IoT trends for 2017

According to Intel IoT is expected to be a multi-trillion-dollar market, with 50 billion devices creating 44 zettabytes (or 44 trillion gigabytes) of data annually by 2020. But that widely cited 50 billion IoT devices in 2020 number is clearly not correct! Forecast of 50 Billion Devices by 2020 Is Outdated. In 2017 we should be talking about about some sensible numbers. The current count is somewhere between Gartner’s estimate of 6.4 billion (which doesn’t include smartphones, tablets, and computers), International Data Corporation’s estimate of 9 billion (which also excludes those devices), and IHS’s estimate of 17.6 billion (with all such devices included). Both Ericsson and Evans have lowered their expectations from 50 billion for 2020: Evans, who is now CTO of Stringify, says he expects to see 30 billion connected devices by then, while Ericsson figures on 28 billion by 2021.

Connectivity and security will be key features for Internet of Things processors  in 2017. Microcontroller (MCU) makers will continue to target their products at the Internet of Things (IoT) in 2017 by giving more focus on battery life, more connectivity of various types, and greater security. The new architectures are almost sure to spawn a multitude of IoT MCUs in 2017 from manufacturers who adopt ARM’s core designs.

ARM will be big. Last year, ARM’s partners shipped 15 billion chips based on its architectures. The trend toward IoT processors will go well beyond ARM licensees. Intel rolled out the Intel Atom E3900 Series  for IoT applications. And do not forget MIPS an RISC-V.

FPGA manufacturers are pushing their products to IoT market. They promise that FPGAs solve challenges at the core of IoT implementation: making IoT devices power efficient, handling incompatible interfaces, and providing a processing growth path to handle the inevitable increase in device performance requirement.

Energy harvesting field will become interesting in 2017 as it is more broadly adopted. Energy harvesting is becoming the way forward to help supplement battery power or lose the need for it altogether. Generally researchers are eyeing energy-harvesting to power ultra-low-power devices, wearable technology, and other things that don’t need a lot of power or don’t come in a battery-friendly form factor.


Low power wide area networks (LPWA) networks (also known as NarrowBand IoT) will be hot in 2017. There is hope that f LPWA nets will act as a catalyst, changing the nature of the embedded and machine-to-machine markets as NB-IoT focuses specifically on indoor coverage, low cost, long battery life, and enabling a large number of connected devices. The markets will become a kind of do-it-yourselfers paradise of modules and services, blurring the lines between vendors, users and partners.  At the same time for years to come, the market for low power wide area networks (LPWA) will be as fragmented and  is already in a race to the bottom (Sigfox, said to be promising costs approaching $1 per node per year). Competing technologies include Sigfox, LoRa Alliance, LTE Cat 1, LTE Cat M1 (eMTC), LTE Cat NB1 (NB-IoT) and other sub-gigahertz options almost too numerous to enumerate.

We are starting to see a battle between different IoT technologies, and in few years to come we will see which are winners and which technologies will be lost in the fight. Sigfox and Lora are currently starting well, but telecom operators with mobile networks NB-IoT will try hit the race heavily in 2017. Vendors prep Cat M1, NB1 for 2017: The Cat M1 standard delivers up to 380 Kbits/second over a 1.4 MHz channel. NB-1 handles up to 40 Kbits/s over 200 kHz channels.  Vendors hope the 7-billion-unit installed base of cellular M2M modules expands. It’s too early to tell which technologies will be mainstream and which niche. It could be that cellular NB-IOT was too late, it will fail in the short term, it can win in the long term, and the industry will struggle to make any money from it. At $2 a year, 20 billion devices will contribute around 4% of current global mobile subscription revenues.

New versions of communication standards will be taken into use in 2017. For example Bluetooth 5 that adds more speed and IoT functionality. In 2017, we will see an increase in the number of devices with the new Bluetooth 5 standard.

