Quantcast
Channel: Total Phase Blog
Viewing all 822 articles
Browse latest View live

How Do I Control the Number Of Bytes For Single Bit Write and Dual Bit Write?

$
0
0

Question from the Customer:Question from the Customer:

I am using the Promira Serial Platform to communicate on my SPI bus.  I’m using the SPI Active - Level 2 Application. I need to perform an SPI dual bit mode write at 20MHz as a master. The specifications show I can do this – I’d like to find out more about the flexibility and programmability.

For example, is it possible to specify how many bytes in single bit write before switching into dual bit write? Here’s a diagram of what I’m planning to do.

161054-customer-chartFor example, in a total of 103 bytes, the first 3 bytes is single bit IO and next 100 bytes are dual bit IO. How can I do this?

Response from Technical Support:

Thanks for your question! It is possible to accomplish  this with the Promira Serial Platform and the SPI Active – Level 2 Application that you purchased.  You can specify the IO type (Single/Dual/Quad) for every byte sent on the wire as a master.  (Please note, Quad IO is only available with the SPI Active – Level 3 Application.) There are two ways you can do this:

Control Center Serial Software
To try it initially, you can use the Multi I/O mode in Control Center Serial Software  - you can specify the IO mode for bytes at different stages. Here is an example:

SPI-Promira-Control-Center-SPI-Flash

For details, we have a Knowledge Base article you can refer to - Programming a Dual SPI Flash Using the Promira Serial Platform and the Control Center Serial Software using Multi I/O SPI.

Promira Serial Platform API
For greater flexibility, we recommend using the Promira Serial Platform API, which supports multiple platforms, and you can use Queue SPI Master Write (ps_queue_spi_write). The API Queue is a command that writes a stream of words to the downstream SPI slave device taking in the SPI IO Mode, (PS_SPI_IO_STANDARD/PS_SPI_IO_DUAL/PS_SPI_IO_QUAD) as one of the arguments. For more information about API, please refer to Promira API Documentation.

We hope this answers your question. Additional resources that you may find helpful include the following:

More questions? More ideas? You can also contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

-->

How flexible and accurate is the Advanced Cable Tester with polarity inversion for USB 3.1? Can I swap the differential signals and still continue the SS and SS+ eye tests?

$
0
0

Question from the Customer:

I have a question about using the Advanced Cable Tester.

Advanced Cable Tester

The USB 3.1 specification includes handling lane bit inversion. For example, the “+” and “-“ lines in a SuperSpeed or SuperSpeed+ differential pair can be swapped.

Can you confirm that the Advanced Cable Tester will properly execute the SS and SS+ eye tests on a cable if the differential signal lines in one or more SS or SS+ differential signal pairs are swapped? In other words, will the tester properly perform the SS and/or SS+ eye diagram test on a SS or SS+ lane if that lane has SSTX- connected to SSRX+ and vice versa?"

Response from Technical Support:

Thanks for your question! The Advanced Cable Tester has independent receivers. Bit patterns are not a concern - the inversion in polarity will not be an issue. The cable will be testable, provided it does not have continuity problems.

Additional resources that you may find helpful include the following:

We hope this answers your question. Need more information? You can contact us and request a demo that applies to your application, as well as ask questions about our host adapters and other Total Phase products.

Request a Demo

How Embedded Systems have Transformed the Healthcare Industry With Biomedical Applications

