Successful Endeavours - Electronics Designs That Work!

Internet of Things


LPWAN = Low Power Wide Area Network

LPWAN is typically thought about as cellular data networks but that involves a contradiction since cellular and low power are inherently in conflict with each other. For instance, a standard 3G or 4G cellular modem will have a peak current draw of up to 2A during transmission and needs to be carefully power managed if running from batteries. This has meant that a 10 year operating life from a primary cell battery either needs a huge primary cell or very infrequent communications. So what are the alternatives?

In IoT Versus M2M we looked at how the real benefit of IoT (Internet of Things) is that rather than a single Machine to Machine link being established, there are now multiple devices connected via shared web services and their combined data is being used to create extra value, and particularly if Big Data analytics is added to the mix.

SigFox Logo

SigFox Logo

LoRa Alliance

LoRa Alliance

There is also a lot of potential disruption in this. LoRa and SigFox are both looking to provide lower cost networks to replace dependency on cellular network operators for coverage and also address the power consumption problem. There is an excellent comparison of these 2 systems in SigFox versus LoRa. And both are trying to disrupt existing cellular network providers. An overall view at available at NB-IoT versus LoRa versus SigFox.

NB-IoT

Which introduces Narrow Band IoT or NB-IoT as it is now commonly abbreviated to. Just to continue the confusion of acronyms, it is also called CAT-NB and CAT-NB1. There is a detailed view of this technology and its likely long term adoption at NB-Iot is dead – Long live NB-IoT.

The summary is that NB-IoT is too late to market and requires too much equipment changeover to win the early adopter market, especially in the USA, but will win in the long term. In the interim there is a host of other options also being developed. The cellular network operators have realised, at least 5 years too late, that their business and technology models were both under attack simultaneously. This is a particularly dangerous form of disruption.

Hardware is now becoming available and China adoption of NB-IoT makes them the  main early adopter market.

 

Quectel BC95 NB-IoT Module

Quectel BC95 NB-IoT Module

u-blox SARA-N2 NB-IoT Module

u-blox SARA-N2 NB-IoT Module

Low Power Cellular

So if up until now, low power and cellular were not usually compatible concepts, what is changing to address that?

To reduce power consumption, you have to have one or more of the following:

  • reduce transmit power
  • increase receiver sensitivity
  • reduce transmit duration
  • increase transmit interval
  • reduce network registration time
  • reduce data rate

Some of these can be mutually exclusive. However the key elements that are working together is to reduce the data rate and use a modulation scheme that means the transmitter power can be reduced. LoRa does this very well and NB-IoT is looking to achieve a similar thing. There are trade-offs and the lower data rate for NB-IoT means it is best suited to very small packets. CAT-M1 will require less power for larger packets because the faster data rate means the transmit time is a lot shorter.

Low Cost Cellular

So we have looked at the power consumption angle. How about cost and business model. And there are 2 aspects to cost. There is the hardware cost and there is a the network operations cost. To reduce cost you have to do one or more of the following:

  • reduce silicon and software protocol stack complexity
  • high volume production allows economies of scale for hardware
  • increase the number of channels available in the network
  • increase the number of simultaneous connections in the network
  • reduce margins

Both SigFox and NB-IoT aim to make the end device hardware cost as low as possible. In the case of NB-IoT and CAT-M1 the channel bandwidth can be reduced and so the same bandwidth can support multiple devices instead of just one. The power level in the device transmitter is reduced by reducing the bandwidth and data rate. As an example, a CAT-M1 module has a peak transmitter current draw of 500mA which is a factor of 4 lower than CAT-1. So low cost and low power can go together very well.

The graph below shows how the various cellular standards relate to each other.

Cellular IoT standards and how they relate

Cellular IoT standards and how they relate

IoT Deployment Options

We have been using standard 3G/4G Cellular modems for our broadly distributed IoT offerings. As of the end of this month, we ship our first CAT-1 based offerings. These have the advantage of supporting both 4G with fall back to 3G. Although NB-IoT hardware is available now from both Quectel and u-blox, the networks in Australia don’t yet support it. And while NB-IoT is ideal for fixed location assets, we also do mobile systems so these need to be CAT-M1 once it is available.

CAT-M1 is expected to be available in Australia on the Telstra network around September 2017. I am also taking this as meaning that NB-IoT is 2018 or possibly even longer. So we plan to move to CAT-M1 as soon as it is available. The modules are expected to be available about the same time as the network upgrades.

Here are some CAT-1 and CAT-M1 offerings from Quectel and u-blox.

