shipped globally in 2014, accounting for $3.3 billion in revenue. 


If you thought 3D printing was merely a fad, you thought wrong. According to Canalys, the market will continue to build upon its momentum from last year which saw 133,000 printers shipped — a 68% jump from 2013. This resulted in $3.3 billion in revenue generated by printer sales and their associated materials. That figure is expected to continue its growth, projecting upward to $5.2 billion by 2015 and $20.2 billion by 2019 — an expected compound annual CAGR of 44% from 2014 to 2019.

Canalys press release 20150414 - Global 3D printing market to reach $20.2 billion in 2019-3.jpg

“As we expected, the 3D printing market has grown substantially over the past few years,” said Canalys Research analyst Joe Kempton. “There has also been a substantial increase in the number of vendors entering this space, with many coming from Asia, challenging the previous dominance of 3D printing hotspots such as Germany and the USA.”

The growth is being contributed to a combination of lower prices, new forms of manufacturing methods and improved printing speeds. Beyond that, the ability to accelerate product creation via crowdfunding platforms has also spurred more demand for 3D printers.

3d printing 1

In a study released just the other week, the research firm estimated that 75% of 3D printers shipped in Q4 2014 were priced below $10,000. In that three-month span alone, the total market revenue exceeded over $1 billion for the first time in a single quarter, with some 41,000 machines shipped worldwide. This represented a 24% rise quarter-over-quarter. Regionally, the Americas accounted for nearly four in 10 (42%) of overall purchases, followed by EMEA and Asia-Pacific at at 31% and 27%, respectively.

“Whereas these consumer printers used to be almost exclusively material extrusion devices, we’ve seen large growth rates in the vat polymerization segment as prices have fallen, which means more options for consumers. There were large, positive growth rates for the dominant consumer players, such as MakerBot and Ultimaker. But also substantial increases in shipment numbers from Chinese vendors, such as XYZPrinting, which have benefited from creating consumer-friendly 3D printers at impressively low price points.”

3d printing 2

Undoubtedly, the 3D printing revolution will revolutionize traditional manufacturing as Makers will be able to print real-life products and part replacements right from the comforts of their own home or office. In the coming months, a vast majority of these printers will be plug-and-play, turnkey devices that will begin to enter the sweet spot of $500 — a price point at which many consumers will likely shell out the cash.

It’s bound to have a major impact on industries like aerospace, automotive and healthcare over the next five years as well. Companies such as General Electric, Boeing, and BMW have already invested millions of dollars into the next-gen technology.

c7d440536ca2ba31298302ef60ec0bec_large

As we’ve previously discussed on Bits & Pieces, the Maker Movement has not only been using Atmel powered 3D printers like MakerBotRepRap and CEL for quite some time now, but a slew of new devices popping up on crowdfunding sites are packed with AVR MCUs, most notably the ATmega2560.

Ready to delve deeper into the future of 3D printing? You can find the latest Canalys report here.

Report: 29 million patient records compromised in healthcare breaches


In 2013, two-thirds of healthcare data breaches involved electronic data, almost 60% theft and nearly 10% hacking.


Amid our latest bout with malicious hackers and network intrusions, even more data has emerged that will certainly put any doubts, if any remained, around the insignificance of proper security to rest — particularly in healthcare. According to a new study published in the Journal of the American Medical Association, researchers have revealed that approximately 29 million health records in the U.S. alone were affected by breaches between 2010 and 2013 — 67% of which were stored electronically.

Breaches

In order to conduct their investigation, the researchers sifted through a government database containing information about data breaches involving unencrypted health information reported by clinicians and health plans. What they found was that a majority of incidents (58%) were exposed through theft, while the rest came as a combination of hacks and carelessness, such as loss or improper disposal of data and unauthorized access of information. And, most of the time, these breaches were connected to laptops and mobile devices.