$
0
0

Think about living in the 1950s. Color television was introduced. The auto industry was experimenting with their new concept of “the sports car.” And the medical industry was making its biggest strides to date. The antibiotic erythromycin was launched commercially by Eli Lilly; Jonas Salk announced his polio vaccine, the first open-heart surgery was performed using the heart-lung machine developed by John H. Gibbon Jr. and the FDA approved BHA (butylated hydroxyanisole) as a food preservative. (Coincidentally, McDonald’s was franchised that same year.)
While these all mark large strides in the medical industry, there was still a great deal that was unknown. Medical equipment was large, cumbersome and expensive. Not all practitioners had access to these devices, and as such medical diagnosis was slow coming and cumbersome. Doctors relied on the description from the patient and their observation of symptoms to make a diagnosis and prescribe medicine. Not very scientific.
Fortunately for us, advancements in medical technology have far exceeded the expectations of medical practitioners who practiced in the 1950s. Scientists, researchers, and engineers have developed large-scale medical machines like ECG, CT scanners, MRI, X-ray, electronic defibrillators - these machines take images of bones, tissue and the structure and movement of the body’s organs. Even though these medical devices range in size from a breadbox to a china cabinet, they do contain the same embedded technology powers the electronics in your car and your wearable technology - yes embedded systems. Recent advances in embedded systems technology are rapidly transforming healthcare solutions. Thanks to the progress in embedded technology and IoT (Internet of Things); we are headed to a future of smaller, smarter, wearable and connected medical devices.
You may not realize it, but embedded systems have long been part of the development of medical devices and the reason for the vast improvements in the technology. These devices are smaller and more portable than ever. Smart devices like blood pressure monitors and glucose monitors are allowing patients to proactively monitor their medical conditions from anywhere. Gone are the times when they were required to go to the hospital or even their home for daily tests. On top of that, medical devices are shrinking in size from cart-sized heavy machines to lightweight handheld devices to implanted devices that are smaller than a matchbook.

How Embedded Systems are Being Used for Biomedical Applications

There are many ways that doctors have been able to adopt embedded systems for biomedical purposes. With the IoT (Internet of Things) becoming ever more connected, doctors are now able to remotely monitor their patients. Embedded devices are also able to help patients treat themselves and can be used for preventative medicine. Prosthetic technicians have also been able to make their prosthetics more advanced. These are the most revolutionary uses of embedded systems in the healthcare industry.

Preventative Care through Biomedical Sensors

With the aid of smart embedded technology-based medical devices, casual users can now be more proactive about their personal health. Smart devices enable users to continuously monitor their heart rate, blood pressure, glucose levels, weight and various other parameters. It is also worth mentioning that embedded technology-based devices are now coming with better connectivity and it is possible to seamlessly transmit data collected by these wearable devices to doctors. These are some of the most useful devices that doctors have at their disposal.

Pacemakers

Heart disease is a leading cause of death in developing countries. Embedded systems in pacemakers are able to sense heartbeats and track heart health. In many ways, the advanced embedded systems in pacemakers have made them mobile EKGs. The sensors in the pacemakers are able to record all of this information. Doctors will be able to analyze the information from the pacemakers and adjust their plan of care for their patients.

Glucose Monitors

For people who struggle with diabetes, monitoring your blood sugar can be a pain, literally. It's painful to constantly prick your finger to test your blood sugar. However, embedded systems have taken this pain away through continuous glucose monitors. With a small sensor inserted under the skin, the sensor will regularly send the blood sugar levels to a smartphone or other device that the diabetic can regularly check. This way, they can monitor their glucose and prevent spikes in blood sugar or hypoglycemia. With these monitors, diabetics can better manage their disease.

Fitness Trackers

Fitness trackers such as Fitbits are embedded systems that are able to track weight, activity levels, and even body composition. This is extremely helpful to individuals that are working with their doctors to lose weight and live a healthier life. Doctors can analyze the information provided by the fitness tracker about individual's daily activities. From here doctors can adjust treatment and fitness plan of their patients to help them reach their fitness goals in a healthy way.

CPAP Machines

The Internet of Things can help doctors and nurses track the sleeping schedules of people who struggle with sleep apnea. These advanced CPAP machines are able to then communicate when the patient has not been sleeping well to their doctor automatically. If a doctor notices that the patient has had numerous difficult nights, they can reach out to their patient to ensure that they are doing well or if their treatment needs to be changed in any way to ensure that they are sleeping properly.

Clinical Care Through Embedded Systems

Hospitalized patients that require constant attention can be monitored using embedded technology, noninvasive monitoring. Equipped with accurate sensors and powerful processors, these devices can collect comprehensive physiological information and send it wirelessly to the doctors or caregivers for further analysis. In short, embedded technology-based monitoring equipment are replacing the need for having a doctor come by and check the patient’s vital signs. It is not only improving the quality of healthcare but also reducing the cost of care by providing an automated and continuous flow of health-related information. These are some of the systems that healthcare professionals can use to care for patients while they are in the hospital.