Quectel BG96 CAT-M1 Module

Quectel BG96 CAT-M1 Module

Quectel EC21 CAT-1 Module

Quectel EC21 CAT-1 Module

The Quectel EC21 is what we are deploying in our units later this month.

u-blox LARA-R2 CAT-1 Module

u-blox LARA-R2 CAT-1 Module

 

u-blox SARA-R404M CAT-M1 Module

u-blox SARA-R404M CAT-M1 Module

IoT Network Upgrades

Ericsson have announced the roll out plans for the Telstra Network CAT-M1 capability.

And Telstra have announced their own Telstra IoT Network Plans.

This is the overall Telstra road map. Summary:
CAT-1 now
CAT-M1 by September
NB-IoT sometime after that but no dates yet

Other carriers will follow although Vodafone are well placed to introduce NB-IoT first as they have Software Defined Radio base stations from Huawei and so can roll it out as a software update.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2017 Successful Endeavours Pty Ltd.

Connect Expo

the Connect Expo is on each year around late March in Melbourne at the Exhibition and Convention Centre. I had gone to previous events but this was our first time as an exhibitor.

Connect Expo - Successful Endeavours

Connect Expo – Successful Endeavours

This was by far the best Connect Expo I have been to. The mix of software vendors, web platform vendors, component suppliers and specialist IT vendors was excellent and there was also a specific section for eHealth. We set up our own IoT Platform demonstration with a QR code you could scan with a phone and take you to a webpage showing real time (less than 5 second delay) updates to the status of a device on the stand. A simple demo of the Internet of Things in action.

We will definitely be going again next year.

A really good trend I noticed was several Software Testing companies represented in the mix. Testing to confirm software is working correctly is a very important part of delivering a high quality product and it was good to see this coming through at the industry level.

We also shared the stand with Minnovation who do data science and analytics so it was also good to see how rapidly that area is expanding.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2017 Successful Endeavours Pty Ltd.

Industry 4.0 and Bosch Australia

This is the first of a 2 part past covering the SEBN (South East Business Networks) business breakfast just before Christmas 2016. The first speaker was Gavin Smith of Bosch Australia. His talk was title “Life After Auto” and here is my summary.

Gavin Smith - Bosch Australia

Gavin Smith – Bosch Australia

In the 1960s you could make anything in Australia because the import tariffs were high and we were a long way away from the rest of the world. But by 2008 all that had changed. Although Robert Bosch is the largest tier 1 automotive supplier in the world, and the largest automotive company that doesn’t assemble vehicles, the original Bosch Australia factory is no longer there and a new one built and they are about to expand again.

So there is a lot of change. He also quoted Jack Welsh of GE fame: “If the rate of change on the outside exceeds the rate of change on the inside, the end is near”!

High volume no longer has to be a lot of the same thing. They are now doing high mix electronics manufacture and are about expand that as they have run out of capacity. This follows the Industry 4.0 model rather than traditional manufacturing.  The design team is also expanding s they are now do bespoke product design with the intention of making them locally.

Bosch are also keeping track of the following Megatrends:

  • Demography
  • Urbanisation
  • Energy and climate
  • Connectivity
Bosch - Megatrends

Bosch – Megatrends

And all of this relies heavily on IoT (Internet of Things) devices and Big Data. To be a global supply chain player or to have a modern product you will have to have connectivity and visibility of every part of your process and your supply chain as well. And for Industry 4.0 you will especially need it for inside the factory. This is already happening.

Robert Bosch are also looking at incubation for new ideas internally and also externally. This is a great idea and something we are also doing with both clients and prospects.

They are also looking to attract more women into STEM (Science, Technology, Engineering and Maths). Something I am also keen to see happen.

Industry 4.0 example

Gavin finished with a video that showed just how streamlined the Design to Manufacture path could become. Something essential to the realisation of a true Industry 4.0 mass customisation.

While it is worth remembering that some of the above is a view of how the Industry 4.0 future could be, rather than what today looks like, Europe have been pursuing this trend for 15 years. So we have quite a bit of conceptual catching up to do as well as implementation capability. And we need to start early which is why the Casey Tech School project and Schools of the Future are so important.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2017 Successful Endeavours Pty Ltd.

 

IoT Interoperability

There are several big issues with IoT. The primary 2 are Security and Interoperability. We have tackled IoT Security and so this post looks at how different devices and systems can work together. This is Interoperability.

The first thing to understand, is that middle ware providers like IBM do not want you to be able to exchange data independently of them. They want you captive to their ecosystem. They make money from you having to pay them for continued access to your own data. This inherently works against one aspect of interoperability.

IEEE has put together a useful introduction which you can access at Interoperability in the Internet of Things. This includes a useful audio explanation and detailed articles on each area plus sample projects.

IoT Interoperability

IoT InteroperabilityIoT

The IoT vision is for a highly connected and interoperable system but most systems do not interoperate well. And standards development is still ongoing which means there is no agreement in sight.