Industrial IoT to gain traction in 2017. Industrial applications ultimately have the greater transformative potential than consumer products, offering users real returns on investment (ROI) rather than just enhanced convenience or “cool factor”. But the industrial sector is conservative and has been slow to embrace an industrial IoT (IIoT), but is seems that they are getting interested now. During the past year there has been considerable progress in removing many of the barriers to IIoT adoption. A global wide implementation of an IIoT is many years away, of course. The issues of standards and interoperability will most likely remain unresolved for several years to come, but progress is being made. The Industrial Internet Consortium released a framework to support development of standards and best practices for IIoT security.

The IIoT  market is certainly poised to grow. A Genpact research study, for instance, indicates that more than 80% of large companies believe that the IIoT will be essential to their future success. In a recent market analysis by Industry ARC, for instance, the projected value of the IIoT market will reach more than $120 billion by 2021. Research firm Markets and Markets is even more optimistic, pegging IIoT growth at a CAGR of 8% to more than $150 billion by 2020. And the benefits will follow. By GE’s estimate, the IIoT will stimulate an increase in the global GDP of $10 to $15 trillion over the next 20 years.

Systems integrators are seeking a quick way to enter the industrial Internet of Things (IIoT) market. So expect to see many plug and play IoT sensor systems unveiled. There were many releses in 2016, and expect to see more in 2017. Expect to see device, connectivity and cloud service to be marketed as one packet.

IoT analytics will be talked a lot in 2017. Many companies will promise to turn Big Data insights into bigger solutions. For industrial customers Big Data analytics is promised to drive operational efficiencies, cut costs, boosting production, and improving worker productivity. There are many IIoT analytic solution and platform suppliers already on the market and a growing number of companies are now addressing industrial analytics use.

In 2016 it was all bout getting the IoT devices connected to cloud. In 2017 we will see increased talk about fog computing.  Fog computing is new IoT trend pushed by Cisco and many other companies. As the Internet of Things (IoT) evolves, decentralized, distributed-intelligence concepts such as “fog computing” are taking hold to address the need for lower latencies, improved security, lower power consumption, and higher reliability. The basic premise of fog computing is classic decentralization whereby some processing and storage functions are better performed locally instead of sending data all the way from the sensor, to the cloud, and back again to an actuator. This demands smarter sensors and new wireless sensor network architectures. Groups such as the Open Fog Consortium have formed to define how it should best be done. You might start to want to be able to run the same code in cloud and your IoT device.


The situation in IoT security in 2016 was already Hacking the IoT: As Bad As I Feared It’d Be and there is nothing that would indicate that the situation will not get any better in 2017.  A veritable army of Internet-connected equipment has been circumvented of late, due to vulnerabilities in its hardware, software or both … “smart” TVs, set-top boxes and PVRs, along with IP cameras, routers, DSL, fiber and cable modems, printers and standalone print servers, NASs, cellular hot spots, and probably plenty of other gear. IoT world at the moment is full of vulnerable devices, and it will take years to get then replaces with more secure devices. Those vulnerable devices can be used to make huge DDoS attacks against Internet services.  The 2016 October 21 cyberattacks on Dyn brought to light how easily many IoT devices can be compromised. I expect that kind of incidents will happen more in 2017 as DDoS botnets are pretty easy to build with tools available on-line. There’s no question that everyone in the chain – manufacturers, retailers and consumers – have to do a better job securing connected devices.When it comes to IoT, more security is needed.



  1. Tomi Engdahl says:

    Hackaday Prize Entry: A Complete Suite Of Biomedical Sensors

    More of an enabling platform than a complete project, [Orlando Hoilett]’s shield design incorporates a lot of the sensors we’ve seen before. The two main modalities are photoplethysmography, which uses the MAX30101 to sense changes in blood volume and oxygen saturation by differential absorption and reflection of light, and biopotential measurements using an instrumentation amplifier built around an AD8227 to provide all the “electro-whatever-grams” you could need: electrocardiogram, electromyogram, and even an electrooculogram to record eye movements. [Orlando] has even thrown on temperature and light sensors for environmental monitoring.

