SUMMER 2020 | VOLUME 7 WWW.EMBEDDED-COMPUTING.COM http://embedded-computing.com/designs/iot_dev_kits/
TRACKING TRENDS
PG 6 5G Primer: 5G intelligent edge
Development Kit Selector
2020 Design Guide PG 20
Security threats of the past persist in today’s IoT devices PG PG 12 10
ROBUST IIOT SOLUTIONS
Embed Success in Every Product WINSYSTEMS’ rugged, highly reliable embedded computer systems are designed to acquire and facilitate the flow of essential data at the heart of your application so you can design smarter solutions.
We understand the risk and challenges of bringing new products to market which is why technology decision makers choose WINSYSTEMS to help them select the optimal embedded computing solutions to enable their products. As a result, they have more time to focus on product feature design with lower overall costs and faster time to market. Partner with WINSYSTEMS to embed success in every product and secure your reputation as a technology leader.
PPC12-427 IP65-certified 12.1-inch, fanless touch-panel PC with latest generation Intel ® Atom™ E3900 Series processor SYS-427 Rugged, low power industrial embedded computer with latest generation Intel ® Atom™ E3900 Series processor ITX-P-C444 Industrial Pico-ITX SBC with the NXP i.MX8M application processor, dual Ethernet, industrial I/O, and expansion
817-274-7553 | www.winsystems.com 2890 112th Street, Grand Prairie, Texas 75050 ASK ABOUT OUR PRODUCT EVALUATION!
Single Board Computers | Panel PCs | COM Express Solutions | I/O Modules | Network Switches | Power Supplies
Advertiser Index PAGE
ADVERTISER
7
ACCES I/O Products, Inc. – PCI Express mini card, mPCIe embedded I/O solutions
5
Crystal Group – Edge computing for IoT
11
Cypress Semiconductor Corporation – IoT-Advantedge simplifies IoT Edge Product Design
1
Digi-Key Corporation – Development Kit Selector
15
Tadiran Batteries – IIoT devices run longer on Tadiran batteries
17
Technologic Systems – TS-7100 – Our smallest single board computer
32
Virtium – Only extra-rugged SSDs need apply
2
WinSystems – Robust IIoT solutions
19
wolfSSL – IoT Security
EMBEDDED COMPUTING BRAND DIRECTOR Rich Nass rich.nass@opensysmedia.com EDITOR-IN-CHIEF Brandon Lewis brandon.lewis@opensysmedia.com TECHNOLOGY EDITOR Curt Schwaderer curt.schwaderer@opensysmedia.com ASSOCIATE EDITOR Perry Cohen perry.cohen@opensysmedia.com ASSISTANT EDITOR Tiera Oliver tiera.oliver@opensysmedia.com DIRECTOR OF E-CAST LEAD GENERATION AND AUDIENCE ENGAGEMENT Joy Gilmore joy.gilmore@opensysmedia.com CREATIVE DIRECTOR Stephanie Sweet stephanie.sweet@opensysmedia.com SENIOR WEB DEVELOPER Aaron Ganschow aaron.ganschow@opensysmedia.com WEB DEVELOPER Paul Nelson paul.nelson@opensysmedia.com CONTRIBUTING DESIGNER Joann Toth joann.toth@opensysmedia.com EMAIL MARKETING SPECIALIST Drew Kaufman drew.kaufman@opensysmedia.com
SALES/MARKETING DIRECTOR OF SALES AND MARKETING Tom Varcie tom.varcie@opensysmedia.com (734) 748-9660 MARKETING MANAGER Eric Henry eric.henry@opensysmedia.com (541) 760-5361 STRATEGIC ACCOUNT MANAGER Rebecca Barker rebecca.barker@opensysmedia.com (281) 724-8021 STRATEGIC ACCOUNT MANAGER Bill Barron bill.barron@opensysmedia.com (516) 376-9838 STRATEGIC ACCOUNT MANAGER Kathleen Wackowski kathleen.wackowski@opensysmedia.com (978) 888-7367 SOUTHERN CAL REGIONAL SALES MANAGER Len Pettek len.pettek@opensysmedia.com (805) 231-9582 ASSISTANT DIRECTOR OF PRODUCT MARKETING/SALES Barbara Quinlan barbara.quinlan@opensysmedia.com (480) 236-8818 STRATEGIC ACCOUNT MANAGER Glen Sundin glen.sundin@opensysmedia.com (973) 723-9672
EVENTS IoT Device Security Conference October 13, 2020 • Santa Clara, CA https://iotdevicesecurityconference.com
electronica 2020 November 10-13, 2020 • Munich, Germany https://electronica.de/en
INSIDE SALES MANAGR Amy Russell amy.russell@opensysmedia.com ASIA-PACIFIC SALES ACCOUNT MANAGER Patty Wu patty.wu@opensysmedia.com EUROPEAN MARKETING SPECIALIST Steven Jameson steven.jameson@opensysmedia.com +44 (0)7708976338
Embedded World March 2-4, 2021 • Nuremberg, Germany https://www.embedded-world.de/en
WWW.OPENSYSMEDIA.COM PRESIDENT Patrick Hopper patrick.hopper@opensysmedia.com EXECUTIVE VICE PRESIDENT John McHale john.mchale@opensysmedia.com EXECUTIVE VICE PRESIDENT Rich Nass rich.nass@opensysmedia.com CHIEF FINANCIAL OFFICER Rosemary Kristoff rosemary.kristoff@opensysmedia.com GROUP EDITORIAL DIRECTOR John McHale john.mchale@opensysmedia.com VITA EDITORIAL DIRECTOR Jerry Gipper jerry.gipper@opensysmedia.com
WEBCASTS Embedded University: The Software Future of the Automotive Industry Sponsored by Real-Time Innovations (RTI) https://bit.ly/35aVypq
SENIOR EDITOR Sally Cole sally.cole@opensysmedia.com ASSISTANT MANAGING EDITOR Lisa Daigle lisa.daigle@opensysmedia.com ASSOCIATE EDITOR Emma Helfrich emma.helfrich@opensysmedia.com CREATIVE PROJECTS Chris Rassiccia chris.rassiccia@opensysmedia.com PROJECT MANAGER Kristine Jennings kristine.jennings@opensysmedia.com
Connected Factory Design: Roadmap to Success Sponsored by Kontron and Litmus https://bit.ly/2YeuHXS
FINANCIAL ASSISTANT Emily Verhoeks emily.verhoeks@opensysmedia.com SUBSCRIPTION MANAGER subscriptions@opensysmedia.com CORPORATE OFFICE 1505 N. Hayden Rd. #105 • Scottsdale, AZ 85257 • Tel: (480) 967-5581 REPRINTS WRIGHT’S MEDIA REPRINT COORDINATOR Wyndell Hamilton whamilton@wrightsmedia.com (281) 419-5725
www.embedded-computing.com/iot
Subscribe to a free digital edition of IoT Design magazine or the IoT Design Weekly e-mail newsletter at www.embedded-computing.com/iot IoT Design Guide 2020
3
Summer 2020 | Volume 7
CONTENTS
opsy.st/IoTDesign
FEATURES 8
8
MISRA coding standard and static code analyzers By Ekaterina Nikiforova, PVS-Studio
12
Security threats of the past persist in today’s IoT devices By Perry Cohen, Associate Editor
14
What you need for effective IoT data systems
16
By Oren Eini, RavenDB
16
How wireless tech is changing predictive maintenance
COVER Still the buzz in IoT right now: Edge computing – Big Data – security. Industry experts cover these subjects and more in our IoT Design Guide. In addition, get the details on some of the embedded industry’s most innovative IoT products and solutions in our Product Profile section, beginning on page 20.
WEB EXTRAS
By Alf Helge Omre, Nordic Semiconductor
18
@iot_guide
Ą Medical Innovation and the Custom Optical Sensor By Walter Brooks, Global Product Manager of Optoelectronics at TT Electronics
Challenges and opportunities with medical embedded applications
https://bit.ly/3aJ5ZSe
Ą The Era of Shared Touch is Ending
By Colin Walls, Mentor Graphics
By Todd Mozer, CEO at Sensory
18
https://bit.ly/2VFjWfD
Ą Security in Our IoT Products: We’ve Never Needed It, So Why Start Now? By Nick Dutton, Senior IoT Product Marketing Manager at Silicon Labs https://bit.ly/2SauXne
Ą Momentum Builds for PSA Certified By Max Maxfield, Freelance Technology Writer https://bit.ly/3eUCj7W
20
2020 DESIGN GUIDE AI & Edge Computing Cloud Development Kits IIoT/Industry 4.0
LPWAN (Including LoRa, NB-IoT, etc.) Security Storage Test
COLUMNS 6 4
TRACKING TRENDS – 5G Primer: 5G intelligent edge By Curt Schwaderer, Technology Editor IoT Design Guide 2020
Published by:
2020 OpenSystems Media® © 2020 Embedded Computing Design All registered brands and trademarks within Embedded Computing Design magazine are the property of their respective owners. ISSN: Print 1542-6408 Online: 1542-6459 enviroink.indd 1
10/1/08 10:44:38 AM
To unsubscribe, email your name, address, and subscription number as it appears on the label to: subscriptions@opensysmedia.com www.embedded-computing.com/iot
Edge Computing FOR
IoT RUGGED. SCALABLE. SECURE. Crystal Group rugged networking systems bring reliable IoT and Ai processing to the edge – where office grade systems would fail. Offering NIAP certified IP-security modules for network encryption, these rugged systems are designed for smart city, asset tracking, agriculture, smart grid, smart home, and transportation use cases and provide scalable, edge switch technology with enterprise class functionality. Crystal Group’s rugged server and switch, combined with a Ruckus wireless access point, collect and process IoT data in the field. This reduces latency, improves security, and eliminates cloud-based network throughput variations. All Crystal Group products are manufactured in NIST compliant U.S. based facilities with end-to-end U.S. supply chain of custody.