To explore further, there are some excellent resources at:

As usual, Europe seems to be doing more to foster unity and collaboration and has many excellent projects to help this. The Unify IoT project has published results which are freely available. They conclude that there are 300 IoT frameworks in use and 20 of them are quite popular. But no standards are expected anytime soon and the lack of standardisation is a big impediment to getting the full benefit from the technology.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2017 Successful Endeavours Pty Ltd.

Digital Tomorrow is Today

The most recent Casey Cardinia Business Group breakfast heard from Chris Riddell, futurist. This is a summary of what he said.

Chris Riddell - Futurist

Chris Riddell – Futurist

The future is already here. The digital revolution has happened. So what about tomorrow?

This is the question Chris posed to the room at the start of his presentation.

Chris asserts that the technological revolution has already happened. Now it is Velocity that counts. So what does Velocity mean?
In Software Development, Velocity refers to the rate with which you are completing a project. If Velocity is too low, you will not finish on time. Ideally Velocity is above the original planned value and you will deliver ahead of schedule. At the very least, this allows you time to test comprehensively. Projects running late often compromise on test in order to save time. This tactic usually adds time in the long run.

His first example was OTTO. This is a start-up of ex Google employees who are developing self-driving track technology that can be retrofitted to existing trucks. So you don’t need to design a new vehicle, you can add their system to your existing fleet. They have early adopted product in the market (delivering beer via self-driving trucks) and hope to be fully market ready in 9 months. And uber bought OTTO. This rapid time to market is an example of the increasing Velocity available today.

OTTO self-driving truck

OTTO self-driving truck

A local example we are working with is Maintabase. This is a Melbourne based start-up that came to us 2 months ago with some “off the shelf” hardware to try and configure it as a demonstration of their asset management concept where you can monitor machine cycle and operating time automatically and identify when maintenance points will be reached. Like OTTO, this can be retrofitted to any existing machine. They were trying to use “off the shelf hardware” for good reason; low development cost. However the hardware was difficult to configure and use, not very flexible, and ultimately not what they wanted in a final product. It was never going to do what they needed and was only ever an interim measure. So we created the product they need and they are launching it at Future Assembly in the IoT Category. See Future Assembly – IoT – Maintabase for more details. So idea to launch in 8 weeks!

Maintabase

Maintabase

And then there is Tesla who have reinvented the modern passenger automobile and already offer autonomous cars.

Tesla

Tesla

And now a medical example. 23 and Me will send you a DNA kit. You provide a saliva sample in the test tube they provide. They then send you a detailed report describing your genetic ancestry, what health issues you will expect have in the future and even what kind of children you will have with your partner (you need 2 samples for that). This was banned in the USA due to concerns about how to regulate it so they moved to Europe and launched there. Now they are also able to operate in the USA. 5 years ago a service like this would have been prohibitively expensive. Now it is a very affordable tool to allow you to manage your life better.

23 and Me - Welcome to You

23 and Me – Welcome to You

We also see the huge burst of activity in Wearables that allow you to quantify things like quality of sleep, activity level and a whole range of health and other indicators. The Quantified Self requires measurement and these devices do a good deal of that already.

Lean Digital Start-Up

Computing technology is also changing so rapidly that you can do a hugely scalable start-up in a shed. This is technology going full circle. HP started in a shed. So did Google and Apple. The shed may become the new business launch model.

This allows a new class of business opportunities lumped under the banner of the Lean Start-Up. I’ve added “Digital” to the mix because there is a lot of emphasis now on being able to scale quickly. So we have the Lean Digital Start-Up. So low investment, low risk, potentially huge upside, potentially scalable. The failure rate of Lean Digital Start-Ups is unfortunately also huge. About 25 times the failure rate of conventional businesses. The risk due to failure is much lower and they can pivot rapidly. This is Agile applied to the Business Model.

Old world businesses are like huge plantations and have a specific focus and everything is about optimising that focal point. By comparison, the new business paradigm is like hacking your way through a rain forest looking for a breakthrough plant or animal that holds the cure to something incurable. The latter is a much more chaotic process and results are unpredictable.
Access to technology means that even mobile phone calls and SMS are old hat and is all about video, high speed data sharing and experience.

The Future – What Next?

BMW have just celebrated 100 years in business. That is a great achievement. If you go back 50 years, it was all about the product, the technology, the reliability. Today it is all about the experience. And they are talking about selling transportation services rather than vehicles in 10 years time.

Super Fluidity is now the norm. You can transfer data almost instantly to anywhere in the world. Today you can design a product , send the file somewhere else on the planet and have it 3D printed . You can now 3D print food. Oreos can be custom designed by you and then made for you and shipped to your address.

Why is Google self driving cars happening? Google do search and other data stuff. The answer from Google is that a driver-less car is a mechanical problem that needs an information solution. And Google are an information solution company.