In 2013, the frequency of breaches that occurred through hacking, unauthorized access or unprivileged disclosure increased to 27%, up from 12% just three years prior. The researchers warn that this number will only continue to rise.

“Given the rapid expansion in electronic health record deployment since 2012, as well as the expected increase in cloud-based services… the frequency and scope of electronic healthcare data breaches are likely to increase,” the researchers note. “These security breaches could involve everything from health sensors and gene sequencing technology, to predictive analytics and personal health records.”

Want to delve deeper into the topic? You can find the entire report here. Meanwhile, as attack platforms increase in size and threats become more sophisticated in nature, how can you ensure that your network and its connected devices are indeed protected? Fortunately, you can take comfort in knowing that there are solutions already available to keep those digital systems not only smart, but robustly secured all at the same time.

Report: Automotive touch panel revenues to hit $1.5 billion by 2018


Most touch panels for 2017 car models will use capacitive touch technology, IHS report reveals. 


The explosion of touch-enabled screens used in smartphones, tablets and other consumer devices, along with improvements in touch technology, are increasing the demand for touchscreen automotive displays used for navigation, entertainment and online services, climate control, energy efficiency tracking and other activities.

According to a recent study by research firm IHS, the CAGR for global automotive touch panel shipments will average 18% through 2018, with revenues forecasted to reach $1.5 billion. This includes shipments of factory-installed automotive touch panel systems, aftermarket applications, dealer installations, as well as service replacements.

IHS_Automotive_Touch_Panel_Shipments_150402

IHS notes that though projective-capacitive touch (PCT) technology has been a topic of discussion since 2012, adoption is finally expected to begin in 2015 models, which is leading to the charge for touch-panel shipments. That’s because the role of automotive displays is changing. What was once just a simple way to view information from a navigation system or a car audio system, has evolved into a human-to-machine interface (HMI) for devices of in and out of the vehicle.

Due to improvements in the consumer interface, IHS reveals that most touch panels for 2017 car models will use capacitive touch technology, which is expected to surpass the use of resistive technology over the next two years.

Moving ahead, state-of-the-art cars will surely be equipped with multi-touch capacitive sensors typically found in smartphones and tablets, along with capacitive buttons to create a modern look and intuitive use — all of which will be made possible through Atmel’s comprehensive platforms and solutions for in-vehicle HMIs.

Atmel achieves certification for PRIME v1.4 solutions


The Atmel | SMART portfolio of metering solutions now support the latest advanced connectivity standards.


Atmel has become the first company to receive the PRIME (PoweRline Intelligent Metering Evolution) v1.4 Profile 2 certification for the Atmel | SMART SAM4CP16B and ATPL230A smart metering solutions. The certification extends Atmel’s leadership and commitment to delivering state-of-the-art connectivity solutions and ensures that the company’s customers are able to develop high performance solutions, incorporating new features of the PRIME v1.4 standard. The latest standard supports some of the most demanding requirements of smart metering systems by offering increased robustness, throughput, band expansion, band-plan flexibility and IPv6.

Dual core MCUs suit smart metering platforms 2

“We are pleased to be the first semiconductor supplier to help develop and validate the technology, and to achieve this significant milestone with deep cooperation and partnership with our customers and the PRIME Alliance over a period of nearly five years,” said Kourosh Boutorabi, Senior Director of Smart Energy Solutions at Atmel. “We see increased interest in the PRIME standard by utilities in EMEA, Latin America and Asia and believe that as its adoption and proliferation continues, it is essential that its technical evolution continue to be fully standard compliant and certifiable by our customers as well as the utilities.”

PRIME is a mature, consolidated and worldwide PLC standard for advanced metering. There are currently millions of smart meters based on the PRIME standard that have been deployed supporting the PRIME v1.3. The Atmel | SMART portfolio of solutions now fully comply with both v1.3 and v1.4 standards ensuring total flexibility and scalability for original equipment manufacturers developing next-generation smart metering systems worldwide.