    Biomed Shield for Arduino 101 Powered By Intel

    A sweet Arduino shield with a ton of cool sensors for physiological parameters such as heart rate and breathing rate

  2. Tomi Engdahl says:

    The Internet of Rice Cookers

    You’d be forgiven for thinking this was going to be an anti-IoT rant: who the heck needs an IoT rice cooker anyway? [Microentropie], that’s who. His rice cooker, like many of the cheapo models, terminates heating by detecting a temperature around 104° C, when all the water has boiled off. But that means the bottom of the rice is already dried out and starting to get crispy.

    So [Microentropie] added some relays, a temperature sensor, and an ESP8266 to his rice cooker, creating the Rice Cooker 2.0, or something.

    Esp8266 (rice) Cooking Machine

    Adding an ESP8266 to a rice cooking machine enables it to become an IoT, and enables me to have rice cooked exactly at the desired time.

  3. Tomi Engdahl says:

    Smart Child Seat Aims to Prevent Tragedy

    For most of us, a memory lapse is as harmless as forgetting to bring the garbage to the curb, or maybe as expensive as leaving a cell phone and cup of coffee on the roof of the car before driving off. But when the toddler sleeping peacefully in the car seat slips your mind in the parking lot, the results can be deadly.

    [ayavilevich] came up with his own car occupancy sensor for child seats. Dubbed Fochica, for “Forgotten Child in Car Alert,” the system is clearly a proof of concept right now, but it has potential.

    An Android app on a smartphone pairs with a BLE module to get the sensors’ status, and when the phone goes out of Bluetooth range while the seat is occupied, the app sounds an alarm. Simple, but effective.

    Fochica – Forgotten Child in Car Alert

    Fochica, forgotten child in car alert, is a no hassle, low cost and extensible system that helps prevent forgetting children in vehicles.

  4. Tomi Engdahl says:

    Device for Seismic Noise Analysis

    A device that monitors the statistics of the magnitude and the 3-D direction of seismic noise might detect earthquakes just before they hit.

  5. Tomi Engdahl says:

    How Many Watts Are You Using?

    [Bogdan] built up a simple whole-apartment power monitor from scratch over the weekend, and he’s been nice enough to walk us through the whole procedure, starting with picking up a split-core CT sensor and ending up with a finished project.

    The brains of his project are an ESP8266 module, which means that he needed to adapt the CT sensor to put out a voltage that lies within the chip’s ADC range of 0 V to 3.3 V.

    The microcontroller reads the ADC frequently, does a little math, and you’re done.

    The rest of the code was borrowed from here or there. EmonLib takes care of the math, ArduinoOTA allows him to reflash the firmware over the air, and Blynk takes care of making a nice Android app for visualization.

    Power meter for the entire apartment

  6. Tomi Engdahl says:

    The Week In Review: IoT
    Startup raises $17.7M; HARMAN, IBM get a room; enterprises aren’t ready for IIoT.

    August Home (formerly known as Kease), a San Francisco-based supplier of smart door locks and doorbell cameras, reports raising about $17.7 million from venture capitalists

    Comcast has joined the LoRa Alliance as a sponsor member, and will have a representative on the alliance’s board of directors. Comcast will host the LoRa Alliance’s 8th All-Members Meeting

    HARMAN Professional Solutions and IBM Watson Internet of Things have collaborated on Voice-Enabled Cognitive Rooms, which can be set up in corporate offices and medical facilities along with hospitality environments, such as cruise ships and hotels. The rooms bring together IBM’s Watson artificial intelligence technology, HARMAN AKG microphones, JBL speakers, and AMX AV control and switching systems. HARMAN is now a wholly-owned subsidiary of Samsung Electronics.

    Synopsys this week added audio and high-performance sensor support for always-on IoT applications to its ARC Data Fusion Subsystem.