SERVERS | DISPLAYS | STORAGE | NETWORKING | EMBEDDED | CYBER info@crystalrugged.com | 800.378.1636 | crystalrugged.com
TRACKING TRENDS
5G Primer: 5G intelligent edge By Curt Schwaderer, Technology Editor
curt.schwaderer@opensysmedia.com
Multi-Access Edge Computing (MEC) is a network architecture that involves deploying application servers at the edge of the 5G mobile network co-located with the Radio Access Network (RAN) elements. These edge application servers provide virtualized compute, storage, memory, and network resources to application software that can run closer to the users which have a variety of benefits. They range from low-latency response to lower network congestion backhauling traffic to a centralized application server location. These MEC servers are part of a “distributed edge micro-data center” concept where applications developed by the mobile operator or third-parties can be packaged and run as VM images with a business model similar to the popular cloud services available today from Amazon, Microsoft, IBM, and others. MEC drives an entirely new business model and revenue streams for mobile operators.
MEC reference architecture and use cases 5G represents the convergence of IT systems architecture with telecommunications network architecture. If you know enterprise virtualization, you’ll find the MEC reference architecture familiar. (Figure 1). The use cases are varied and far-reaching. Two familiar, but less exciting applications involve data caching and local content distribution. Caching is done today using special connections with cache-specific servers to reduce delivery latency and capacity issues involved with many users making requests of a popular service host on the internet. Utilizing MEC can lower server deployment expense and also achieve finer grain, more optimized caching and distribution. Some of the more glamorous applications involve enhanced location services, augmented reality, and video analytics. Another feature of the MEC involves low latency applications. The most common one is autonomous driving. For this application, it’s critical that things like object detection, analysis, and anti-crash measure calculations be performed with low latencies that cloud computation cannot guarantee. MEC is the ideal place to provide the intelligence for things like autonomous and assisted driving. Since MEC is also in a mobile network, there are of course analytics, monitoring, and maintenance of the 5G network that can take advantage of MEC. Having distributed MEC applications monitor and track key performance indicators on network use, bandwidth, user scaling over time, and preventative maintenance of the RAN provide valuable insights for network planning and reliability for mobile operators.
MEC standards and governance ETSI has an Industry Specification Group (ISP) focused on standards around MEC. This is a fairly recent group, having been formed only a few years ago, but they have been productive. The reference architecture in figure 1 comes from ETSI and there are already published standards paving the way to an open, interoperable, and secure MEC environment. A few of the notable ones are:
•
ETSI GS MEC 012 (2019-12) – MEC Radio Network Information API. This standard is an example of APIs to support network monitoring.
6
IoT Design Guide 2020
FIGURE 1 •
•
•
•
MEC Reference Architecture
ETSI GS MEC 010-2 (2019-11) – Application lifecycle, rules, and requirements management. This provides the foundation for application development for the MEC environment. ETSI GS MEC 013 (2019-09) – Location API. Application interface for providing various location services for 5G. ETSI GS MEC 016 (2019-04) – UE applications interface. Standardized interface for UE applications to communicate with MEC applications. ETSI has also been hosting various hackathons and MEC proofs of concept forums that allow vendors to build prototypes, try out new concepts and use cases, and test interoperability.
The MEC Proof of Concept (POC) projects serve a valuable purpose in bringing standards to life. There are currently 13 POCs going on involving video applications, enterprise services, healthcare, smart roads, over-the-top (OTT) communications services, and communication traffic management. www.embedded-computing.com/iot
MEC challenges While standards organizations like ETSI are making good progress toward an open, interoperable MEC environment, there are still many business and technical challenges to overcome. Technical challenges involving the deployment and operation of these distributed micro data centers is daunting. Mobile operators are not familiar with enterprise data center operations and even when they acquire the expertise, operation and maintenance of these micro data centers have very distinct and unique challenges that do not encumber their enterprise data center predecessors:
•
•
•
•
•
Return on investment for operators and third party users of the MEC. This might the biggest challenge. There is a very significant capital and operational expense involved with MEC deployment and operation. Obviously the operators must monetize this successfully. But if the initial rates for application developers or tenants of the MEC is too expensive, it threatens to end the initiative before critical mass is gathered to scale it to cost-effectiveness.
Final thoughts MEC is the crown jewel of the 5G network topology crown. The incentives are real and new business models and revenue streams are a huge driver. Standardization of MEC is helping bring the technical aspects along to provide an open, interoperable, and secure environment. But many challenges still exist on the technical and business fronts before critical mass is reached. Even so, widespread MEC seems inevitable – this is not an “if” question, but a “when” question. IoT
The MEC may live on a roof, telephone pole, or stop light. This requires environmentally hardened systems. The servers are widely geographically distributed. Servicing and platform software updates must scale and cannot bring down the network if a network-wide platform software update is occurring. Each MEC does not have unlimited compute, memory, and storage resources. Applications must be structured in a way to ensure they do not fail in ways relating to unavailability of resources. MEC is loosely coupled with network slicing. Standards are still evolving so customized development is being done which risks interoperability down the road.
Business challenges may be even more daunting:
•
•
•
Capital expense: The mobile RAN consists of many nodes and deploying a distributed MEC takes significant capital expense. Operational expense: Additional power requirements to deploy MEC is a huge concern for operators. Operational maintenance is also a concern. New skill sets: Mobile operators are less familiar with enterprise/IT environment operation and maintenance. This requires additional expertise and the ability to innovate new solutions to operate and maintain these new, unique MEC environments.
www.embedded-computing.com/iot
IoT Design Guide 2020
7
SOFTWARE RELIABILITY FOR AUTOMOTIVE
MISRA coding standard and static code analyzers By Ekaterina Nikiforova, PVS-Studio
Software quality, safety, and security have become the topmost priority over the recent years. In our earlier articles, we already mentioned some events from history that entailed both large financial losses and deaths of people. The explosion of the Ariane 5, exposure of patients to a 20,000 rad (200 gray) overdose with the Therac-25 radiation therapy machine, 89 deaths through the fault of Toyota. All these stories have one thing in common: software bugs that led to huge losses.
So what is MISRA? Originally, MISRA [Motor Industry Software Reliability Association] was founded for the purpose of designing a set of guidelines for development of software for microcontrollers used in road vehicles. Since then it has been adopted in every reliability and safety critical field including the automotive industry, medical devices, aerospace and defense, and so on. The MISRA standard is a document comprised of a set of rules and recommendations which C and C++ developers should stick to when developing their applications. The MISRA-C:1998 version had 127 rules. The rules can be grouped into the following categories:
• • •
Mandatory Required – Deviations from the rules are permitted (but recommended to be documented) Advisory – Not obligatory
The first thing to be mentioned is that the application of the MISRA standard should start before the development process actually begins, and only when it is really needed. In other cases, especially when the code base is large enough
8
IoT Design Guide 2020
and isn’t intended for use on embedded systems, the developers will have to do a long and tedious refactoring. Why so? The source code of WinMerge is about 250 thousand lines of C and C++ code long. This is a small project, but the rule that prescribes enclosing the bodies of if statements in curly braces was broken about two thousand times in it. There are 127-228 rules like that (depending on the standard’s version). The source code of Nana, a cross-platform library for creating graphical user interfaces, is less than 100,000 lines of code (LOC) long. In this project, the same rule is broken about 3,000 times. www.embedded-computing.com/iot
PVS-STUDIO
www.viva64.com
• •
A loop counter shall not have essentially floating type A function should have a single point of exit at the end
Following MISRA guidelines will help enhance your software’s reliability. However, those not familiar with MISRA may wonder how exactly it is used. Do you actually have to keep all those 127 rules in your head? Here’s where static analyzers come to help.
What’s the purpose of static analysis? Manually checking the code for compliance with the MISRA standard is a long and tedious job. But you actually don’t have to memorize all those rules. A static code analyzer can do it all for you. Static code analysis is a process of detecting bugs and minor defects in the source code of computer programs. It can be viewed as automated code review. Some static analyzers can check code for compliance with MISRA rules, and it’s these tools that are going to help you find and fix all the spots in your program that don’t meet the rules. To do this, you just need to check your project with the analyzer and study the analysis report generated at the end of the check. Below I’m briefly demonstrating how to do this using the PVS-Studio analyzer and the project Shairport as an example. Clone the repository. (Figure 1.)
FIGURE 1 In addition to the rule about curly braces, there are a few more:
• • • •
The continue statement shall not be used Every switch statement shall have a default label The goto statement shall not be used All if ... else if constructs shall be terminated with an else clause
So, what is it used for?
Be sure to check your project with an analyzer and study the analysis report generated at the end of the check.
Run the build configuration script. (Figure 2.)
FIGURE 2
The second step is to run the build configuration script.
Run PVS-Studio in Trace Mode and build the project. (Figure 3.)
These rules aren’t meant to make the developer’s life harder. These are the rules written in blood, and they were needed to make safety critical code less prone to bugs. The idea is that simple and clear code is less likely to contain bugs. Here are some examples of diagnostics as proof:
• •
Assignment operators shall not be used in expressions which return Boolean value All functions that are not void should return a value
www.embedded-computing.com/iot
FIGURE 3
Building the project is the third step. IoT Design Guide 2020
9
SOFTWARE RELIABILITY FOR AUTOMOTIVE
Analyze the project files based on the results of the previous step. (Figure 4.)
NEWSLETTER The Internet of Things has reached the top of nearly every buzz chart, but it still faces some tough real-world questions. IoT Design Weekly goes beyond the hype to provide
FIGURE 4
Based on the results from the third step, the prohect can be properly analyzed.