Interested in learning more? The Atmel PRIME v1.4 Profile 2 Certification is available on the PRIME Alliance website. Meanwhile, you can delve deeper into the wide range of PRIME-based PLC solutions here.

How Big Bang Theory and IoT relate to Tech on Tour


Hands-on ‘IoT Secure Hello World’ training introduces Atmel Wi-Fi and CrytoAuthentication technologies.


How The Big Bang Theory Relates to the Internet of Things

How many of you out there are fans of the CBS hit sitcom series Big Bang Theory? If you recall an episode from the show’s first season, entitled “The Cooper-Hofstadter Polarization,” the team of Sheldon Cooper, Leonard Hofstadter, Howard Wolowitz and Raj Koothrappali successfully triggered a lamp over the Internet using an X-10 system.

In order to accomplish this feat, the gang sent signals across the web and around the world from their apartment to connect not only their lights, but other electronics like their stereo and remote control cars as well.

“Gentlemen, I am now about to send a signal from this laptop through our local ISP racing down fiber optic cable at the of light to San Francisco bouncing off a satellite in geosynchronous orbit to Lisbon, Portugal, where the data packets will be handed off to submerged transatlantic cables terminating in Halifax, Nova Scotia and transferred across the continent via microwave relays back to our ISP and the external receiver attached to this…lamp,”  Wolowitz excitedly prefaced.

800px-X10_1

The funny thing is, the technology that the group of sitcom scientists was simulating could have just as easily been done using a Wi-Fi network controller like the WINC1500. However, at the time of airing back in March of 2008, open access for Internet users looking to control “things” around the house was seemingly something only engineers and super geeks thought possible.

We can imagine this is probably how it would’ve gone down…

Bringing Next-Generation Technology to You

In order to make the scene above possible, an Atmel | SMART SAM D21 was hooked up to the WINC1500 and connected to a solid-state relay, thereby enabling the team to control the lamp.

If this captivated your attention, then you’re in for a treat. That’s because Atmel is taking its “IoT Secure Hello World” Tech on Tour seminar on the road — starting with Europe!

As an application space, IoT sensor nodes are enabled by a number of fundamental technologies, namely a low-power MCU, some form of wireless communication and strong security. With this in mind, the Atmel IoT Secure Hello World series will offer attendees hands-on training, introducing them to some of the core technologies making the Internet of Things possible, including Wi-Fi and CryptoAuthentication.

These training sessions will showcase Atmel’s Wi-Fi capability and CryptoAuthentication hardware key storage in the context of the simplest possible use-case in order to focus attention on the practical aspects of combining the associated supporting devices and software. This includes learning how to send temperature information to any mobile device via a wireless network and how to enable the remote control of LEDs on a SAM D21 Xplained Pro board over a Wi-Fi network using a WINC1500. In addition, attendees will explore authentication of IoT nodes, as well as how to implement a secure communications link.

Take the very fundamental use-case of switching on an LED, for instance, which will represent our ‘Hello World!’ For this IoT application, the LED will be controlled using a smartphone app via the Internet, while a sensor node will be enabled to read an analog temperature sensor. The first part of the training will introduce Atmel Wi-Fi technology, which connects our embedded development kit of choice, an Atmel | SMART SAMD21 Xplained Pro, via the Atmel SmartConnect WINC1500 Wi-Fi module to a local access point. The result will be the ability to easily and securely send temperature information to any mobile device on the network, while also having remote control of the LED.

From the moment a ‘thing’ is connected, it becomes susceptible to a slew of potential security risks from hackers. That’s why the second part of the training will delve deeper into how CryptoAuthentication can be used to authenticate the temperature sensor node and host application before it can read the temperature information to avoid fake nodes. A secure communications link will be implemented using a session key to and from the remote node.

When all is said and done, building for the IoT demands innovative and secure solutions while architecting a balance between performance, scalability, compatibility, security, flexibility and energy efficiency — all of which Atmel covers extremely well.