Why is Lego still in business? It is a plastic block. Easy to copy and many have done it. Yet today they are the most influential toy company in the world. Everything is about the user. You can design your own kit, select the blocks, buy it and have it delivered to your door. You can build it on screen, have it 3D rendered and sent to your device to show or share with your friends.

Apple have enough cash on their books to pay out Greece’s national debt 3 times over and still run their business for a year even with no sales. And they did it by making their product easy to use and putting a full ecosystem together to support the user.

Air bnb, uber, Spotify and many other companies are leveraging great user experiences and offering great value.

We are headed into an era of no screens, augmented reality and where the world is your screen and data is your overlay.

Pretty exciting times lay ahead as we catch up with the capability the Digital Revolution already lays before us.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd.

IoT Security

The Internet of Things, or IoT, is a pivotal component of the future and is driving initiatives from Smart Cities through Ubiquitous Computing and Augmented Reality. Of course the next step up from Smart Cities is a Smarter Planet. But we aren’t at Smart Cities yet.

An enabling technology like IoT can also have roadblocks to adoption. The principal ones being addressed now are:

  • power consumption
  • cost of goods
  • size
  • security

The biggest issue right now is IoT Security. Recent DDoS (Distributed Denial of Service) attacks have used IoT Devices as the attack launchers. They are being selected because many have weaker security than fully fledged computing devices.

DDoS or Distributed Denial of Service

DDoS or Distributed Denial of Service

In a recent article on IEEE Spectrum on the Path to IoT Security it is argued that IoT Manufacturers must take responsibility and not leave it up to end users. There is also a role of industry standards however no clear set of standards have yet been agreed. So although 2016 is the Year of IoT, with this being the single biggest category of product shipped, it is still very early days where things like IoT Security and IoT Interoperability are concerned.

IoT Security versus Software Security

This is not a new dilemma. Software Security is always important and it becomes increasingly important as Internet Communicating IoT Devices become more widespread. One apparent assumption underlying all this is that an IoT Device must be a fully IP Stack capable platform. That is not necessarily the case. In the video I shared about our Water Metering Remote Telemetry project one thing I didn’t mention is that the data stream is all driven from the IoT Device. There is nothing to log into. You can’t patch it with a Windows, Linux or other OS patch to override its function. It is not capable of being used in a DDoS attack because you can’t get to anything in it that can do that. So it is inherently secure against that form of risk.

Internet of Things Cconnectivity

Internet of Things Connectivity

However there are other risks. Nick Hunn has an insightful piece on Wireless Security for IoT where he argues that we are declaring security is present while having no evidence of proving it. That article is a little dated but the basic tenets still seem to apply. Just because a manufacturer or industry alliance states they have addressed security, it doesn’t make it automatically true.

So IoT Security is Software Security with the added component of protecting the physical hardware.

IoT Security in the Future

We still don’t have standards, so for now, individual device manufacturers and alliance members will need to ensure they have adequate security out of the box. The level of security required is determined by the importance of the data, either its security against unauthorised access, or its integrity against falsification. And at the asset level, its proof against either being disabled or used as an attack vector.

As an example, I am personally not so concerned if a hacker can find out how much electricity use my smart meter is reporting. Unless they get time of day usage and can correlate with other data sources to work out in advance when we aren’t home so they can rob us. My energy provider probably cares more about this data for all its customers coming into a competitors hands. Or maybe not. But I do care that I don’t get an outrageous bill because they were able to send fake data for my account to a server.

And energy grid managers care about usage data and Smart Meter appliance management being used to crash an entire electricity grid!

In the case of the Water Metering Remote Telemetry project I care that it remains online and working because otherwise someone will have to travel a long way to fix it. We have a facility in Gilgandra that is 892Km away as the crow flies. It will take a full day to get there and then another to back again. So I want it to be proof against some hacker disabling its communication ability. Since it has a physical antenna, I do care about that being hard to break. So some of these devices are put above normal reach and everything is inside a secure plastic case including the antenna. And our customer wants to know the reported water usage is correct. This means no missing data, and no incorrect data. They use the data to bill their customers.

One simple way to mess up data is a Replay Attack. If you can intercept and copy a data transmission, then you can play back that transmission any time you want to. You don’t even have to understand the content, the encryption, anything. Simply capture a HTTP POST or GET and replay it. Why does this matter? Because if the data transmitted is the volume of water used since the last report, then every time you play it back, you add to someone’s water bill. Or you distort the level of water the system believes is in a tank or reservoir. You can protect against these attacks in a number of ways but you have to consider the need to protect against them first of all.

There is a large volume of material on this topic. Here are some additional articles you might find useful for broadening your perspective on this topic:

I’m sure you won’t find it hard to search out a lot more articles. Just consider this. Once it has an Internet connection, any device can access anywhere in the world. And most firewalls protect against incoming attacks. A corrupted device on the inside can get out any time it wants to.