    The IPSO Alliance says it is doing research and development to enable machines to easily exchange data and metadata without using translators. This is needed to offer greater IoT interoperability.

    The Business Performance Innovation Network reports that a worldwide survey of about 350 executives and interviews with innovation leaders at large enterprises shows that many companies realize the importance of Industrial Internet of Things technology in their future, yet few are prepared to implement IIoT. Only 1.5% of respondents said they are clearly pressing ahead with IIoT implementation, while 57% said they are beginning implementation, have pilot projects in progress, or in the planning stages to employ IIoT tech.

    Research and Markets has a report from Grand View Research,
    forecasts the worldwide IoT in warehouse management market will increase to $19.06 billion by 2025.

  7. Tomi Engdahl says:

    Meysam Moradpour, director of digital ventures at Pizza Hut, has a 10-page report available on e-commerce, near-field communication, digital payments, and the Internet of Things

    Pizza Hut: The Internet of Things is becoming the Internet of Commerce

    Rapid innovation in the payments market resulting from the emergence of end-user device adoption and tokenization is leading to commerce experiences that are more seamless in nature and more convenient for the end user — but with such rapid change comes a need for a look in the mirror, says Pizza Hut’s director of digital ventures.

    Meysam MoradpourAs commerce transitions to a “state of ambiance” with the introduction of the Internet of Things (IoT), the industry in its entirety stands to benefit from lucrative conversion rates and higher transaction volumes, Meysam Moradpour tells readers in an in-depth paper

    The leap from consumers buying things to “things buying things” is not as great as one would imagine, Moradpour writes in the paper, which also provides an explanation of IoT, an outline of the differences between embedded and frictionless commerce and an insight into the potential that IoT holds for the future of retail.

  8. Tomi Engdahl says:

    IPSO Smart Objects

    Smart Object’ is a dynamic and ever-changing term. No simple definition will suffice. We are embarking into a new era of technology where devices, things, and objects get smart and connected from the smallest of sensors to fully autonomous intelligent machines. Various forms of Smart Objects will become extremely complicated with a large variety of characteristics and attributes. And consensus is needed on the formats of the data that gets generated or received by these Smart Objects.

    Our work as an Alliance drives towards enabling IoT devices’ hardware and software interoperability. There is a market need and urgency for industry leadership in the definition of the next generation of Smart Objects and the IPSO Alliance is up to the challenge.

    Starter Pack 1.0 Abstract

    The availability of Internet Protocol (IP) on constrained devices with memory sizes of 16 kilobytes or less, including IPV6 and 6LowPAN, has made possible a new kind of interoperability for connected devices and Smart Objects.
    The IETF specify a set of standard protocols for IP-enabled networks in Constrained Resource Environments (CoRE), including the Constrained resource Application Protocol (CoAP) applicable to low power and low connection bandwidth devices. CoAP is an application protocol for machines and connected devices, as http is for web browsers, but designed specifically for machine interaction and operation over networks of constrained devices.
    IPSO Smart Object Guidelines provide a common design pattern, an object model, that can effectively use the IETF CoAP protocol to provide high level interoperability between Smart Object devices and connected software applications on other devices and services.

  9. Tomi Engdahl says:

    White-hat Botnet Infects, Then Secures IoT Devices

    [Symantec] Reports Hajime seems to be a white hat worm that spreads over telnet in order to secure IoT devices instead of actually doing anything malicious.

    In a crazy turn of events, it now seems that the worm is actually securing devices affected by another major IoT botnet, dubbed Mirai, which has been launching DDoS attacks. More recently a new Mirai variant has been launching application-layer attacks since it’s source code was uploaded to a GitHub account and adapted.

    Hajime is a much more complex botnet than Mirai as it is controlled through peer-to-peer propagating commands through infected devices.

    ” The author can open a shell script to any infected machine in the network at any time, and the code is modular, so new capabilities can be added on the fly. It is apparent from the code that a fair amount of development time went into designing this worm.”