Convert the log into html. (Figure 5.)
practical coverage on Development Kits, MCUs and MPUs, Sensors, Operating Systems and Tools, Security, Wireless, Cloud, Industrial, Smart Home, the Connected
FIGURE 5
Shown is the conversion of the log file into HTML.
We’re done: We can now view the log. (Figure 6.)
Car, and more.
FIGURE 6
SUBSCRIBE TO IoT Design Weekly at: www.embedded-computing.com/iot
10
IoT Design Guide 2020
The log file then turns up the desired results.
So, we have learned about MISRA today: we took a look at some rules, discussed why exactly those guidelines are needed, how to apply them to your project, and so on. I hope this text was interesting enough not to make you drowsy, and still informative to make its author’s work worth it. Hopefully, now you have a better understanding of what MISRA is and what static code analyzers are needed for. IoT Ekaterina Nikiforova is a developer at PVS-Studio. www.embedded-computing.com/iot
ADVERTORIAL
EXECUTIVE SPEAKOUT
IOT-ADVANTEDGE™ SIMPLIFIES IOT EDGE PRODUCT DESIGN Brian Bedrosian, vice president of marketing for the IoT Compute and Wireless Business at Cypress, an Infineon Technologies Company. The path to machine learning and personalization requires that some computing occur at the edge of the network. In fact, Gartner is forecasting that companies will generate up to 75 percent of their data outside a traditional data center within the next six years.1 Privacy is one big reason for the need for edge computing. As more devices become interconnected, it is much easier to protect data at the edge than when routed through a central server. Another driver for edge computing is the need for real-time decision-making. Processing data through the cloud can take 150 milliseconds or longer, whereas edge computing can process data locally in just 5 to 10 milliseconds.2 In applications where instantaneous decisions are required, such as detecting a pedestrian in a self-driving car, or identifying a suspect in a video surveillance system, time matters. Edge computing means that there will be billions of sensors providing data to make local decisions. But these decisions cannot happen without ubiquitous connectivity and plenty of bandwidth. While edge computing will play a significant role in enabling machine learning, so too will cloud computing. The ideal solution, then, is a distributed approach that leverages the best of both the cloud and edge. The edge can keep personal data local, enable real-time responses, and provide cost-efficiencies by not requiring centralization of all data. Meanwhile, the cloud can provide device access to an infinite amount of information allowing for better decision-making. It can also widely share this information to multiple devices. To help product developers create sophisticated, secure, and reliable IoT edge products today that are built for the future, Cypress (now an Infineon Technologies company) has unveiled IoT-AdvantEdge™ solutions. These solutions include connectivity devices and microcontrollers, software, tools and support, and capabilities from ecosystem partners to slash development complexity by solving eight critical IoT design problems: › › › ›
Connectivity HMI Ease-of-Use Cloud
› › › ›
Security Low Power Integration Monetization
IoT-AdvantEdge introduces a multifaceted approach to IoT product design that includes devices, software, tools and support, and ecosystem solutions. Devices comprise a unique portfolio of secure microcontrollers, and best-in-class Wi-Fi®, Bluetooth®, and BLE devices that work in concert to support a broad range of IoT product requirements from batteryoperated cameras to healthcare products. From a software perspective, Cypress’ ModusToolbox® development toolchain dramatically simplifies the creation of Wi-Fi and Bluetooth/BLE IoT products with RTOS system MCUs
including PSoC®. ModusToolbox includes middleware that connects products to leading cloud-software platforms or proprietary cloud services that reside on either a public or private cloud infrastructure. In the area of tools and support, IoT-AdvantEdge offers a comprehensive set of tools, including low-power assist, multi-radio smart coexistence, secure authentication, and over-the-air updates. It also includes the Cirrent IoT Network Intelligence (INI) platform that delivers unprecedented insights into connectivity, networking, and other product-performance parameters for fleets of products in the field. Additionally, the IoT-AdvantEdge ecosystem offers pre-integrated capabilities from a broad range of partners – including cloud service providers, applicationspecific semiconductor products, and applications developers – to help companies bring their IoT products to market faster. Since introducing IoT-AdvantEdge earlier this month, Cypress has announced several new IoT products and resources, including new microcontrollers, new development kits, a new software update, and new IoT web resources, such as the IoT Developer Zone on Cypress’ developer community. For more information about IoT-AdvantEdge, please visit www.cypress.com/ iot-advantedge. Footnotes: 1 Van der Meulen, Rob, “What Edge Computing Means for Infrastructure and Operations Leaders,” Gartner, October 3, 2018. https://www.gartner.com/smarterwithgartner/what-edge-computingmeans-for-infrastructure-and-operations-leaders/ 2 Krause, Reinhardt, “Next Big Thing in Cloud Computing Puts Amazon and its Peers on the Edge,” Investors’ Business Daily, November 21, 2018. https://www.investors.com/news/technology/ cloud-computing-edge-computing/
Cypress • www.cypress.com
SPECIAL REPORT: SECURITY THREATS IN IOT DEVICES
Security threats of the past persist in today’s IoT devices By Perry Cohen, Associate Editor
When it comes to IoT devices, a very particular question needs to be asked: “Are the security threats of today any different than they were 10, 20, or even 30 years ago?” The most recent hack that will come to people’s minds is the attack on the Ring doorbell. But this is a device that was created in 2012. Most wouldn’t think that even more commonly used devices like a wireless computer mouse or keyboard are considered IoT devices; by definition they are. Yossi Appleboum, the CEO and cofounder of Sepio Systems, a company dedicated to rogue device mitigation, believes that root of many device security threats is directly related to its hardware. “More and more people realize today that the state of their hardware is as bad as the state of their software 20 years ago,” the Sepio CEO said. “And while the industry did so much to protect ourselves against viruses, malwares, ransomware, and denial of service … we have so many measures against [those types of attacks]. “We have very little measures to protect our devices.” The need to protect or defend hardware holds true to regular consumer products, like the aforementioned mouse, keyboard, and even the Amazon Echo, for example. But the necessity expands far outside of the home. “The global market should be treating these devices the same way they treat their software,” Appleboum explained. “They need kind of a firewall and kind of an endpoint security in order to prevent this potential of damaged hardware of generating damage to their infrastructure.”
Device identity How could it be possible in the slightest to protect or defend IoT devices without an understanding of its identity?
12
IoT Design Guide 2020
Companies like GlobalSign rely on certification and identification to make for more secure devices. Lancen LaChance, the company’s head of IoT identity solutions, believes securing IoT devices is a challenge because of the influx of “new” technologies. “When we look at the broader scope of IoT, the uniqueness and newness of IoT is the devices themselves,” LaChance said. “What we ended up having in IoT is a new set of technologies from the embedded side, and in the embedded development world, you’re looking at new constraints on resources and processing power, capacity, bandwidth, all of those types of things that make embedded computing and connected embedded devices, different and unique.” Still, even in the face of these challenges, Diane Vautier, GlobalSign’s IoT product marketing manager, acknowledges that, “Every IoT devices needs an identity, frankly,” she said. “Unsecured devices put the entire network and ecosystem at risk.” www.embedded-computing.com/iot
Vautier points out that pioneering entities such as the State of California are recognizing the broader risk of unsecure device endpoints and are creating laws and regulations that state anyone providing connected devices to the government must have a certain level of security on them. “What we have created is an IoT identity platform and that helps companies secure device identities to manage those identities throughout their entire life cycles,” she said. GlobalSign’s IoT Identity Platform is a public key infrastructure-based (PKIbased) device identity management platforms designed specifically for OEMs, system integrators, and end users. In addition to facilitating digital certificate and key exchanges for resource-constrained connected systems, the platform includes additional features like certificate revocation that help prevent compromised endpoints from attacking or being used to attack other parts of an IoT infrastructure, ecosystem, and so on. (Figure 1). “In a PKI environment, we have a number of different players or components and what our identity platform does is it combines all of those core components,” Vautier said. “We have trusted root hierarchies, which is where you get the digital certificates from as sort of a certificate authority.” She continued, “We’re able to accommodate a number of different types of certificates, all of them common to the IoT world. We’re able to customize the profiles on those certificates for their specific use case.”
FIGURE 1
GlobalSign IoT Identity Platform
or during a device’s production. Even more important to note, security can go as far as being integrated at the chip level.
Industry awareness LaChance also touched on awareness and how we are informed, similarly to Appleboum’s points. He noted that we’re seeing more professionals in higher-up positions that have a lack of information security experience. The problem is, many of these professionals and connecting devices that weren’t previously connected devices. “Just by the fact that they don’t have the skill set, they don’t have the awareness potentially, so that’s a big factor,” LaChance said. “Another factor is that the organizations aren’t weighing the risk appropriately right now and weighing what the impact and magnitude of what a compromise is going to do. “They’re not necessarily weighing the cost or the investment into security appropriately. When this legislation starts really enforcing organizations, that’s one mechanism that will make IoT security become a priority. A second, and this is where GlobalSign comes in with a lot of our technology partners, is to make it a native and natural part of the ecosystem or the tech stack that’s going to be consumed.”
A large part to the explanation of how identification adds security is the certificate revocation process. If there’s a loss of a key or a device theft, a certificate can be revoked, making it so a device can no longer access or communicate with other IoT devices and infrastructure.
Currently, GlobalSign is working with IoT providers from the chip through the cloud to make IoT security “zero-touch.” GlobalSign has done extensive work with companies including Microsoft Azure in addition to IoT providers such as Infineon, Microchip, and Arrow Electronics. The collaborations focus on helping manufacturers produce products more securely.
This can be performed working off of a certificate revocation list or a hosted Online Certificate Service (OCSP).