Internet of Things Global Reach

Internet of Things Global Reach

And if you want a really interesting view of what this could be like 10 years from now, I recommend reading Rainbow’s End by Vernor Vinge. Enjoy. And this isn’t my first reference to this book because I think it is fairly prescient in its exploration of a most probable future.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd.

CEDA and Australia’s Innovation Challenge

CEDA, or the Committee for Economic Development of Australia, run regular industry sessions to discuss topics of national economic importance. The latest was a lunchtime session covering the benefits of Innovation and also some of the challenges we need to overcome to take advantage of Innovation in Australia.

Committee for Economic Development of Australia

Committee for Economic Development of Australia

Here are videos of the panel discussion which raise a lot of excellent points. They are split into 2 due to their length.

 

Below I cover my take on some of the areas covered both before and during the panel discussion.

Innovation in Job Hunting

Job hunting, or seeking, is a 2 way problem. Potential employees want a good job and potential employers want good employees. Should be simple, right?

Doug Blue of SEEK shared some changes in the jobs market. SEEK used to just place job advertisements on a Web site. Now they have moved to employment fulfillment with up to 70% of job placements being through their services. This is typical of the shift in value creation that is happening all over the world.
A recent survey in Australia shows that 76% of people do not like their current job.

Innovation in Governance

Glenys Beauchamp PSM, of the Department of Industry, Innovation and Science, shared statistics and perspectives on the local economy. This is a summary of what was a very comprehensive and competent presentation.

Glenys Beauchamp

Glenys Beauchamp

The OECD statistics show that up to 50% of new jobs are due to Innovation. So this is an important topic for national growth. And to add more weight to the argument, 60% of productivity gains are due to Innovation.

Australia’s GDP growth has remained flat since 2011 and if this continues then our standard of living will start to fall.

Innovative businesses grow faster, have a more diverse range of market offerings, and create more jobs in them and around them than businesses which are not Innovation focused.

Drivers for Innovation:

  • High proportion of tertiary qualified young adults
  • High standard of research capability

And a few challenges:

  • Low rates of disruptive Innovation
  • Reducing investment for Innovation
  • Low levels of venture and early stage investment
  • Lowest level of Collaboration with universities and publicly funded research organisations in the OECD
  • Low Collaboration in general

The Australian Government is looking at all options to improve this including funding schemes not based on grants, big science infrastructure, tax incentives, entrepreneurs programs and simplifying engagement between business and publicly funded organisations.

Innovation Panel

Lunch was followed by a panel session. The panel was:

  • Glenys Beauchamp PSM – Department of Industry, Innovation and Science
  • Geoff Culbert – GE Australia, NZ, Papua New Guinea
  • Andrew Smith – Shell Australia
  • Andy Vessey – AGL

This is a summary of the discussion.

Innovation can’t just be about improving core business output, it also has to have spread and it has to be able to cross organisational and industry boundaries.

One big challenge is moving to a net zero emissions while increasing energy availability. So clean energy generation is a key and Australia is well placed to be exploring that.

Consumers of tomorrow will be making informed choices so those businesses that don’t educate and inform their customers will lose them to businesses that do. Many traditional businesses and industries are ripe for digital disruption.

GE see software as key to their digital industrial product range. IoT, or the Internet of Things,  is key to the adding of more value.

Shell are looking sideways at every industry they can to identify technologies they can harness in their industry. And they find Australia has many excellent researchers and businesses that can be tapped for solutions to problems that they don’t yet have a satisfactory answer for.

There is a role for Government to get the macro economic conditions right to encourage businesses to act through appropriate incentives. But Government also needs to change its own behaviour to be able to be a part of the future rather than living in a bureaucratic past.

Australia was outraged that we came 10th in the medals tally at the Olympic Games yet there is no outrage about our abysmally low Collaboration and business ratings! How do we get the bigger conversation going at the citizen level?

It is about investment level and investment focus. We value sporting success so we invest. To do better we have to either invest more or invest smarter. It is the same with Innovation and Collaboration. The real issue is where will the funding come from, and exactly how will it be applied. No-one seems to be addressing the lack of funding in a serious way.

Intellectual Property is no longer the main game, nor is data. It is the insights you get from data that is more important. GE have made their IoT operating system, Predix, open source because it is the leverage you get from it that is valuable, not just owning it. And it could also allow others to design devices that can readily fit into the GE ecosystem.

Innovation Summary

For me, the key points that keep coming up are:

  • Low Collaboration is holding us back. And this is a cultural issue. So no amount of money can fix that. We have to address the culture itself.
  • Everyone agrees a lot more money is needed and should be invested. No-one agrees to offer it.
  • Business models are still the biggest area for Innovation and we should keep pushing the boundaries on business models

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd.