    So where is this all going?
    So far this is beginning to look like a cyber battle of Good vs Evil. Or it’s a turf war between rival cyber-mafias. Only time will tell.

    Hajime worm battles Mirai for control of the Internet of Things

    The Hajime worm appears to be the work of a white hat hacker attempting to wrestle control of IoT devices from Mirai and other malicious threats.

    A battle is raging for control of Internet of Things (IoT) devices. There are many contenders, but two families stand out: the remains of the Mirai botnet, and a new similar family called Hajime.

    Hajime was first discovered by researchers in October of last year and, just like Mirai (Linux.Gafgyt), it spreads via unsecured devices that have open Telnet ports and use default passwords. In fact, Hajime uses the exact same username and password combinations that Mirai is programmed to use, plus two more.

    But that’s where the similarities end.

    Unlike Mirai, which uses hardcoded addresses for its command and control (C&C) server, Hajime is built on a peer-to-peer network. There isn’t a single C&C server address, instead the controller pushes command modules to the peer network and the message propagates to all the peers over time. This is typically considered a more robust design as it makes takedowns more difficult.

    Hajime is also stealthier and more advanced in comparison to Mirai. Once on an infected device, it takes multiple steps to conceal its running processes and hide its files on the file system. The author can open a shell script to any infected machine in the network at any time, and the code is modular, so new capabilities can be added on the fly. It is apparent from the code that a fair amount of development time went into designing this worm.

    Over the past few months, Hajime has been spreading quickly. Symantec has tracked infections worldwide, with large concentrations in Brazil and Iran. It is hard to estimate the size of the peer-to-peer network, but modest estimates put it in the tens of thousands.

    Reasons behind the worm
    There are some features that are noticeably missing from Hajime. It currently doesn’t have any distributed denial of service (DDoS) capabilities or any attacking code except for the propagation module. Instead, it fetches a statement from its controller and displays it on the terminal approximately every 10 minutes. The current message is:

    Just a white hat, securing some systems.

    Important messages will be signed like this!

    Hajime Author.

    Contact CLOSED

    Stay sharp!

    The above message is cryptographically signed and the worm will only accept messages signed by a hardcoded key, so there is little question that this message is from the worm’s true author

  10. Tomi Engdahl says:

    Guarding against attack
    Users of IoT devices should take the following steps to help prevent their devices from becoming infected with malware.

    Research the capabilities and security features of an IoT device before purchase
    Perform an audit of IoT devices used on your network
    Change the default credentials on devices. Use strong and unique passwords for device accounts and Wi-Fi networks
    Use a strong encryption method when setting up Wi-Fi network access (WPA)
    Disable features and services that are not required
    Disable Telnet login and use SSH where possible
    Disable Universal Plug and Play (UPnP) on routers unless absolutely necessary
    Modify the default privacy and security settings of IoT devices according to your requirements and security policy
    Disable or protect remote access to IoT devices when not needed
    Use wired connections instead of wireless where possible
    Regularly check the manufacturer’s website for firmware updates
    Ensure that a hardware outage does not result in an unsecure state of the device


  11. Tomi Engdahl says:

    Farming for the future: How one company uses big data to maximize yields and minimize impact has a mission: Make farms more productive and protect the environment while doing it. With a combination of hardware and machine learning from IBM, aims to change the way we farm.’s goal was clear: Develop a way to collect data on soil to get the most benefit out of watering and fertilizing with minimal use. combines its Arduino-based hardware sensors with Watson machine learning, cognitive computing, and data analytics to form a completely proprietary system.

    The systems Vegis and her team have built are hosted on Bluemix, IBM’s data storage, processing, and analytics cloud. “IBM’s tools have enabled us to save both time and money on programming and development,”

    According to Vegis, cognitive computing platforms like Watson allow them to “take concept to prototype in a shorter period of time, which we know will improve our chances of securing funding.” That doesn’t just apply to her and—it’s a huge benefit for all tech innovators.