When it comes to the security of IoT devices, knowledge is power. Appleboum disagrees with the notion that new problems arise; rather, older problems are at the forefront of security threats because of what we do today. He believes, in some instances, that 10-, 20-, even 30-year-old technologies are being exploited today because of weaknesses in modern infrastructure and lack of knowledge.
The entire platform can help secure devices upon deployment, during programming, www.embedded-computing.com/iot
And as the Sepio CEO puts it, you can protect only what you know. IoT IoT Design Guide 2020
13
SOFTWARE FOR IOT AND BIG DATA
What you need for effective IoT data systems By Oren Eini, RavenDB
Big Data and the IoT have emerged because for the first time, you are able to move computing power from massive servers to really cheap machines. Some data systems can have hundreds of thousands of end points, moving petabytes of data in real time. This new frontier of information offers new opportunities to those who can meet the new challenges your database must be able to manage. Here are three big challenges for Big Data and three vital components any IoT Data System must have.
old one, with this data, in a drawer. Three months later it breaks, and I start wearing the old one again. The moment I put it on, it sends this data, now 3 months old, to my doctor’s application.
What was science fiction yesterday is now reality
What happens if I had a doctor’s appointment while my first Fitbit was sitting in the drawer with last month’s data? What if the data available to him says, prescribe 100 mg of this medicine? Then, at my next appointment three months later, after all the data is updated, the retroactive updates tell the doctor that he should have prescribed me 200 mg?
FitBit is a great example of an IoT data hierarchy. A simple device attached to your wrist can measure your heart rate in real time. For our example, let’s assume this edge point can take a measurement every 30 seconds. It will transmit that information to an application on your smartphone, which can store the data, process it, even send it to your file in your doctor’s systems. A smartphone is a full-blown computer, having 100,000 times the computing power of the systems that put a man on the moon. This gives you unprecedented amounts of computing power at the edge. You can take years of hourly data and create an algorithm that will anticipate when your heart rate is likely to go up, and your smartphone application will alert you when to drink some green tea, go for a brisk walk, or take your medicine.
Challenges to an effective IoT data hierarchy Connectivity
What happens when I drive through a tunnel and my Fitbit is disconnected? What if I go hiking for a week and my device records the data, but is unable to transmit it? A database must be able to work offline and communicate all the data it collected in order to properly update the entire system when connection to the network is restored.
This is where it gets hairy ...
He needs to be able to prove that he made the right decision with what he had available at the time he made it. A database must be able to tell you the state of your data at any point in time for auditors, regulators, even opposing counsel.
Devices that age in dog years Edge processing almost guarantees you will eventually process information on older devices. Say you are tracking sales based on information coming in from over 50,000 cash registers throughout your global operations. How often will you replace all of those cash registers? Maybe once every decade. That means edge devices will get old often and you need a database that can work on hardware that will inevitably become antiquated. Processing Big Data gives you a new level of precision in diagnosing problems and developing better targeted solutions. The challenge with this new technology is to deploy the right software that is best suited to it. IoT
Unexpected updates What happens when data isn’t transmitted for a long time? What happens when decisions are made based on tremendous amounts of information, but still incomplete? For example, I have a month of data on my heart rate that is stored in my Fitbit device. My wife gets me a new model and I put the
14
IoT Design Guide 2020
Oren Eini, CEO and founder of RavenDB, has more than 20 years of experience in the development world with a strong focus on the Microsoft and .NET ecosystem. RavenDB
www.ravendb.net
@RavenDB
www.llinkedin/company/hibernating-rhinos-ltd-/
www.embedded-computing.com/iot
IIoT devices run longer on Tadiran batteries.
PROVEN
40 YEAR OPERATING
LIFE
Remote wireless devices connected to the Industrial Internet of Things (IIoT) run on Tadiran bobbin-type LiSOCl2 batteries. Our batteries offer a winning combination: a patented hybrid layer capacitor (HLC) that delivers the high pulses required for two-way wireless communications; the widest temperature range of all; and the lowest self-discharge rate (0.7% per year), enabling our cells to last up to 4 times longer than the competition.
ANNUAL SELF-DISCHARGE TADIRAN
COMPETITORS
0.7%
Up to 3%
Looking to have your remote wireless device complete a 40-year marathon? Then team up with Tadiran batteries that last a lifetime.
* Tadiran LiSOCL2 batteries feature the lowest annual self-discharge rate of any competitive battery, less than 1% per year, enabling these batteries to operate over 40 years depending on device operating usage. However, this is not an expressed or implied warranty, as each application differs in terms of annual energy consumption and/or operating environment.
Tadiran Batteries 2001 Marcus Ave. Suite 125E Lake Success, NY 11042 1-800-537-1368 516-621-4980 www.tadiranbat.com
*
IOT: WIRELESS TECHNOLOGY AND THE PREDICTIVE MAINTENANCE REVOLUTION
How wireless tech is changing predictive maintenance By Alf Helge Omre, Nordic Semiconductor
In factories around the world, millions of machines power the production of everything we need for our everyday lives, from food and medicine to fuel and electricity. Because machine downtime is very expensive, when things go wrong companies are seriously impacted. To avoid such costly incidents, extend the life of equipment, and reduce operational inefficiencies in the process, industrial plant operators are increasingly turning to predictive maintenance (PdM) solutions based on low power wireless technologies. Wireless PdM, or wireless condition-based maintenance, involves reliability engineers remotely monitoring data about the condition of industrial assets to catch defects and forecast problems before they escalate. In turn, the engineers can reduce maintenance to only those occasions necessary for the asset to continue operating at its full potential.
16
IoT Design Guide 2020
Research suggests it’s advisable, if not essential, for companies to prioritize machine reliability. According to the International Society of Automation, $647 billion is lost globally each year due to machine downtime. A 2017 ServiceMax study (conducted by GE Digital and titled After The Fall: Cost, Causes and Consequences of Unplanned Downtime) revealed 82% of companies experienced at least one unplanned downtime outage over the previous three-year period, while widely-reported 2012 research by analyst firm Aberdeen estimated that unplanned downtime can cost a company $250,000 per hour. www.embedded-computing.com/iot
NORDIC SEMICONDUCTOR www.nordicsemi.com
@NordicTweets
@nordicsemiconductor/
The wireless advantage Plant maintenance teams at Louisville Gas & Electric, based in Louisville, Kentucky, are tasked with monitoring the condition of boilers and piping to ensure equipment continues to operate safely and reliably, while also considering the possibility of failure. Previously, the continuous monitoring of these assets at the utility involved a costly, staff-intensive process of collecting and sending data to a main server stored at the plant. An individual engineer would then need to visit the plant and inspect the data on that specific computer. Determining issues and making maintenance recommendations could take hours. Since the facility implemented a PDM solution from National Instruments (NI – Austin, Texas) that uses NI wireless vibration sensors with Bluetooth LE connectivity enabled by Nordic’s nRF52840 SoC, an NI gateway, and NI InsightCM software, these engineers are able to receive automated alerts and immediately access more data online than ever before. All they need is a device like a laptop, tablet or smartphone connected to the network, whether they’re working at an external office or another off-site location. Typically, modern industrial plant applications involve the permanent installation of wireless vibration and/or temperature sensors on machinery to provide the comprehensive data needed for successful PdM. But thanks to robust and cost effective, low power wireless technologies like Bluetooth LE and the power of the IoT, many more wireless sensors can now be attached to many more machines throughout a large facility. These sensors then report critical data back to a central server or the Cloud, via a wireless gateway. When a nominated threshold for asset health is reached and an alert raised, reliability engineers have instant access to the machine’s condition data and analytics via asset management software, from anywhere. Wireless networks also make it possible to monitor assets in hazardous environments and hard-to-reach locations, while drastically reducing the costs associated with the installation, maintenance and performance of the asset monitoring systems. As wireless sensors in industrial settings can’t always be easily recharged or replaced, it’s imperative they’re able to achieve long battery life – no mean feat given the power it takes to collect and send data up to hundreds of meters range and through many tangible obstacles. Wireless networks ensure the right balance is struck between throughput, range and low power consumption requirements.
www.linkedin.com/company/nordic-semiconductor-asa
space in the world, if they were forced to manually check the aircraft factory’s equipment. Fortunately, the aircraft manufacturer has developed and trained machine learning algorithms able to identify real-time data patterns and make accurate recommendations to its engineers within a few minutes. Boeing’s predictive maintenance tools have even helped its customers “reduce 80% of maintenance burdens on a problem,” according to Dawen Nozdryn-Plotnicki, Boeing’s Director of Advanced Analytics for Digital Aviation and Analytics. The predictive maintenance revolution is being driven by a combination of wireless connectivity, affordable wireless sensors, the IoT and AI technologies. Not only is more sensor data now available to provide superior analytics, but by bypassing the prohibitive expense of wired monitoring systems – providing engineers with greater problem-solving flexibility and improving overall equipment reliability – a company can achieve substantial savings on its bottom line. It’s therefore safe to predict wireless PdM is the way of the future for industrial plants of all sizes. IoT
Alf Helge More is Business Development Manager for Nordic Semiconductor.
www.embeddedARM.com
TS-7100 Our smallest single board computer measuring only 2.4" by 3.6" by 1.7" NXP i.MX 6UL 696 MHz ARM CPU with FPU
The latest PdM solutions provide automated machine learning analytics through artificial intelligence (AI), allowing experts to spend even less time collecting data and even more time diagnosing and fixing issues. Essentially the IoT acts as AI’s eyes and ears, with human beings only needing to investigate once the AI has raised a red flag. Imagine, for example, the logistical challenge engineers would face at Boeing’s Everett facility, the largest enclosed industrial www.embedded-computing.com/iot
IoT Design Guide 2020
17
IOT AND MEDICAL EMBEDDED APPLICATIONS
Challenges and opportunities with medical embedded applications Colin Walls, Mentor Graphics
At this time, it is easy to get medical advice. The news media are full of it with every expert having their own angle on matters, often conflicting with one another. Social media is worse as there is a mixture of accurate and inaccurate information and fake news – everybody, despite lack of qualification or authority, has something to say. I am not medically qualified, so I am not about to dispense health advice, but I do want to talk about medical instruments. Although I would normally talk to embedded software developers about the technology and processes around that software, understanding the background on why their products are needed is useful. Demand for medical care and equipment that enables the care to be delivered, has been rising exponentially in recent years. There are two, somewhat related reasons for this. First, there are an increasing number of conditions that can now be treated effectively. In the past, it was much more common to be told that you would just have to live with the illness and suffer or you might be told that you were going to die. Of course, all of this still happens, but it is much more likely that some treatment will be offered. The second factor is the mean age of the population in most western countries is rising. We are living longer, and medical treatment requirements tend to increase with age. This is all great news for the shareholders of medical instrument manufacturers and the embedded system developers employed by the companies. It is the challenges and opportunities enjoyed by this latter group that interests me.