Smart Hospital Beds

Healthcare technology has been improving in the form of hospital beds. Developers have been creating what could be referred to as "Smart Hospital Beds" The hospital beds can let nurses know when their patients are attempting to out of bed or if they are moving around. Also, there are sensors that are embedded into the bed are able to intuitively adjust the bed to help provide the appropriate pressure and support to keep patients as comfortable as possible while they are lying in bed. These hospital beds allow nurses to know what their patients are doing without needing to be physically watching them.

Clinical Monitoring

Noninvasive embedded monitoring technology can be used to help doctors constantly monitor their patients. The sensors are then able to communicate this information to a separate device. This way, they are able to receive constant information about their patients without needing to physically be in their presence. These sensors can also inform nurses and doctors when their patient is in need of immediate help. These embedded systems have been able to save time and energy for medical professionals so that they can prioritize time in between their patients.

Remote Patient Monitoring

People are living increasingly busier lives. They don’t have time to visit the doctor or drive a loved-one to see the physician on a daily basis. But, smart, small and powerful monitoring devices powered by embedded technology and connected with the help of IoT are helping these people monitor and treat their health conditions. These devices, mostly in the form of wearables, analyze the health-related data and share it with medical professionals who can respond with the appropriate recommendations. As a result, such patients are less likely to develop complications in the future.

Prosthetics and Embedded Systems

Losing a limb is an extremely difficult experience. It can be difficult for someone who is used to having a leg or an arm now figure out how to live life with a prosthetic limb. However prosthetic developers and technicians are working to create embedded systems that will make prosthetics easier to use. Right now, prosthetic developers are working to create embedded systems that can work with your neural pathways so that your brain can automatically move prosthetic limbs, just like your brain is able to use your biological limbs (Think Luke Skywalker's prosthetic arm). This will make prosthetics so much easier to use and will make life much easier for anyone who has lost a limb.

The Future of Embedded Systems with Biomedical Applications

In addition, there is an emerging class of embedded technology-based medical device that are taking things to the next level. These devices are can automatically deliver measured doses of drugs based on the person’s health condition. Or they can be worn inside your undergarments and be used to detect breast cancer.
The future of embedded technology-based medical devices couldn’t be brighter. With the convergence of IoT, the influence of embedded systems in healthcare is all set to soar higher. It is important for the hardware and the embedded software to work together to improve the healthcare system.
Don’t be surprised that if in the next decade newborn babies get a tattoo smaller than a postage stamp that is an integrated circuit (IC) designed to monitor biometric parameters. The collected data would be accessible to the pediatricians and parents on a real-time basis through smartphone apps.
It doesn’t end there. Another report indicates that in a few decades from now, a microbot could perform an array of surgical procedures. From removing blockages to collecting cell samples, this miniature robot, inserted into a patient’s artery through a small incision, can even carry a tiny camera to give doctors a view into the patient’s body. It might sound a lot like the science fiction movie “Inner Space” but with advances in embedded technology; it is all very real.

When is the Promira Serial Platform push-pull and when is it open collector?

$
0
0

Question from the Customer

I have some hardware questions about the Promira Serial Platform.  I am using two of the GPIO (pins 14 and 15) as DO (data output). Are they both open-collector pins?  Will I need to add pull-up resistors to my test board?

Response from Technical Support:

Thanks for your question!  The pins are dual function and can be either “push-pull” or  “open collector” depending on how they are configured. For your setup, they are push-pull.

 

 Push-Pull transistors  Open-collector output transistors

Push-Pull

Open Collector

Source: Wikipedia

 These are the details about Pin 14 and Pin 15:

Pin 14 can function as either SPI Slave Select/Chip Select 2 or GPIO signal 03.
Pin 15 can function as either SPI Slave Select/Chip Select 1 or GPIO signal 04.