Atmel | Tech on Tour Agenda At-a-Glance

The Atmel team will be coming through a number of major cities, from Manchester and Milan to Munich and Moscow. Ready to join us? Be sure to register for one of the Atmel | Tech on Tour European, Asia, or North America locations today! Upon registering, you will even receive a WINC1500 Xplained Pro Starter Kit to take home.

8:30 – 9:00     Check-In and Preparation

  • Assistance with installing software will be provided

9:00 – 10:15     Introduction to Atmel Wi-Fi Solution

  • WINC1500/WILC1000 Hardware and Performance Overview
  • Software and IoT Solution Overview
  • Wi-Fi Network Controller IoT Sensor Application

10:15 – 10:30    Hands-on Introduction

10:30 – 10:45    BREAK

10:45 – 12:30    Hands-on: WINC1500 Wi-Fi Network Controller IoT Sensor Application

  • Sending temperature information to any phone or tablet on the network
  • Enabling remote control of LED0 on the SAM D21 Xplained Pro board

12:30 – 1:30    LUNCH

1:30 – 2:15      Introduction to Atmel CryptoAuthentication IoT Security and Technology

2:15 – 3:00      Hands-on Introduction: Authenticating IoT Nodes

  • Authenticate the temp sensor node and host application before being able to read the temperature information to avoid fake nodes
  • How to implement a secure communications link using a session key to and from the remote node to any phone or tablet on the network

3:00 – 3:15    BREAK

3:45 – 4:30    Hands-on: Authenticating IoT Nodes (continued…)

4:30 – 5:00    Wrap-up, Questions and Answers


Prerequisites

Software Requirements

  • Download Atmel Studio 6.2 software.
  • Wireshark Packet Sniffer will be provided.

Hardware Requirements

  • Attendees are required to bring a laptop. Atmel will NOT supply computers at the training.
  • Please make sure to have administrator rights on your laptop.
  • Laptop must have at least one Internet port and one free USB host connector.

Evaluation Kit Requirements

  • Atmel | SMART SAMD21 – XPRO host MCU board
  • Atmel WINC1500 module mounted ATWINC 1500 Xplained Pro Extension (Product Code: ATWINC1500-XSTK)
  • Atmel Digital I/O WING extension board for sensor and SD-card input target USB

A look back at the history of the Internet of Things


IoT Day falling on Throwback Thursday can mean only one thing… a trip down memory lane to where it all began!


The Internet of Things (IoT) is a term first coined by Keven Ashton in 1999 during a PowerPoint presentation he made while working for Procter & Gamble. The phrase referred to a future world where all types of electronic devices link to each other via the Internet. Keep in mind, Wi-Fi was not ubiquitous back then. There was no email or social media applications on mobile devices. GPS didn’t exist in a meaningful way. Dick Tracy-like wearables were merely a pipe dream.

“If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing, or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so,” Ashton elaborately discussed in a 2009 RFID Journal article.

While on the surface, it may seem like something out of a sci-fi novel or an episode of The Jetsons to a vast majority of everyday folks, IoT represents a pivotal milestone in the history of the Internet as connections move beyond computing devices and begin giving once-ordinary devices new powers. While there has certainly been a tremendous amount of buzz around the concept of an intelligent, more connected world, the visions of this ‘smarter’ society date back several years.

1832

Baron Schilling von Canstatt invented the electromagnetic telegraph. A keyboard with 16 black-and-white keys served as its a transmitting device, while six galvanometers with magnetic needles suspended from silk threads acted as the receiving instrument. Later that year, Schilling managed a short-distance transmission of signals between two telegraphs in different rooms of his apartment. Not long after, Carl Friedrich Gauss and Wilhelm Weber developed their own code to communicate over a distance of 1,200 meters within Göttingen, Germany.