18
IoT Design Guide 2020
Historically, medical instruments were bulky, heavy machines to which the patient was transported when necessary. A few machines could be wheeled about within the hospital, as needed. Nowadays, the big focus is on portable instrumentation. Obviously, there are still some big static machines ... a hand-held MRI scanner is not likely to appear in the near future. Why this change? The obvious answer is because we can – modern electronics makes portable equipment more feasible than ever before. But the move is also driven by “the great motivator,” that is, money. To understand the finances of modern health care, which are a key driver to medical instrument design, the main contexts in which health care is delivered must be considered: 1. Proactive health – mainly preventative measures and health monitoring. 2. Home care – an extension of (1), where there may be intervention, drug delivery and/or networking of data involved. 3. Residential care – in a nursing home etc. 4. Acute care – a hospital www.embedded-computing.com/iot
MENTOR, A SIEMENS BUSINESS www.mentor.com
@mentor_graphics
www.linkedin.com/company/mentor_graphics/
Broadly speaking, the cost of healthcare delivery in each of these contexts increases from (1) to (4). So, there is very strong demand for devices that facilitate (1) and (2) in particular [but also increases in efficiency in (3) and (4) are welcome]. Portable devices are obviously strongly favored. (Figure 1.) So, this is the background to the trends. Embedded systems developers now need to deliver the goods. The challenges to the embedded software designer may be summarized:
• •
• • •
There is a need for efficient tools to ensure compact code and fast development; costs and time to market are affected by this factor. Many medical embedded devices are real-time (that is, they must respond and behave in a predictable time frame). This probably implies that an RTOS needs to be deployed; selecting one that has a track record in medical applications is key. Many medical devices have some kind of user interface, which is typically graphical. Support for a GUI in the RTOS is clearly desirable. Any portable device needs to use battery charge wisely. An RTOS with power management capabilities makes sense. As medical devices need certification, a compact RTOS that has proven certifiability is essential to keep costs down.
IOT SECURITY
FIGURE 1
The tools for active (and proactive) health care are readily available.
With health care being seen as “in crisis” all over the world, it seems to me that the embedded software developer has the opportunity to be the “hero” and really change lives. IoT Colin Walls is an Embedded Software Technologist in Mentor Graphics’ Embedded Software Division.
Q&A Todd Ouska Founder and CTO
WHAT IS YOUR COMPANY DOING TO HELP SECURE YOUR CUSTOMER’S PRODUCTS? wolfSSL focuses on providing lightweight and embedded security solutions with an emphasis on speed, size, portability, features and standards compliance. With our SSL and TLS products and crypto library, wolfSSL supports high security designs in automotive, avionics and other industries. In avionics, we have support for complete RTCA DO-178C level A certification. In automotive, we support MISRA-C capabilities. For government consumers, wolfSSL has a strong history in FIPS 140-2, with upcoming Common Criteria support. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, is backed by the robust wolfCrypt cryptography library, and much more. Securing more than 2 billion connections, wolfSSL products offer optimal performance, rapid integration, leverage hardware crypto and support for the most current standards. wolfSSL is the #1 TLS and the first embedded TLS 1.3 implementation with TPM 2.0, MQTT, SSH and hardware crypto acceleration. Our secure boot implementation, wolfBoot, is completely independent from any OS or bare-metal application, and can be easily ported and integrated into existing embedded software projects to provide a secure firmware update mechanism. wolfSSL takes pride in being the most comprehensively tested and supported cryptography available. As strong believers in open source, the majority of our products are dual licensed under both GPLv2 as well as standard commercial licensing. All wolfSSL products are 100% made in the USA and backed by 24/7 support.
WWW.WOLFSSL.COM www.embedded-computing.com/iot
IoT Design Guide 2020
19
IoT Design Guide
2020 DESIGN GUIDE PROFILE INDEX Page
Advertiser
Page
Advertiser
AI & EDGE COMPUTING
IIOT/INDUSTRY 4.0
20
Apacer Technology Inc.
25
ADL Embedded Solutions
21
congatec
26
Fujitsu Components America, Inc.
22
Connect Tech
23
Eurotech
LPWAN (INCLUDING LoRa, NB-IOT, ETC.) 27
CLOUD 23
SECURITY
Apacer Technology Inc.
DEVELOPMENT KITS 24
Lauterbach, Inc.
25
PowerFilm Solar
Sequans Communications
28
Trusted Computing Group
29
ADL Embedded Solutions
STORAGE 30
Virtium
TEST 29
Ellisys
AI & Edge Computing
Industrial PCIe & SATA Solid-State Devices Apacer focuses on designing and manufacturing solutions that deliver high performance, high reliability, and top quality in the IoT industry. In order to facilitate constant improvement in the field of IoT, data must be gathered and analyzed to identify and correct any issues that arise. Apacer uses the latest in redundant protection technology to ensure that data integrity is as high as possible. Smart devices in an IoT system need to be able to communicate with each other while still remaining protected from unwanted intrusions by hackers. Apacer offers Solid-State Devices with AES 256-bit encryption to ensure that even if the hardware is stolen or lost, hackers are prevented from accessing the data. IoT devices need to function smoothly even in challenging real-world conditions. Apacer’s Solid-State Devices can be protected by a variety of advanced technologies to make our products that much tougher. Apacer created Double-barreled Solution allows users to easily view real-time information on the Dashboard and carry out remote device management. The intelligent monitoring center can observe the status of any connected Apacer solid-state devices in real time, such as remaining lifespan, operating temperature and environmental temperature. It also has a warning function that can alert engineers when an abnormality occurs. This solution has high scalability and flexibility, and supports various cloud service platforms.
FEATURES Ą Available form factor: NVMe PCIe 2280/2242; SATA 2280/2242,
mSATA
Ą Double-barreled Solution: CoreAnalyzer2 & SSDWidget 2.0 Ą Data Security Solution: TCG Opal 2.0, AES Encryption, CoreEraser,
Write Protect
Ą Data Integrity Solution: End-to-End Data Protection, Page
Mapping, DataRAID, CorePower
Ą Extreme Environment Solution: Wide Temperature, Conformal
coating, Nano Coating, Underfill
https://industrial.apacer.com/en-ww/Application/Internet-of-Things
APACER
https://industrial.apacer.com/en-ww
20
IoT Design Guide 2020
408-518-8699
ssdsales@apacerus.com www.embedded-computing.com/iot
Server-on-Modules With the COM Express Type 7 specification, PICMG has defined a highly flexible new module standard characterized by highspeed network connectivity with up to four 10 GbE interfaces and up to 32 PCIe lanes for customization. This is perfect for bringing the embedded server-class Intel® Xeon® D SoC as well as the new Intel® Atom™ processors to the industrial fields. Developers with high-performance demands for storage and networking applications, edge and fog servers for IoT and Industry 4.0 applications are best served with conga-B7XD based on the Intel Xeon D1500 processor family. Available with ten different server processors soldered on the module for highest robustness. For applications that are power restricted, the new conga-B7AC modules with Intel® Atom™ C3000 processors raise the bar with a power consumption of only 11 to 31 Watt TDP, the new lowpower multi-core Server-on-Modules feature up to 16 cores.
congatec
www.congatec.us
FEATURES Ą High scalability from 16 Core Intel® Xeon® processor technology with 45 W TDP Ą
Ą Ą Ą Ą
to low-power quad core Intel® Atom™ processors with a TDP as low as 11.5 W. All Server-on-Modules support the commercial temperature (0°C to 60°C) range. Selected SKUS even offer support for the industrial temperature range (-40 °C to +85 °C). conga-B7AC with Intel Atom technology offers 4x 10 Gigabit Ethernet ports, conga-B7XD with Intel Xeon technology support 2x 10 GbE. Supporting up to 48 gigabytes of fast and energy efficient 2400DDR4 (ECC or Non ECC). Up to 32 PCIe lanes for flexible server extensions such as NVMe flash storage and/or GPGPUs. Comprehensive set of standard interfaces with 2x SATA Gen3 (6 Gbs), 6x USB 3.0/2.0, LPC, SPI, I2C Bus and 2x legacy UART.
www.congatec.us
sales-us@congatec.com
www.linkedin.com/company/congatec/
858-457-2600 @congatecAG
AI & Edge Computing
conga-B7E3 The embedded computing market is demanding more computing power across application areas. Industry 4.0 applications require synchronization of multiple machines and systems; machine vision in collaborative and cooperative robotics requires processing of image and other environmental data. Many of the edge computing tasks that arise around the development of 5G networks require server class performance by default. The conga-B7E3 with AMD EPYC processors are highly flexible and an attractive migration platform for next-gen embedded server designs. They support up to 32 NVMe or SATA devices and up to 8 native 10 GbE channels. Support is also provided for legacy I/Os such as field buses and discrete I/O interfaces, which is critical for industrial server technologies.