  • When configured as an SPI chip select (CS), they are “push-pull”, driven by the Promira platform.
  • When configured as a GPIO output, they are “push-pull”, driven by the Promira platform.
  • When configured as GPIO input, they are “tri-stated” – they behave as open-collector.  The internal lines of the Promira platform provide 2.2k pull-up resistors – you do not need to add external pull-up resistors.

We hope this answers your question. Additional resources that you may find helpful include the following:

More questions? More ideas? You can also contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

What does I2C have to do with GPS data and how much more can GPS navigate on planet Earth?

$
0
0

satcomViewGPS data has been system integrated with UART for some time, an asynchronous system. With navigation becoming more prevalent in commercial products, as well as mobile robotic devices and the coming of self-driving vehicles, I2C is now being integrated with GPS signals.

These interfaces appear similar, both having two signal lines. Beyond that, their functionalities are very different.  Here are two key points:

I2C-diagram  UART-diagram
  1. A more sophisticated protocol, I2C can interface up to 27 devices: there can be multiple masters, and each master can communicate with all slave devices.
  2. I2C can operate at a much higher speed than a UART, up to 3.4 MHz or even 5 MHz in some applications.
  1. UART can only interface one device to one other device
  2. The UART bitrate can be much lower than I2C – the maximum baud rate is typically less than 1 Mbps.

 

Image source: RF Wireless

Want more comparative information? Check out what RF Wireless has to say.

 

Tell me about the robots – what are their advantages with this technology?

One I2C bus can support several devices, including multiple processors, on a single data bus while UART is dedicated to a single processor. This affects real estate on the boards, power requirements, and scalability. A single robot can easily require hundreds of processors to support a multitude of sensors and each responsive function making I2C much more ideally suited.

The robots that navigate using GPS include drones that ship products and medical supplies, consumer-level drones, and “all terrain” GPS Remote Control cars.

Self-driving cars and farming

They may not be called robots, but performance independent of human interaction is a robotic function.  For navigation, especially on streets and highways, precision is critical.

GPS-drivingSource:  Australian 4WD

 For transportation to be safe and cost-effective, it must be accurate. GPS signaling is being improved and becoming widely available, including the launching of GPS satellites for better navigation in congested urban areas, as well as repeaters for above ground and under water.

According to Rob Hranac, Vice President of Business Development for Swift Navigation:

“To successfully navigate and perform tasks, we need to be much more precise.”

The rise of robotic farm tools

About 100 years ago, farming evolved from animal power to combustion engines. Today, for higher yield and lower costs, farming is evolving to high-tech tools.

GPS-FarmToolsSource: MultiRotor

Farms are starting to use unmanned aerial vehicles  (UAVs, also known as drones) with sensors and GPS receivers to identify the conditions of specific farm locations, then analyze and send the information to the tools to do the job: watering, fertilization, pruning and weeding, and more. The purpose – maximize crop yields to feed the growing population.  What are the plans to lower the cost? Stated in the ASME article GPS Helps Robots Get the Job Done:

“Recently, Carnegie Robotics and Swift Navigation announced the two companies were teaming up to create products that will incorporate GPS into robotic equipment. This could lower the cost of robotics and automation in cars, trucks, military equipment, and vehicles used in surface mining.”

Clearly, the future is now

All these changes, all these advancements are in action – some of it is already on the market and even more will be on the market within the next 3 years.

What’s the easiest way to run line commands with the Beagle USB 5000 v2 SuperSpeed Protocol Analyzer?

$
0
0

Question from the Customer:

I’m using the Beagle USB 5000 v2 SuperSpeed Protocol Analyzer - Standard Edition to monitor a Blu-ray recorder with an external USB-HDD. I’d like to run the device using command line.  This is all very new to me – can you send me an example of batch script? I’ll be using a MacBook.

Response from Technical Support:

Thanks for your question! The Beagle USB 5000 v2 SuperSpeed Protocol Analyzer is a world-class USB bus monitor that provides real-time interactive capture and analysis of USB 3.0 or USB 2.0 traffic. We’ll be glad to help you get started.