(Source: theapricity.com)

(Source: theapricity.com)

1844

Samuel Morse sent the first morse code public telegraph message “What hath God wrought?” from the Supreme Court chamber in the basement of the U.S. Capitol building in Washington, D.C. to the B&O’s Mount Clare Station in Baltimore.

(Source: Wikipedia)

(Source: Wikipedia)

1926

Nikola Tesla revealed in an interview with Colliers Magazine’s John B. Kennedy:

“Wireless will achieve the closer contact through transmission of intelligence, transport of our bodies and materials and conveyance of energy… When wireless is perfectly applied the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.  We shall be able to communicate with one another instantly, irrespective of distance.  Not only this, but through television and telephony we shall see and hear one another as perfectly as though we were face to face, despite intervening distances of thousands of miles; and the instruments through which we shall be able to do his will be amazingly simple compared with our present telephone.  A man will be able to carry one in his vest pocket.”

(Source: Wikipedia)

(Source: Wikipedia)

1932

Jay B. Nash wrote in Spectatoritis:

“Within our grasp is the leisure of the Greek citizen, made possible by our mechanical slaves, which far outnumber his twelve to fifteen per free man… As we step into a room, at the touch of a button a dozen light our way. Another slave sits twenty-four hours a day at our thermostat, regulating the heat of our home. Another sits night and day at our automatic refrigerator. They start our car; run our motors; shine our shoes; and cult our hair. They practically eliminate time and space by their very fleetness.”

1942

U.S. Patent 2,292,387 was granted to Hedy Kiesler Markey and George Antheil for an early version of frequency hopping.

Markey

1946

Dick Tracy introduced the two-way radio.

dick_tracy_large

1950

Alan Turing noted in his article entitled “Computing Machinery and Intelligence for the Oxford Mind Journal:

“We may hope that machines will eventually compete with men in all purely intellectual fields. But which are the best ones to start with? Even this is a difficult decision. Many people think that a very abstract activity, like the playing of chess, would be best. It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child. Things would be pointed out and named, etc. Again I do not know what the right answer is, but I think both approaches should be tried.”

(Source: ScienceMuseum.org.uk)

(Source: ScienceMuseum.org.uk)

1952

Norman Joseph Woodland and Bernard Silver received the first patent for a liner barcode.

first-barcode-idea

1955

Edward O. Thorp devised the first wearable computer, a pocket-sized analog device used to predict roulette wheels.

(Source: Slash Gear)

(Source: Slash Gear)

1956

In the promotional film Design for Dreaming, Frigidaire envisioned the “kitchen of tomorrow” where a housewife feeds a recipe card into a slot, which triggers a series of appliances that automatically bake a birthday cake complete with lit candles.

(Source: TreeHugger.com)

(Source: TreeHugger.com)

1960

Known as the “Father of Virtual Reality,” Morton Heilig received a patent for the first-ever head-mounted display. The unit featured a stereoscopic (3D) TV, wide vision and true stereo sound.

morton-heilig-telespheremask

1966

German computer science pioneer Karl Steinbuch stated, In a few decades time, computers will be interwoven into almost every industrial product.”

1969

The first host-to-host message over ARPANET (the precursor to today’s Internet) was sent. The memo on the ARPANET was transmitted by UCLA student programmer Charles S Kline at 10:30 pm on October 29th, from the campus’ Boelter Hall to the Stanford Research Institute’s SDS 940 host computer.

B1KcQ1LIIAIo1wv.jpg-large

The Honeywell Kitchen Computer, or H316 pedestal model, was a short-lived product offered by Neiman Marcus as one of a continuing series of extravagant gift ideas. It sold for $10,000, weighed over 100 pounds and was advertised as useful for storing recipes.

kc-ad

1971

ALOHAnet connected the Hawaiian Islands with a UHF wireless packet network. The protocol was an early forerunner to Ethernet, and later the Wi-Fi protocol.