FEATURES Ą Equipped with AMD EPYC Embedded 3000 processors with 4, 8, 12, or 16
Ą Ą Ą Ą
www.congatec.us
congatec
www.congatec.us www.embedded-computing.com/iot
high-performance cores, support simultaneous multi-threading (SMT) and up to 96 GB of DDR4 2666 RAM. Measuring just 125 x 95 mm, the COM Express Basic Type 7 module supports up to 4x 10 GbE and up to 32 PCIe Gen 3 lanes. For storage the module integrates an optional 1 TB NVMe SSD and offers 2x SATA Gen 3.0 ports for conventional drives. Further interfaces include 4x USB 3.1 Gen 1, 4x USB 2.0 as well as 2x UART, GPIO, I2C, LPC and SPI. Seamless support of dedicated high-end GPUs and improved floating-point performance, which is essential for the many emerging AI and HPC applications.
sales-us@congatec.com www.linkedin.com/company/congatec/
858-457-2600 @congatecAG
IoT Design Guide 2020
21
IoT Design Guide
AI & Edge Computing
IoT Design Guide
AI & Edge Computing
Connect Tech’s Rudi-NX: The complete AI super-system Connect Tech’s Rudi-NX is the all-in-one embedded supersystem for autonomous machines. Powered by the world’s smallest supercomputer, the NVIDIA® Jetson Xavier™ NX, Connect Tech’s Rudi-NX is the ultimate AI at the edge device for leadingedge, compute-intensive applications.
FEATURES Ą Extremely small footprint: 135mm x 50mm x 105mm Ą Delivering up to 21 TOPS of performance in 15W
Rudi-NX is a field-ready device for instant deployment with any program developed using NVIDIA’s JetPack SDK. Packing a lot of power in a small package, Rudi-NX can run multiple modern neural networks in parallel and process high-resolution data from multiple sensors simultaneously.
Ą 384 CUDA Cores, 48 Tensor Cores, and 2 NVDLA engines Ą GMSL, USB 3.0, USB 2.0, CAN 2.0b, USB OTG, RS-485, I2C,
GPIO, SPI, PWM Ą 1x NVMe (PCIe x4, 2280), 1x SD card slot Ą Operating Temperature Range: -20°C to +80°C
http://connecttech.com/product/rudi-nx-embedded-system-nvidia-jetson-xavier-nx/
Connect Tech Inc.
http://connecttech.com/
sales@connecttech.com
www.linkedin.com/company/connect-tech-inc
1-800-426-8979
twitter.com/ConnectTechInc AI & Edge Computing
Connect Tech Carrier Boards for Jetson Nano™ and Xavier™ NX As NVIDIA’s largest global embedded hardware partner, Connect Tech has developed off-the-shelf carrier board solutions for rapid deployment of AI projects. Quark Carrier is an ultra-small and feature rich carrier board designed for AI at the edge applications powered by the Jetson Xavier™ NX. Ideal for vision, inference, and unmanned applications, the Quark carrier comes ready for rugged environments with positive locking IO connectors. Thermal solutions and board customization are available to tailor this carrier to your project’s needs Photon Carrier is a unique solution designed specifically to support smart camera applications. Power and I/O design allow this board to be placed easily into off-the-shelf camera housings. Both PoE PD and Non-PoE PD options are available, with a variety of thermal solutions to choose from.
FEATURES Ą Quark Carrier
• Smaller than the Dev Kit: 82.6mm x 58.8mm (3.25" x 2.31") • +5V DC Input
Ą Photon Carrier
• PoE PD (NGX002) capable, power via separate input or over Ethernet • DC barrel power input also available • Dimensions: 145mm x 64.5mm (5.7" x 2.53")
http://connecttech.com/product-category/form-factors/nvidia-jetson-xavier-nx/
Connect Tech Inc.
http://connecttech.com/
22
IoT Design Guide 2020
sales@connecttech.com www.linkedin.com/company/connect-tech-inc
1-800-426-8979 twitter.com/ConnectTechInc
www.embedded-computing.com/iot
Server-class capabilities for AI and other demanding applications at the Edge Industry 4.0, Edge servers, robotics, and AI applications demand more computing power, storage, and networking capabilities at the Edge. Eurotech is a leader in providing rugged and fanless embedded computers that provide server-class performance.
FEATURES
The new CPU-162-24 is a COM Express Basic Type 6 module that Ą Powerful – Supports server-class, power efficient Xeon E3-1500 v6 CPUs features Intel Xeon E3 processors combined with Intel HD graphics Ą High Performance Graphics – Features Intel HD Graphics, with VGA, LVDS for hardware video and AI acceleration. Soldered-down components and two HDMI/DP++/DVI displays, and HW accelerated video encoding and decoding and a fanless design allow for sustained reliable operations in a wide temperature range (-40 to +85°C) in demanding environments like Ą Rugged and Fanless – Operates from -40 to +85°C, with error correcting code memory and soldered CPU for reliable, fanless design those of industrial, transportation and defense applications. Ą Customizable – Comes with optional personalization and full
It supports IoT applications and cloud connectivity thanks to the customization services, ranging from factory options to deep HW/SW integration with Everyware Software Framework (ESF), Eurotech’s configuration changes IoT Edge Framework. ESF allows connectivity to leading IoT Cloud Ą Professional Services – Provides the foundation for Eurotech Professional services such as Everyware Cloud, Eurotech’s IoT Integration Services that span from carrier board development to complete system design, certification and manufacturing Platform. www.eurotech.com/en/products/boards-modules/comexpress/cpu-162-24
Eurotech
www.eurotech.com
sales.us@eurotech.com
+1 301 490 4007 @eurotechfan
www.linkedin.com/company/eurotech
Cloud
Anti-Sulfuration Memory Module Anti-sulfuration memory modules are mainly used in equipment exposed in highly contaminated environment, e.g. automobile, military, medical, transport, networking and outdoor electronic products, and electronic equipment used in areas of high-concentration sulfur gas, e.g. volcano, hot spring and mine. Airborne sulfur-containing particles can easily react with silver used in the electrode to form silver sulfide which is non-conductive. As sulfuration increases, resistance value will also increase, eventually causing an open circuit. To solve the problem of resistor sulfuration, Apacer has developed the world’s first anti-sulfuration memory module for use in a sulfur-rich environment and this innovative design is now patented.
FEATURES Ą World’s first anti-sulfuration memory modules Ą Passed the ASTM B809-95 anti-sulfuration test Ą Obtained anti-sulfurization patents in USA and China Ą Adopts exclusive and improved alloy materials replace normal electrode Ą Solves corrosion problems effectively and increases overall system lifespan Ą Reliable anti-sulfuration performance, improved product reliability and durability Ą Solutions for extreme environments. Support wide temperature, conformal
coating, 30µ gold finger
Ą Available for DDR3 and DDR4 technologies in DIMM, SODIMM, ECC DIMM,
ECC SODIMM, Registered DIMM
https://industrial.apacer.com/en-ww/DRAM-Specialty/Anti-Sulfuration
APACER
https://industrial.apacer.com/en-ww www.embedded-computing.com/iot
408-518-8699
ssdsales@apacerus.com IoT Design Guide 2020
23
IoT Design Guide
AI & Edge Computing
IoT Design Guide
Development Kits
TRACE32 Multi Core Debugger for TriCore Aurix Lauterbach TriCore debug support at a glance: For more than 15 years Lauterbach has been supporting the latest TriCore microcontrollers. Our tool chain offers: • Single and multi core debugging for up to 6 TriCore cores • Debugging of all auxiliary controllers such as GTM, SCR, HSM and PCP • Multi core tracing via MCDS on-chip trace or via high-speed serial AGBT interface The Lauterbach Debugger for TriCore provides high-speed access to the target application via the JTAG or DAP protocol. Debug features range from simple Step/Go/Break up to AutoSAR OS-aware debugging. High speed flash programming performance of up to 340kB/sec on TriCore devices and intuitive access to all peripheral modules is included.
FEATURES
Lauterbach’s TRACE32 debugger allows concurrent debugging of all TrCore cores. • Cores can be started and stopped synchronously. • The state of all cores can be displayed side by side. • All cores can be controlled by a single script.
Ą On-chip trace for Emulation Devices
Lauterbach, Inc.
www.lauterbach.com
Ą Debugging of all auxiliary controllers: PCP, GTM, HSM and SCR Ą Debug Access via JTAG and DAP Ą AGBT High-speed serial trace for Emulation Devices Ą Debug and trace through Reset Ą Multicore debugging and tracing Ą Cache analysis
www.lauterbach.com/bdmtc.html
info_us@lauterbach.com
508-303-6812
Development Kits
Lauterbach Debugger for RH850 Lauterbach RH850 debug support at a glance: The Lauterbach Debugger for RH850 provides high-speed access to the target processor via the JTAG/LPD4/LPD1 interface. Debugging features range from simple Step/Go/Break to multi core debugging. Customers value the performance of high speed flash programming and intuitive access to all of the peripheral modules. TRACE32 allows concurrent debugging of all RH850 cores. • The cores can be started and stopped synchronously. • The state of all cores can be displayed side by side. • All cores can be controlled by a single script. All RH850 emulation devices include a Nexus trace module which enables multi core tracing of program flow and data transactions. Depending on the device, trace data is routed to one of the following destinations: • An on-chip trace buffer (typically 32KB) • An off-chip parallel Nexus port for program flow and data tracing • A high bandwidth off-chip Aurora Nexus port for extensive data tracing The off-chip trace solutions can store up to 4GB of trace data and also provide the ability to stream the data to the host for long-term tracing, thus enabling effortless performance profiling and qualification (e.g. code coverage).