B5000v2-faceLwhite-600

Here is an example of commands that you can run from a file (which we’ll call dctest.txt). To use this batch script, all you have to do is:<br />

  1. Create dctest.txt on your MacBook with the following commands:
    con 0
    run
    trigger
    stop
    disconnect
    export output.csv {}
    exit 1
  2. On your MacBook, open a terminal and enter Data\ Center.app/bin/datacenter -b dctest.txt
  3. The Data Center Software will start up, run the script and then close.

For more information, please refer to the sections Command Line Options/Batch Mode and Command Line Window in the Data Center Software User Manual.  Here’s an example of what the Command Line Window looks like:

DC-CommandLineWe hope this answers your question. Additional resources that you may find helpful include the following:

More questions? You can also contact us and request a demo that applies to your application, as well as ask questions about the Beagle USB 5000 v2 analyzers and other Total Phase products.

Request a Demo

Keeping Cool: Different Thermal Management Systems In Embedded Systems

$
0
0

While any computer is running, it creates thermal energy which heats up the system. When it comes to creating efficient computers and embedded systems, every engineer can explain the importance of ensuring that the devices operate at the correct temperature. When embedded systems become too hot, electrical signals may become corrupted, the hardware can become damaged or less efficient and the temperature may just render the software inoperable. With the Internet of Things becoming more prevalent, embedded devices need to be work in a way that is so seamless that we may not even realize when they are working. However, if thermal management systems are not in place, embedded systems will be more pain than they may be worth. Because of this, engineers have made thermal management an important part of every embedded system that they create.

 

Different Types of Thermal Management That Can Be Used on Embedded Systems

Throughout the years, engineers have developed increasingly advanced thermal management systems to keep their embedded systems at the correct temperature. There are many different types of thermal management systems that engineers can use and each one has many benefits to offer. Here are some of the most popular thermal management systems that we currently use in the technology world.

 

Heat Sink

A heat sink is one of the most basic, yet commonly used thermal management systems in embedded systems. A basic heatsink does not require any electricity whatsoever and can be used on any kind of device. The design of the heat sink gives it the ability to transfer heat from a higher temperature device, such as an embedded system, to a lower temperature medium. Generally, for most embedded systems, this medium is air. Most heat sinks are created from aluminum alloy because they have some of the highest thermal conductivity values.

Heat sinks have very specific designs for their purpose. A heat sink is designed to maximize its surface area in contact with the cooling medium. Heat sinks use "fins" or "inverted fins" in order to optimize the heat transfer density. These fins allow the air to be in constant contact with the hotter parts of the embedded systems to ensure that they stay at the correct temperature. While heat sinks are the most technologically basic, they require no maintenance and they are especially effective to keep your devices to run the way that they are supposed to. The more advanced systems are used when engineers need their embedded systems to be at an exact temperature range.

 

Forced Air Cooling

A  forced air cooling system is also a very common thermal management system. It is a more advanced heat sink.  Engineers are able to cool embedded systems down faster by combining fans and heat sinks. With these fans, cooler air is then forced through the heat sink cooling the embedded system down faster than a simple heatsink normally would. While this is one of the most common thermal management systems, it also has the most moving parts, which makes it the most high maintenance. The fans used in this system sometimes break and need to be replaced.

 

Cooling Plate

A cooling plate is very similar to a heat sink, except for relying on air to cool down the embedded system, the cooling plate relies on water or other refrigerant fluids. Water has a much higher specific heat than air. Therefore, a cooling plate would be able to cool the embedded system down much faster than a basic heatsink. Cooling plates make use of a thick metal conductive plate so that the embedded systems do not come in direct contact with the cooling fluid. You may be able to compare a cooling plate to an ice pack for your devices.

 

Conductive Cooling

Conductive cooling is one of the more advanced types of thermal management. With conductive cooling, fans are able to push the warmer air around the embedded system out and push cooler air in. Most conductive cooling systems use the physical scientific knowledge that hot air rises. So fans are placed at the bottom of the embedded system and vents are placed at the top. Therefore, when the fans begin to blow the air, the warmer air rises to the top of the system being pushed out by the cooler air coming in.