We Won Best Networking Implementation

You might have read our post on being finalists at the PACE Zenith Awards 2016. Tonight we won the Best Networking Implementation award for 2016. Our Congratulations also go to IND Technology. Their Early Fault Detection product was the design we won this award for.

PACE Zenith Winners 2016

PACE Zenith Winners 2016

If you are wondering what the product does, it measures electromagnetic radiation from the electricity distribution grid using custom designed antennas, does DSP math on it, determines if a fault condition such as Partial Discharge is present, and sends an alert if it detects that. It does this at 250MSPS every second and uploads the summary results to a web service. Using PPS GPS synchronisation you can determine the distance to the fault from each EFD Device. Scatter a few of these around the network and you have the most cost effective Early Fault Detection system you can get. It is also a classic high bandwidth IoT project.

OK, enough engineer speak. Here is a summary from the night.

The MC was Merv Hughes who brought a lot of humour to the night through his novel pronunciation of technical terms.

The Keynote Address was given by Dr. David Nayagam who walked us through the The Bionic Eye project and the difference it was going to make to people experiencing blindness that didn;t have underlying receptor damage.

And we had an extraordinary interlude of entertainment by the Unusualist, Raymond Crowe.

PACE Zenith Awards 2015

PACE Zenith Awards 2016

2016 PACE Zenith Awards Winners

Here are all the winners by category:

  • Safety system innovation – Robotic Automation, for Multi-product Robotic Automation
  • Manufacturing Control – Sage Automation, for Integrated Process Control
  • Automation Innovation – Robotic Automation, for Multi-product Robotic Automation
  • Transport Control – Encroaching. For POW’R-LOCK
  • Mining and Minerals Process Control – Scott Automation & Robotics, for ROBOFUEL
  • Water and Wastewater Control – SMC, for Ethercat Network for Treatment of Wastewater
  • Machine Builder – Automation Innovation
  • Oil and Gas Innovation – Yokogawar Australia, Julimar Development Project
  • Power and Energy Management – Alliance Automation, Oxley Creek Rehabilitation Project
  • Best PLC. HMI and Sensor Product – Bestech Australia, Beanair Wireless Sensor Network
  • Best Network Implementation – Successful Endeavours, IND Technology Early Fault Detection System
  • Young Achiever of the Year – Kayla Saggers
  • Lifetime Achievement – Peter Maasepp
  • Project of the Year – Yokogawa, Julimar Development Project

Our congratulations go to all the participants.

Successful Endeavours specialise in Electronics Design and Embedded Software Development, focusing on products that are intended to be Made In Australia. Ray Keefe has developed market leading electronics products in Australia for more than 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd.

Predicting the Future

How hard can it be. Surely everything follows on from everything else?

This is what was behind Sir Isaac Newton’s proposition that if we work out the equations of the universe and plug in the initial conditions, we can predict everything. And so science became the new religion of western society.

Until quantum mechanics came along.

So there are 3 ways the future can prove unpredictable. We can have unexpected discoveries (breakthroughs), we can have existing ideas that meld together in unexpected ways (convergence), and we can have false ideas eradicated (proof). The latter is the harder and the first is the easier to understand the implications of. So I am going to focus on convergence.

Convergence

These comments below are taken from Peter Diamandis and you can join his mailing list too if you want to get access to thinking like this.

Peter Diamandis

Peter Diamandis

Unexpected convergent consequences… this is what happens when eight different exponential technologies all explode onto the scene at once.

An expert might be reasonably good at predicting the growth of a single exponential technology (e.g. the Internet of Things), but try to predict the future when the following eight technologies are all doubling, morphing and recombining… You have a very exciting (read: unpredictable) future.

  1. Computation
  2. Internet of Things (Sensors & Networks)
  3. Robotics/Drones
  4. Artificial Intelligence
  5. 3D Printing
  6. Materials Science
  7. Virtual/Augmented Reality
  8. Synthetic Biology

This year at my Abundance 360 Summit I decided to explore this concept in sessions I called Convergence Catalyzers.

For each technology, I brought in an industry expert to identify their Top 5 Recent Breakthroughs (2012-2015) and their Top 5 Anticipated Breakthroughs (2016-2018). Then, we explored the patterns that emerged.

This blog (the first of seven) is a look at Networks and Sensors (i.e. the Internet of Everything). Future blogs will look at the remaining tech areas.

Networks and Sensors

At A360 my first guest was Raj Talluri, the Senior VP of Product Management at Qualcomm, who oversees their Internet of Things (IoT) and mobile computing businesses. Here’s some context before we dive in.

The Earth is being covered by an ever-expanding mesh of networks and sensors that form the Internet of Things (or the Internet of Everything). Think of the IoT as the network of all digitally accessible objects, estimated at 15 billion in number today, and expected to grow to more than 50 billion by 2020.