    With a probe installed, data gathering begins. The devices, capable of transmitting data several kilometers, measure moisture, pH level, salinity, temperature, and other factors, all of which are fed to for analysis.

    The data gained from soil sensors is combined with a variety of other environmental factors, such as weather, geographic location, crop yield statistics, and additional relevant data.’s motto, “just enough • just in time,”

    The global agricultural industry uses an estimated 70% of freshwater. Watering and fertilizing only as often and as much as needed eliminates excess water consumption, minimizes fertilizer runoff, prevents soil erosion, and curbs energy use.

  12. Tomi Engdahl says:

    Internet of Things (IoT) means when physical devices start communicating with each other and/or can be controlled remotely.

    Your mobile phone will be connected to home automation system. Once you are in say, 100m distance from home, your mobile will send signal to the home automation system.

    This will trigger a chain of actions like:

    Garage door will open upon your arrival.
    Lights will be turned on.
    Thermostat/AC will adjust room temperature.
    Air purifier will refresh the air quality.
    Music will start depending on your mood.
    Your coffee machine will brew a hot espresso.
    Your geyser will start heating water for your bath.
    Your fridge will give you a list of possible options for dinner depending on the items in fridge. And the list goes on and on….

    We see that IoT is not one but a combination of many many different industries.


  13. Tomi Engdahl says:

    Who are the leading manufacturers of IoT sensors?

    US Key Players

    IBM (U.S.)

    Honeywell International Inc. (U.S.)

    Digi International Inc. (U.S.)

    InvenSense Inc. (U.S.)

    UK and Europe Key Players

    ARM Holdings Plc. (U.K.)

    Robert Bosch GmbH (Germany)

    Ericsson (Sweden), Libelium (Spain)

    Infineon Technologies (Germany)


    STMicroelectronics N.V. (Switzerland)

  14. Tomi Engdahl says:

    Top MEMS sensor suppliers of 2015

    Following is a top-line review of the three leading MEMS sensor manufacturers, based on 2015 revenue:

    1. STMicroelectronics
    2. Knowles
    3. InvenSense

  15. Tomi Engdahl says:

    Bluetooth 5 Ready IP for IoT SoC Integration

    The Bluetooth Special Interest Group (SIG) was formed in 1998 to define the Bluetooth standard. Since its formation, Bluetooth has transformed into a robust interoperable wireless standard that enables the Internet of Things (IoT). The newly released Bluetooth 5 specification continues that revolution. There are many wireless standards including ZigBee, wirelessHART, Z-Wave, WiSun and more, that have served niche applications such as smart homes, remote controls, building automation, and metering. Due to the different needs of each application, the industry is having difficulty finding interoperability between the Internet of Things devices among the fragmented set of standards and options available. The adoption of Bluetooth by the mobile phone has positioned it as a leading candidate to solve interoperability hurdles via a melting pot of different solutions that all include Bluetooth. Today, the use of Bluetooth has grown beyond traditional applications and into audio, wearable, and other small portable device and toy applications.

    In 2016, the SIG addressed the key requirements of simple and secure wireless connectivity by introducing Bluetooth 5, which according to the June 2016 Bluetooth SIG press release, “quadruples range, doubles speed, increases data broadcasting capacity by 800%.” The evolution of Bluetooth to Bluetooth 5 continues to build momentum and “will deliver robust, reliable Internet of Things (IoT) connections” that make wearables and now smart homes a reality. This article describes the benefits of using Bluetooth 5 ready IP for easy IoT SoC integration.

    some of the key features of Bluetooth 5:

    Data rates from 1Mbps to 2Mbps with more flexible methods to optimize power consumption
    Longer range via larger link budget and supporting up to 20 decibel-milliwatts (dBM) where local law allows
    Higher permission-based advertising transmission to deliver Bluetooth messages to Bluetooth-enabled devices, especially beacons
    Adaptive Frequency Hopping (AFH) based on channel selection algorithm to improve connectivity performance in environments where other wireless technologies are in use
    Limited high duty cycle non-connectable advertising using intervals of less than 100ms for limited periods of time re-connectivity to improve user experience and battery life with faster connections
    Slot availability masks to detect and prevent other wireless band interferences

    Bluetooth low energy has become the de facto standard for IoT wearables, and now millions of Bluetooth-enabled beacons are inundating the market. Smart home applications such as smart plugs, door locks, and various other applications are also benefiting from Bluetooth features.