(Source: Wikipedia)

(Source: Wikipedia)

1973

Mario Cardullo is granted the first patent for a passive, read-write RFID tag.

rfid-tag

1974

Vint Cerf and Stanford graduate students Yogen Dalal and Carl Sunshine published the first technical specification of TCP/IP as an Internet Experiment Note (IEN) as RFC 675.

(Source: Stanford University)

(Source: Stanford University)

1976

AT&T and MIT held a conference that brought together of number scientists, theorists and academics to explore the future of technology. There, Bell System news magazine had the chance to catch up with Arthur C. Clarke to share his predictions of mobile devices, home computers, the Internet, Skype, email, the death of newspapers, telecommuting, and of course, “Dick Tracy wrist-radios.”

“We’re going to get devices which will enable us to send much more information to our friends. They’re going to be able to see us, we’re going to see them, we’re going to exchange pictorial information, graphical information, data, books, and so forth. [The ideal communication device] would be a high-definition TV screen with a typewriter keyboard, and through this, you can exchange any type of information. Send messages to your friends … they can wait, and when they get up, they can see what messages have come in the night. You can call in through this any information you might want: airline flights, the price of things at the supermarket, books you’ve always wanted to read, news you’ve selectively [chosen]. The machine will hunt and bring all this to you, selectively.”

clarke

1981

Steve Mann developed a wearable personal computer wired to a camera and mounted to a helmet.

237322-mann_slide

1982

TCP/IP is formalized, ushering in an era of worldwide network of fully-interconnected networks, which is known today as the Internet.

(Source: Wikipedia)

(Source: Wikipedia)

1989

Tim Berners-Lee proposed the World Wide Web.

(Source: Wikipedia)

(Source: Wikipedia)

1990

The Olivetti Research Laboratory developed an active badge system using infrared signals to communicate a person’s location.

(Source: David Greaves)

(Source: David Greaves)

John Romkey and Simon Hackett introduced the world’s first connected device other than a computer: a toaster.

toaster

1991

The first web page was created by Tim Berners-Lee.

NCR Corporation with AT&T invented the precursor to 802.11, intended for use in cashier systems. The first wireless products were under the name WaveLAN.

(Source: Wikipedia)

(Source: Wikipedia)

For the first time, the term “ubiquitous computing” was mentioned in the Scientific American article, “The Computer in the 21st Century.”

Ubiqu

1993

Steven Feiner, Blair MacIntyre and Dorée Seligmann launched Knowledge-Based Augmented Reality for Maintenance Assistance — more commonly referred to as KARMA.

SMALLGI92hmd

The brainchild of Quentin Stafford-Fraser and Paul Jardetzky, the Trojan Room Coffee Pot was located in the ‘Trojan Room’ within the Computer Laboratory of the University of Cambridge. The device was used to monitor the pot levels with an image being updated about 3 times per minute and sent to the building’s server.

(Source: PetaPixel.com)

(Source: PetaPixel.com)

1994

Mik Lamming and Mike Flynn unveiled Forget-Me-Not, a wearable device that wirelessly communicated and recorded interactions of other people and gadgets, and stored the information in a database.

(Source: WN.com)

(Source: WN.com)

The term “context-aware computing” was first used by B.N. Schilit and M.M. Theimer in their paper on disseminating active map information to mobile hosts.

A group of engineers at Ericsson invented a wireless communication technology, which would later go on to be called Bluetooth.

1995

Siemens established a dedicated department inside its mobile phone business unit to develop and launch a GSM data module called “M1” for M2M applications.

(Source: Wikipedia)

(Source: Wikipedia)

1998

The name Bluetooth was officially adopted.

bluetooth_connection_big

Scott Brave, Andrew Dahley, and Professor Hiroshi Ishii of MIT’s Media Lab developed inToucha project that “explored new forms of interpersonal communication through touch.” The so-called shared object provided a haptic link between geographically distributed users, opening up a channel for physical expression over distance.

intouch

1999

The Auto-ID (for Automatic Identification) Center was founded at MIT by Kevin Ashton, David Brock Dr. Daniel Engels and Sanjay Sarma. That same year, Ashton officially coined the term “Internet of Things.”