But what makes this even more powerful, is that each of these connected devices, are themselves made up of a dozen sensors measuring everything from vibration, position and light, to blood chemistries and heart rate.

Imagine a world rapidly approaching a trillion sensor economy where the IoT enables a data-driven future in which you can know anything you want, anytime you want, anywhere you want. A world of instant, high-bandwidth, communications and near perfect information.

The implications of this are staggering, and I asked Raj to share his top five breakthroughs from the past three years to illustrate some of them.

Recent Top 5 Breakthroughs (2013 – 2015)

Here are the breakthroughs Raj identified in Networks and Sensor technology from 2012-2015.

Emergence of Continuous Low-Power Always-On Sensors

One of the major advances from the past three years has been the proliferation of “always on” sensors.

As Raj explains, “You’ll be amazed how many of your phone sensors are always on. If you look at your phone, there were times when you had to press the button to say “hello Google” or “hi Siri”. Now, you don’t. You just talk to it and it figures it out.”

“This has been made possible because you’re now able to make very low power sensors that listen to you all the time, keyword detect and do the data processing.”

Smartphones Drives Sensor Volume at Low Cost

The number of sensors in your smartphone today have exploded. Raj continues, “We are now seeing 10, 20 and even 30 sensors embedded in our smartphones. Things like proximity sensors when you pick your phone up, gyros, cameras, depth sensors and so on. This has really driven down cost and driven the discovery of new sensors, because there are a billion smartphones [sold] every year. It’s a huge opportunity.”

A billion phones means 20 billion+ sensors – and we are headed towards a trillion sensor economy.

“Systems” Fuse Continuous Sensor Data & Cloud Processing

Seamless integration of processing is happening in the cloud and on your device. Raj explains, “When you say, ‘Okay, Google,’ a part of what happens next is on the phone and a part is on the cloud. You don’t really know where the processing is being done, on your device or on the cloud, the hand off is seamless.”

4K Video Format Goes Mainstream

4K screen resolution is close to the point that the brain is unable to notice pixels. As such, somewhere between 4K and 8K, virtual reality become visually equal to visual reality.

Raj explains how this technology is exploding: “If you buy a 4K TV and watch 4K content, it’s very hard to go back to 1080p. It almost feels like you were watching a VHS tape when DVDs came out. Today, if you look at what we’ve done at Qualcomm in the high-end processors space, we shipped over 200 to 250 million processors that actually record in 4K.”

Opening of Sensor APIs to 3rd Party Apps Development Community

The reality is that the majority of phone apps now come from third party developers. This explosion in apps (perhaps 50 to 100 per phone) is only possible because of (i) the opening of the APIs for the sensors in the devices and (ii) the community of developers that has emerged as a result.

So what’s in store for the near future?

Anticipated Top 5 Breakthroughs (2016 – 2018)

Here are Raj’s predictions for the most exciting, disruptive developments coming in Networks and Sensors in the next three years.

As entrepreneurs and investors, these are the areas you should be focusing on, as the business opportunities are tremendous.

Wireless Network Densification (4G/5G): Cost / Megabit Plummets

The cost per megabit of connection is going to plummet – essentially nearing “free” in the very near future.

Raj expands, “Already in places like Indonesia, we find that people are actually getting data plans at a price of $5 a month. In most of the world, the cost per megabit is extremely low as the cost of launching networks is plummeting.”

Emergent Peer-To-Peer Tech Drives Automotive Communication & Safety

Soon all of your devices at home and work (screens, thermostats, DVRs, computers, even cars) will automatically connect seamlessly. You won’t have to make conscious decisions about how to connect your washing machine. When it finishes washing the clothes, you will get a notification on your phone.”

Global Internet Connectivity via Satellite Plummets in Cost

Qualcomm, in partnership with Richard Branson, are working to deploying a 648 satellite constellation called OneWeb. Raj explains, “Global Internet connectivity through satellites is finally going to happen… Just think about three billion new people coming online at a megabit per second. It is going to be completely different kind of experience.”

Exponential Growth in Connections to Internet from Various Devices – Personal/Home/Cities

Raj says, “I often ask people: how many IP addresses do you think you have at your house?” Most people have no clue. They say, “Maybe two or three…”

For Raj (and most of us) it’s more like 50… your TVs, your set top boxes, phone, iPads, Nest, cameras, light bulbs…

“In the next few years, the number of things that will be connected to the Internet at any given point of time in your life is going to be so huge that the way they work is going to be very different. You won’t need to reach for your phone to do something. Coupled with sensor networks, you’ll just be able to speak and ask for what you want.”