    Bluetooth 5 will include follow up releases including setting the stage to enable Bluetooth low energy with audio according to WiFore CTO Nick Hunn in an October 2016 blog. This should enable very effective voice and audio applications using a power-efficient technology that extends portable device battery life from hours to days.

    Traditionally, Bluetooth has been implemented in systems via combo chipsets that include WiFi and other wireless technologies. While a vast number of implementations are dual mode (low energy and classic) combo wireless chipsets, solutions only supporting the Bluetooth low energy specification are rapidly moving to be fully integrated into a single monolithic system to take full advantage of power consumption, process node alignment and higher performance. As an example, MCUs are now adopting Bluetooth low energy IP into their chipsets.

    There are several reasons for wireless integration into a single SoC, including low power, cost, area and latency. Beyond power efficiency and latency improvements, wireless integration enables the removal of complete chipsets, reducing packaging costs and the required additional pads and power management IP.

  16. Tomi Engdahl says:

    Embedded Systems Editor Bernard Cole Passes Away

    When at least 50% of embedded devices were standalone — at least 20 years before our current infant IoT world — Bernie envisioned a net-centric world where things were connected and communicating, where information was shared and making a difference.”

    Bernie’s book, “The Emergence of Net-Centric Computing,” came out in 1999 and foreshadowed the connected, fog-computing world that we now take for granted (there are still five in stock on Amazon).

    “He wanted the improvements that this would make for health, for productivity, for efficiency, and for the environment,” said Janice. “Challenged by severe diabetes, Bernie envisioned the day when telemedicine accurately monitored blood sugar and heart rates, allowing people greater freedom to live healthy lives. Bernie, many thanks for the many conversations, for your passion for all things embedded, for how well you treated clients time and time again, [and] for the many great stories you wrote. You will be missed.”

    Bernie, along with his business partner, Toni McConnel, ran Techrite Associates, providing writing services and publication strategies for high-tech companies.

  17. Tomi Engdahl says:

    IoT tester for new requirements

    mporting the IoT features to devices requires extensive testing, using Ready Modules can make it easier to get radio frequency approval. However, mobile operators may have other test requirements for network-enabled IoT devices.

    Rohde & Schwarz has introduced tests for the testing of IoT devices using the new R & S TS-290 IoT Carrier Acceptance Test System for LTE Cat 1. It provides RF, protocol and performance tests on a single platform.

    In addition to Cat M1, the radio part of the testing system can be extended to support, for example, Cat NB1, Wlan and Bluetooth standards.


  18. Tomi Engdahl says:

    Developer Tools

    Fully supported, powerful toolchain and development tools
    for MIPS at an unprecedented price.

    If you are developing platforms using MIPS M-class and I-class tools, you now have access to a fully supported, powerful state-of-the-art toolchain and development tools for around $45 per development seat – no licenses required!

    Get started now by combining the Codescape GUI Debugger and Codescape Eclipse IDE, Bus Blaster JTAG probe, and Codescape MIPS SDK Essentials.

  19. Tomi Engdahl says:

    The world’s smallest IoT module on the 4G network

    Swiss u-blox has received certification for its LTE network IoT module on the American Verizon 4G network. The Sara-R404M module supports class M1 connections and is the world’s smallest module in its kind.

    There are two different versions of the LTE technology for different IoT connections. If the network nodes are in place and the data connection does not need to exceed 100 kilobytes per second, the selection will focus on the NB-IoT (Narrow Band IoT).