Lauterbach, Inc.
www.lauterbach.com
24
IoT Design Guide 2020
FEATURES Ą AMP and SMP debugging for RH850, GTM and ICU-M cores Ą Multicore tracing Ą On-chip and off-chip trace support Ą Statistical performance analysis Ą Non intrusive trace based performance analysis Ą Full support for all on-chip breakpoints and trigger features Ą AUTOSAR debugging
www.lauterbach.com/bdmrh850.html
info_us@lauterbach.com
508-303-6812
www.embedded-computing.com/iot
Indoor Solar Development Kits FEATURES Ą High-Performance Thin/Flexible
Indoor Solar Material
Ą BQ25570 High-Efficiency Energy Ą
Ą Ą
Ą Ą
Harvesting PMIC Ultra-Low Power NRF52832 Multiprotocol SoC and CC2650 SimpleLink Wireless MCU Battery-less Energy Harvesting Circuitry. Onboard Light Meter, Battery Monitor, and On-Chip Temperature Sensors Open Source Design Files and Accompanying Mobile Applications I/O Breakout Headers and Screw Terminal Connections
Whether indoors or outdoors, light is an abundant energy source that can be used to power a wide variety of applications including the wireless sensors and devices of the emerging IoT industry. PowerFilm’s Indoor Solar Panels are inherently more sensitive than traditional solar technologies in low light and indoor settings. PowerFilm’s plug and play solar development kits make it easy to experiment with and explore indoor solar. The Indoor Solar Development Kit (DEV-IN-BASIC) is a total power management solution that can be used to directly power external electronics. With energy harvesting, battery charging, and output regulation, it bridges the gap between solar and electronics. The Indoor Solar Development Kit with TI BLE (DEV-IN-BLE-TI) is a solar-powered wireless sensing module featuring an onboard light meter and battery monitor. The Indoor Solar Development Kit with Nordic BLE (DEV-IN-BLE-NS) features Nordic’s NRF52832 Multiprotocol SoC and battery-less energy harvesting circuitry. Both BLE kits include an onboard energy harvester/power management IC, BLE circuitry, Indoor Solar Panels and all required components to be plug and play out of the box. Able to operate in dimly lit environments, like warehouses and industrial plants, these kits provide an ideal development platform for any solar-powered BLE project. www.powerfilmsolar.com
PowerFilm Solar
www.powerfilmsolar.com
sales@powerfilmsolar.com
www.linkedin.com/company/powerfilm
+1-515-292-7606
@PowerFilmSolar
IIoT/Industry 4.0
Industrial Single Board Computers ADL Embedded Solutions, Inc. provides a wide variety of embedded Single Board Computers EDGE-CONNECT PC/104 3.5" SBC 75mm x 75mm 95mm x 96mm 102mm x 147mm (SBCs) from the latest Intel® Core i7 to low-power Atom processors. ADL offers a broad selection FEATURES of embedded form factors including: ultra-small 75mm x 75mm Edge-Connect SBC, PC/104 and 3.5" SBCs. Ą Ultra-small, compact sizes System Design – Through collaborative concept development, design, build and production, ADL Embedded Solutions is expert at working with customers to design and build quality, reliable embedded systems that meet their exacting requirements. Our customers’ systems range from rugged, MIL-STD 810 applications to demanding IIoT applications including cybersecurity edge devices for protecting critical infrastructure… i.e. power grid, oil and gas, secure OT, border security and more.
ADL Embedded Solutions Inc. www.adl-usa.com
www.embedded-computing.com/iot
Ą Ą Ą Ą Ą Ą
EDGE-CONNECT 120mm x 120mm
Industrial-grade Up to 15-year availability Wide operating temperature -40C to 85C ISO9001 manufacturing facilities Hardware and System Revision Control Full lifetime management including last time buy and extended lifetime support services www.adl-usa.com/products/embedded-sbcs/
sales@adl-usa.com 855-727-4200 @ADLEmbedded www.linkedin.com/company/adl-embedded-solutions
IoT Design Guide 2020
25
IoT Design Guide
Development Kits
IoT Design Guide
IIoT/Industry 4.0
Six-Sensor Beacons and Standard Beacons Fujitsu’s Bluetooth® 5 beacons and sensor beacons deliver greater functionality and flexibility for developing new, cost-effective and secure IoT solutions. Based on Fujitsu’s Bluetooth 5 FWM7BLZ20B module, the beacons leverage the benefits of Bluetooth 5, including reduced power consumption, faster communication speed, greater LE advertising data communication capacity, and an increased number of channels compared to their Bluetooth 4.1 predecessors. They also support remote settings using commands from a central unit. The FWM8BLZ07 beacon features an embedded advertisement function that encrypts data and securely authenticates and decrypts messages by utilizing an anti-spoofing function known as a message authentication code (MAC). The FWM8BLZ07A is a multi-function sensor beacon that includes embedded temperature, humidity, air pressure, illuminance, 3-axis acceleration, and sound-level sensors. Multiple sensors in different combinations can be used in any Bluetooth environment through the latest Bluetooth 5 protocol.
FEATURES Ą Bluetooth spec. 5.0 (single mode) running on Nordic
Semiconductor nRF52832 SoC
Ą Integrates 6 sensors: temperature, humidity, barometric
pressure, illuminance, 3-axis acceleration, and sound-level Ą Operating temperature: -30 ~ +60 degree C Ą Dimensions: 40.0 x 31.0 x 12.0 mm Ą Weight: 10 g (w/o battery) Ą Battery type: CR2450 with Battery monitor function
www.fujitsu.com/us/products/devices/components/wireless-modules/beacons/index-bt5-beacons.html
Fujitsu Components America
components@us.fujitsu.com
1-800-380-0059
www.linkedin.com/company/fujitsu-components
https://us.fujitsu.com/components/
IIoT/Industry 4.0
Wirepas Mesh IoT Front-End Devices Fujitsu’s battery-powered Wirepas Mesh technology mesh units and mesh-sensor units simplify construction of large-scale decentralized networks to allow scalable, reliable and cost-effective IoT solutions for position tracking and sensor data collection. In addition to deploying large-scale networks, the mesh units (FWM8BLZ07P) and mesh-sensor units (FWM8BLZ07Y) enable power saving, high-density networks with interference tolerance channel selection, transmitting power control and autonomous network rerouting capability. The FWM8BLZ07P mesh unit is well-suited for wide-area asset tracking. It features a long-sleep mode and an integrated sensor that wakes up only if certain events, like shock, are detected. The multi-function FWM8BLZ07Y mesh-sensor unit incorporates a unique combination of temperature, humidity, air pressure, illuminance, 3-axis acceleration, and sound-level sensors. This makes it adaptable for a variety of massive, sensor data collection systems with scalable mesh topology. Position tracking support software is available with the mesh and mesh sensor units.
FEATURES Ą Wirepas Mesh protocol running on Nordic Semiconductor
nRF52832 SoC
Ą Integrates 6 sensors: temperature, humidity, barometric
pressure, illuminance, 3-axis acceleration, and sound-level
Ą Operating temperature: -30 ~ +60 degree C Ą Dimensions: 40.0 x 31.0 x 12.0 mm Ą Weight: 10 g (w/o battery)
Ą Battery type: CR2450 with battery monitor function
www.fujitsu.com/downloads/MICRO/fcai/wireless-modules/fwm8blz07p-y.pdf
Fujitsu Components America
https://us.fujitsu.com/components/
26
IoT Design Guide 2020
components@us.fujitsu.com 1-800-380-0059 www.linkedin.com/company/fujitsu-components
www.embedded-computing.com/iot
Monarch Go Monarch Go, connected by Verizon, is a comprehensive modem component offering device makers the shortest possible route to market and lowest total cost of ownership (TCO) to develop a cellular-IoT connected device. Unlike traditional cellular modules, it is already certified for use on the Verizon network, avoiding costly lab testing while improving time-to-market thanks to a reduced effort for board design. It completely removes the need to design and tune a cellular antenna as it embeds an optimized LTE antenna, saving months of design effort and lab testing. Monarch Go comes with a pre-installed ThingSpace IoT SIM and gives device makers the simplest, easiest, and most cost-effective solution for developing IoT devices – simply plug it in and go. Available exclusively from Avnet.
FEATURES Ą
Certified by Verizon as an end device
Ą
Embedded LTE antenna
Ą
Pre-installed ThingSpace IoT SIM
Ą
Easy connection to cloud
Ą
Optional embedded GPS
Ą
Verizon ThingSpace online management
Ą
Industry-leading network coverage in USA
Ą
Location based services for a wide range of tracking applications
Ą
Starter kits available
Ą
Industry-leading low power consumption
Available exclusively from Avnet
Small size: 35 mm (1.38") x 50 mm (1.97") x 14.95 mm ( 0.59")
www.avnet.com/monarchgo
www.sequans.com/monarch-go/
Sequans Communications www.sequans.com www.embedded-computing.com/iot
AVNET: www.avnet.com/wps/portal/us/about-avnet/locations/ 480-643-2000 sales@sequans.com
@sequans
www.linkedin.com/company/28625/admin/ IoT Design Guide 2020
27
IoT Design Guide
LPWAN (Including LoRa, NB-IoT, etc.)
IoT Design Guide
Security
IoT Architects Guide Protect IoT devices with Trusted Computing Group standards
FEATURES
The explosion of intelligent connected devices, or the Internet of Things (IoT), presents a massive expansion of the “attack surface“ hackers can target. Some researchers predict the IoT will reach 50 billion connected devices by the end of 2020. Many of these devices are vulnerable to attacks and the level of risk continues to rise. Failure to secure IoT systems has already led to several costly or dangerous incidents.