Major Improvements of Head-Mounted User Interfaces with Rich Bandwidth and Onboard Sensors

Over the next three years, we’ll see rapid uptake of VR and AR headsets, each with

4K displays and cameras, and packed with a suite of sensors connected by high bandwidth communications to the cloud. The result is that each of us is wearing an incredible User Interface with high-speed communications that will make our virtual experiences so good that you won’t need to travel to experience something.”

There is a lot to think about there. We are heavily involved in the Internet of Things (IoT) space and particularly see the opportunities that come from low cost communications with low power electronics and always on monitoring. Suddenly you can have the flood monitoring system you never thought was possible. Or bush fire front monitoring. Or pretty much anything else you can thing of that has a sensor option already developed. And Big Data adds another dimension to this where the multiple different sensing technologies combine their data together to provide information and insights not previously possible. If I was to add another category to Peter Diamandis insights, it is that Big Data will out weight them all.

My thanks got to Luke McIndoe of Nebo Engineering for passing this on to me. They are a group of highly skilled engineers who are Piping and Pressure Vessel Designers among other things.

Luke Mcindoe

Luke McIndoe of Nebo Engineering

Successful Endeavours specialise in Electronics Design and Embedded Software Development. Ray Keefe has developed market leading electronics products in Australia for nearly 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd

Security of Software Systems

This post looks at security of software systems in the embedded realm. We are fortunate to have some good recommendations from IEEE on this topic. The first looks at avoiding Software Security Design Flaws. The summary is outlined below:

  1. Earn or give, but never assume, trust. Make sure all data received from an untrusted client are properly validated before processing. When designing systems, be sure to consider the context where code will be executed, where data will go, and where data entering your system come from. Failing to consider these things will expose you to vulnerabilities associated with trusting components that have not earned that trust.
  2. Use an authentication mechanism that cannot be bypassed or tampered with. Such mechanisms are critical to secure designs, but they can be susceptible to various forms of tampering and may be bypassed if not designed correctly. The center recommends a single authentication mechanism that leverages one or more factors for each application’s requirements; that it serves as a “choke point” to avoid potential bypass; and that authentication credentials have limited lifetimes, be unforgettable, and be stored so that if the stored form is stolen, it cannot easily be used by the thief to pose as a legitimate user.
  3. Authorize after you authenticate. Authorization should be conducted as an explicit check, even after an initial authentication has been completed. Authorization depends not only on the privileges associated with an authenticated user but also on the context of the request.
  4. Strictly separate data and control instructions, and never process control instructions received from untrusted sources. Lack of strict separation between data and code often leads to untrusted data controlling the execution flow of a software system.
  5. Define an approach that ensures that all data are explicitly validated. Software systems and components commonly make assumptions about data they operate on. It is important to explicitly ensure that such assumptions hold. Vulnerabilities frequently arise from implicit assumptions about data, which can be exploited if an attacker can subvert and invalidate these assumptions.
  6. Use cryptography correctly. Cryptography is one of the most important tools for building secure systems. With it one can ensure the confidentiality of data, protect data from unauthorized modification, and authenticate the source of data.
  7. Identify the sensitive data and how they should be handled. One of the first tasks for systems designers is to identify sensitive data and determine how to protect them. Many deployed systems over the years have failed to protect data appropriately. This can happen when designers fail to identify data as sensitive, or when designers do not identify all the ways in which data could be manipulated or exposed.
  8.  Always consider the users. The security stance of a software system is inextricably linked to what its users do with it. It is therefore very important that all security-related mechanisms are designed to make it easy to deploy, configure, use, and update the system securely. Remember, security is not a feature that can simply be added
 to a software system but rather a property emerging from how the system is built and operated.
  9. Understand how integrating external components changes your attack surface. It is unlikely that you will develop a new system without using external pieces of software. In fact, when adding functionality to an existing system, developers often make use of existing components.
  10. Be flexible when considering future changes to objects and actors. Software security must be designed for change; it should not be fragile, brittle, and static. During the design and development processes, the goal is to meet a set of functional and security requirements. However, software, the environments running software, and threats and attacks against software all change over time. Even when security is considered during design, or the framework being used is built correctly to permit run-time changes in a controlled and secure manner, designers still must consider the security implications of future changes.

Wearable Device Security

The second input is specifically looking at how to protect very small computing systems such as wearables from cyberattacks. You can read the complete report at Protect Wearable Devices Against Cyberattacks. The 2 primary points made are:

  • Authentication matters – really think about how you will authenticate users
  • Ultimately code decides what happens. So mange the code base well

We are working constantly in the IoT space and so managing security and access is a big issues for these projects. If security isn’t front and center, then field deployed devices are all in trouble.

Successful Endeavours specialise in Electronics Design and Embedded Software Development. Ray Keefe has developed market leading electronics products in Australia for nearly 30 years. This post is Copyright © 2016 Successful Endeavours Pty Ltd

Next Page »