    If faster data is needed on the network, shorter delay and sensor is in motion, the choice is in LTE-M technology. The Sara-R404M module has dimensions of only 16 x 26 millimeters and packed into an LGA enclosure, making it easy to integrate into a variety of devices.

    LTE class M1 support means that the u-blox module consumes significantly less power than 3G or 4G modules with the same connectivity. The module is powered by battery power for up to 10 years and is also qualified for industrial temperatures (-40 to +85 degrees).


  20. Tomi Engdahl says:

    Omesh Tickoo and Ravi Iyer’s Making Sense of Sensors (Apress)

    In today’s data-driven world, we are surrounded by sensors collecting various types of data about us and our world. These sensors are the primary input devices for wearable computers, IoT and other mobile devices. Professionals seeking to better understand today’s sensor-rich devices and acquire knowledge and skills to develop innovative solutions that exploit them will be pleased to learn about the new book Making Sense of Sensors.

    Starting with an overview of the general pipeline to extract meaningful data from sensors, the book then dives deeper into some commonly used sensors and algorithms designed for knowledge extraction. Practical examples and pointers to more information are used to outline the key aspects of Multimodal recognition. The book concludes with a discussion on relationship extraction, knowledge representation and management.

  21. Tomi Engdahl says:

    Low Power Wireless: 6LoWPAN, IEEE802.15.4 and the Raspberry Pi

    Low power wireless is heading in two directions right now: personal-area networks (LoWPAN) spanning up to 20–30 meters and wide-area networking (LPWAN) of up to 20 or more kilometers. The technologies at the physical layer are completely different and lead to different Linux solutions. This article deals only with LoWPAN.

    The physical layer for LoWPAN is specified by IEEE802.15.4. This defines communication using various wireless bands, such as 2.4GHz, with a range of about 10 meters and data transfer rates of 250kb/s—good enough for most sensors, but not good enough to stream MP3s!

    On top of IEEE802.15.4 is a variety of protocols: Zigbee, Z-Wave, Thread and so on. Of these, only the IETF 6LoWPAN is an open standard, and this is where the Linux development community has settled. This article covers only 6LoWPAN. I also ignore other wireless systems, such as Bluetooth LE.

    6LoWPAN and Linux

    6LoWPAN is IPv6 over IEEE802.15.4 wireless. That isn’t easy. IPv6 is designed for the current internet, while IEEE802.15.4 is designed for a different environment. You don’t need to worry about how this mismatch has been overcome, but it does mean you need to be aware that two different levels are dealt with here: getting two wireless devices to talk to each other and getting a networking layer talking over these devices.

    The device layer is where physical hardware choices come into play. Linux supports several devices, such as the AT86RF230 series, the MRF24J40 and several others. The kernel needs to have those device drivers compiled in or available as dynamically loadable modules.

    The networking layer requires 6LoWPAN support. Again, the kernel needs to have this compiled in or available as modules. These modules are the ieee802154_6LoWPAN, ieee802154 and mac802154 modules.
    6LoWPAN Devices and the Raspberry Pi

    The Raspberry Pi is a wonderful toy or a full-blown Linux computer, depending on your viewpoint. With its GPIO pins, it can act as a connection into the realm of sensors and actuators, while with Ethernet (and on the RPi3, Wi-Fi), it can be a part of LANs and WANs. For the IoT, it (and the Arduino) form an excellent bridge between the physical and ICT worlds. But, there are now IEEE802.15.4 modules available, and they can be used to turn an RPi into a “full-function 6LoWPAN device”.

    I used the RPi with the OpenLabs “Raspberry Pi 802.15.4 radio”. This is an Atmel AT86RF233 radio on a small board with a header that allows it to be plugged straight onto pins 15–26 of the RPi. It can be plugged in facing out or facing in—facing in the right way to do it.


Leave a Comment

Your email address will not be published. Required fields are marked *