Auto-IDLabsLogo

Andy Stanford-Clark of IBM and Arlen Nipper of Arcom (now Eurotech) introduced the first machine-to-machine protocol for connected devices: MQ Telemetry Transport (MQTT).

(Source: IBM)

(Source: IBM)

2000

LG announced the world’s first connected refrigerator: the Internet Digital DIOS. Shortly thereafter, the Hollywood film The 6th Day featured a smart fridge which informed Arnold Schwarzenegger that he was in need of milk.

1205760848352_58

The first Bluetooth-enabled devices came to market. These included a mobile phone and PC card. A few months later, the first printer, laptop and hands-free car kits would also emerge.

(Source: MacLife.com)

(Source: MacLife.com)

2002

Chana Schoenberger and Bruce Upbin published “The Internet of Things” in Forbes stating:

“Stores have eyes. Now they’re getting brains. Soon tiny wireless chips stuck on shampoo bottles and jeans will track all that you wear and buy.”

(Source: Business Insider)

(Source: Business Insider)

David Rose and others founded Ambient Devices, a spin-off of MIT’s Media Lab, which designs and markets various ambient devices enchanted by next-gen technologies. These objects, including the Ambient Orb, uniquely display information like weather, traffic reports and stock quotes.

2003

The term “Internet of Things” continued to gain mainstream popularity as it is mentioned in notable publications like The GuardianScientific American and the Boston Globe.

2005

Led by Massimo Banzi, a team of students and faculty members at the Interaction Design Institute Ivrea in Ivrea, Italy developed the Arduino, a single-board microcontroller based on Atmel’s ATmega8.

4441590461_26c63592a8_b

The United Nations first mentioned the IoT in an International Telecommunications Union report.

iotmedium

2008

The IPSO Alliance was formed to promote IP connections across networks of ‘smart’ objects.

ipso

2009

According to Cisco Internet Business Solutions Group (IBSG), the IoT was born somewhere in between 2008 and 2009 at simply the point in time when more “things or objects” were connected to the Internet than people.

2010

Google debuted a self-driving vehicle project, which served as a major milestone in the development of connected cars.

maxresdefault

Bluetooth Low Energy (BLE) was introduced.

2011

IPv6 is launched. The new protocol expanded the number of objects that can connect to the web by introducing 340 undecillion (340,282,366,920,938,463,463,374,607,431,768,211,456) IP addresses.

internet-ipv6

The term made its first appearance on the Gartner Hype Cycle.

215650_0001

Nest Labs introduced the Wi-Fi-enabled, programmable Nest Learning Thermostat.

nest-learning-thermostat-xl

2013

Google Glass was released to developers.

1024px-A_Google_Glass_wearer

Venture Beat named 2014 as the “Year of the Internet of Things.”

(Source: VentureBeat)

(Source: VentureBeat)

2014

A number of groups seeking to spur standard and framework development surfaced, including the AllSeen Alliance, Industrial Internet Consortium and the Open Interconnect Consortium.

Amid growing concerns around data breaches and device vulnerabilities, an HP report found 70% of the most commonly used IoT devices contain serious flaws — this making the case for hardware-based protection clearer than ever before.

Atmel and Arduino team up to launch of the Arduino Wi-Fi Shield 101, a shield that enabled rapid prototyping of IoT applications for Makers.

arduino_wi-fi_overhead_sticker

2015

Forecasts project that 4.9 billion connected things will be in use by the end of the year — up 30% from 2014 — and will reach 25 billion by 2020.


At Atmel, the IoT is already at the heart of what we do. We started preparing for this smarter world way back when, and now offer the industry’s most comprehensive, most highly-integrated IoT solutions. Explore them all here.