Ą
Every new device that connects to a network is potentially instantly exposed to viruses, malware, and other attacks that could result in industrial espionage or safety and security issues. Proper security measures must be taken to protect against these attacks.
The IoT Security Architects Guide from Trusted Computing Group (TCG) identifies steps for IoT architects to take in order to develop appropriate security controls to manage or reduce the risks. Ą
Ą
• •
Demanding real-time applications, such as in manufacturing and automobiles and other transportation systems Devices that will likely be in operation for decades and might be manufactured by vendors who provide infrequent or no updates
Given the high level of interest in IoT, more security breaches that cause financial damage, compromise personal information or even physical damage will inevitably arise in the next few years, resulting in disproportionate attention and financial and brand damage to those involved. Ensuring the identity and integrity of IoT devices, as well as the security of their data storage and communications, will allow organizations and consumers to get the maximum benefit from the IoT with the least risk.
Protect limited devices with overlay networks Many IoT systems include limited devices such as tiny, battery-operated sensors or legacy devices such as decades-old hydroelectric generators. These devices cannot be upgraded to include built-in security capabilities. However, they cannot be left unprotected on a potentially hostile network.
An unprecedented number and variety of devices Many IoT devices lack the computing power or memory capacity to support even basic security authentication and authorization
Firstly, protect data with encryption
To avoid eavesdroppers on data in transit, use end-to-end encryption to avoid unauthorized decryption. The self-encrypting drive (SED) standards from TCG enable stored data to be protected with encryption built into the drive. The SED standard is available in a wide variety of interoperable products.
Unique IoT device security challenges must be overcome, such as:
• •
How to reduce IoT security risks
Ą
TPM
One powerful tool for integrity protection is the Trusted Platform Module (TPM). The TPM is a standard microcontroller that combines robust cryptographic identity with remote security management features such as remote attestation. Because the TPM is defined by open standards, designers can choose from a variety of TPM products from different vendors.
Plan to protect IoT devices
The full IoT Architects Guide from TCG provides a step-by-step process to identify an appropriate planned response to deal with security challenges and avoid subsequent consequences. The guide shows IoT architects how to gauge the security risks unique to them as they define their business goals and develop appropriate security controls to manage. Ą TCG and its members continue to work on implementing options of existing TCG standards and technologies to address rising IoT challenges as the numbers of deployed devices continue to surge. To find out more about this work and to stay up to date with TCG’s latest recommendations to reduce security risks, please visit www.trustedcomputinggroup.org.
www.trustedcomputinggroup.org/
Trusted Computing Group
www.trustedcomputinggroup.org/
28
IoT Design Guide 2020
admin@trustedcomputinggroup.org www.linkedin.com/company/trusted-computing-group
+1.503.619.0562 @TrustedComputin
www.embedded-computing.com/iot
Compact Embedded Computers Built with the latest rugged, industrial IoT and cyber security needs in mind, ADL Embedded Solutions’ family of fanless, industrial PC solutions meet the performance and size requirements of a multitude of IIoT applications. The heart of ADL’s compact embedded system designs are the Intel® Atom® E3800 or E3900-based SBCs as small as 75mm x 75mm. These standalone SBCs are the building blocks for our compact systems as small as 1.3" x 3.4" x 3.2". They offer vertical or horizontal expansion possibilities using the Edge-Connect form factor to maintain a small footprint depending on your specific application uses. The expansion connector features a number of interfaces including PCIeX1, USB 2.0/3.0, SATA, SMBus and DisplayPort.
FEATURES Ą Ultra-small, compact footprint Ą Intel® E3800 or E3900-Series
Atom processors Ą Vertical or horizontal expansion
Ą Edge-Connect form factor Ą Wide Temperature
Ą Up to 15-year availability
Ą Custom System Design Services available
Applications: Industrial IoT (IIoT) network and cloud computing, Cyber security edge devices for networks, ICS and SCADA threat security, Secure networking (routing, traffic monitoring and gateways), Intelligent machinery and equipment controllers, Unmanned or autonomous vehicle mission / payload computing, Traffic Engineering, Transportation mobile computing, Wind turbine datalogging and collision avoidance, Oil and Gas and Kiosk and ATM applications.
Custom PC Integration ADL offers a range of COTS peripheral modules that can easily be integrated for added I/O functions like CAN, Ethernet, GPIO, Serial COM, storage and much more. Customers can also define custom peripheral boards for special I/O or power supply requirements as well as the custom enclosures necessary for complete solutions.
sales@adl-usa.com 855-727-4200 @ADLEmbedded www.linkedin.com/company/adl-embedded-solutions
ADL Embedded Solutions, Inc.
www.adl-usa.com
Test
Ellisys Bluetooth® Tracker™ Ultra-Portable Bluetooth Low Energy and Wi-Fi® Protocol Analyzer The pocket-sized (7.5 x 7.5 x 1.7 cm), bus-powered Bluetooth Tracker supports concurrent capture and analysis of Bluetooth Low Energy and Wi-Fi communications, as well as a wide variety of wired interfaces, including logic signals, host controller interface (HCI) protocols (UART and SPI), Audio I2S, and WCI-2, all visualized over the widely adopted Ellisys software suite. With its innovative reconfigurable radio, the Ellisys sniffer can be updated by software to support changes in the specification, without any change to the hardware, and even without any interaction from the user. The Tracker comes with free lifetime software updates, so all customers can benefit from these great additions free-of-charge! The Ellisys Bluetooth Tracker sniffer supports one-click concurrent capture of Bluetooth Low Energy, Wi-Fi 1x1 802.11 a/b/g/n, 2.4 GHz Spectrum, UART HCI and SPI HCI (2 ports), logic signals, and Wireless Coexistence Interface 2 (WCI-2).
Ellisys
www.ellisys.com www.embedded-computing.com/iot
FEATURES Ą All-in-One: Concurrent capture of Bluetooth Low Energy, Wi-Fi 1x1, raw
spectrum, HCI and logic, all synchronized to sub-microsecond precision
Ą Wideband Capture: Rock-solid capture of all Bluetooth Low Energy
channels
Ą Reprogrammable Digital Radio: Support for new specifications with a
simple software update, without hardware changes
Ą Wi-Fi: Debug your Wi-Fi a/b/g/n and Bluetooth Low Energy connections
simultaneously, as well as coexistence
Ą Raw 2.4 GHz Spectrum Capture: Characterize the wireless environment
and visualize interferences
Ą Professional Software: Use the acclaimed, widely adopted and highly
flexible Ellisys multi-protocol analysis software
Ą Logic Analysis: Visualize digital signals such as GPIOs, interrupts, debug
ports, etc. Concurrently and perfectly synchronized with your Bluetooth Low Energy and Wi-Fi traffic.
sales.usa@ellisys.com www.linkedin.com/company/Ellisys
www.ellisys.com 866-724-9185 @Ellisys1
IoT Design Guide 2020
29
IoT Design Guide
Security
IoT Design Guide
Storage
®
Solid State Storage and Memory
Industrial-Grade Solid State Storage and Memory Virtium manufactures solid state storage and memory for the world’s top industrial embedded OEM customers. Our mission is to develop the most reliable storage and memory solutions with the greatest performance, consistency and longest product availability.
StorFly® SSD Storage includes: M.2, 2.5", 1.8", Slim SATA, mSATA, CFast, eUSB, Key, PATA CF and SD. Classes include: MLC (1X), pSLC (7X) and SLC (30X) – where X = number of entire drive-writes-per-day for the 3/5-year warranty period.
Industry Solutions include: Communications, Networking, Energy, Transportation, Industrial Automation, Medical, Smart Cities and Video/Signage.
Memory Products include: All DDR, DIMM, SODIMM, Mini-DIMM, Standard and VLP/ULP. Features server-grade, monolithic components, best-in-class designs, and conformal coating/under-filled heat sink options.
Features
New! XR (Extra-Rugged) Product Line of SSDs and Memory:
• Broad product portfolio from latest technology to legacy designs • 22 years refined U.S. production and 100% testing • A+ quality – backed by verified yield, on-time delivery and field-defects-per-million reports • Extreme durability, iTemp -40º to 85º C • Industrial SSD Software for security, maximum life and qualification • Longest product life cycles with cross-reference support for end-of-life competitive products • Leading innovator in small-form-factor, high-capacity, high-density, high-reliability designs • Worldwide Sales, FAE support and industry distribution
Virtium
www.virtium.com
30
IoT Design Guide 2020
StorFly-XR SSDs enable multi-level protection in remote, extreme conditions that involve frequent shock and vibration, contaminating materials and/or extreme temperatures. Primary applications are battlefield technology, manned and unmanned aircraft, command and control, reconnaissance, satellite communications, and space programs. Also ideal for transportation and energy applications. Currently available in 2.5" and Slim-SATA formats. Include: custom ruggedization of key components, such as ultrarugged connectors and screw-down mounting, and when ordered with added BGA under-fill, can deliver unprecedented durability beyond that of standard MIL-810-compliant solutions. XR-DIMM Memory Modules have the same extra-rugged features as the SSDs, and include heatsink options and 30µ" gold connectors. They also meet US RTCA DO-160G standards.
sales@virtium.com www.linkedin.com/company/virtium
949-888-2444 @virtium
www.embedded-computing.com/iot
BY ENGINEERS, FOR ENGINEERS In the rapidly changing technology universe, embedded designers might be looking for an elusive component to eliminate noise, or they might want low-cost debugging tools to reduce the hours spent locating that last software bug. Embedded design is all about defining and controlling these details sufficiently to produce the desired result within budget and on schedule. Embedded Computing Design (ECD) is the go-to, trusted property for information regarding embedded design and development.
embedded-computing.com
ÂŽ
Solid State Storage and Memory