 

Peltier Cooling Plate

The Peltier cooling plate relies on what are called thermoelectric junctions to conduct thermoelectricity from the embedded system to the cooling plate. The cooling plate uses what is called the Peltier effect. The Peltier effect is basically the cooling effect that occurs at the junction of 2 different conductors. This helps to ensure that the embedded system itself remains at the optimal temperature. The Peltier cooling plate is especially beneficial for embedded systems because of their lack of moving parts, which makes them very low maintenance.

 

Synthetic Jet Air Cooling

Synthetic jet air cooling is very similar to conductive cooling except a little more advanced. Instead of relying on the hot air rising out of the system, the warmer air is sucked out of the system while the cooler air is jetted into the system. This helps to cool the system much more efficiently than the conductive cooling system. Also, the synthetic jet air cooling system is low maintenance as well, which makes it an excellent option for thermal management for many embedded systems.

 

Other Advancements in Thermal Management Systems

There have been a number of advancements in thermal management systems to make them more efficient. This way the thermal management systems do not necessarily need to constantly be running. There have been many advancements such as temperature sensors as well as a sensor interface. These are able to sense what temperature the embedded system is and can the turn on the thermal management system to efficiently cool the embedded system to the accurate temperature that the system should be at. This is an example of how embedded systems are actually making thermal management systems work more effectively.

Also, as thermal management systems have become more advanced, they have required much less maintenance to ensure that the embedded systems consistently run the way that they are supposed to. Engineers are always looking for ways to make thermal management systems work more efficiently to make sure that technology can run seamlessly.

 

The Importance of Thermal Management Systems in Embedded Systems

We live in an embedded world. From medical purposes, to eventually self-driving cars, there are times when we put our lives in the hands of embedded systems. People often don't even realize when they are using embedded systems to complete a task. If embedded systems do not work the way that they are supposed to, it could make our lives much more difficult. As more embedded systems become portable, engineers will also need to consider the environment that the devices will be in. For example, with embedded systems in self-driving cars, the car itself may be going through a hot environment that the devices cannot handle without an effective thermal management system. If that system does not work, the passengers may be stranded with a car that isn't working properly. Whenever engineers are designing an embedded system, it is vital that they consider the thermal management as well. With so many thermal management systems to choose from, it can be difficult to decide the right system for your devices. Total Phase can help you develop your embedded systems and can also help advise you on how to keep them running properly with the correct thermal management devices in place.

Which Software Packages Can I Use to View Checksums with the Aardvark I2C/SPI Host Adapter?

$
0
0

Question from the Customer:

I‘ll be using the Aardvark I2C/SPI Host Adapter and Flash Center Software and I have some questions -– how do I view checksums?  Also, can I get a checksum for the entire device?

Response from Technical Support:

Thanks for your question! The Aardvark adapter is compatible with the checksum byte feature. Regarding checksums, the Flash Center Software follows the hex format - the last byte is the checksum. For additional information about checksums, please refer to this article.

It is possible to get a checksum of an entire device, however the Flash Center Software does not support that feature.  Instead, you can use the Aardvark Software API.  In this case, we recommend referring to the aaspi_program.py program, which is provided with the API software. Here is an example of executing this program with an AT25080 SPI EEPROM. The checksum of the entire device is highlighted.

Aardvark-API-aaspi_program_executionThe Aardvark Software API supports Windows, Linux, and Mac operating systems, and several languages (C, C++, C#, Python, and VB) and includes example programs that you can use as is or modify as needed. For additional information about API, please refer to Aardvark API documentation.

Additional resources that you may find helpful include the following:

 We hope this answers your question. Want more information? You can contact us and request a demo that applies to your application, as well as ask about our Total Phase products.

Request a Demo


How Connected Devices are Influencing the Future of Grocery Shopping

$
0
0

The grocery business has faced a number of challenges over the last several decades. High fixed costs, slim profit margins, perishable products with diverse handling requirements, and the need to manage distribution with a growing network of suppliers have all made it difficult to turn a profit, and even so, competition is at an all-time high. Discounters who specialize in minimizing costs are eating up larger and larger portions of the market, squeezing margins even thinner for stores offering higher-end service and more product selection.

Connected devices are poised to play a significant role as grocery store CEOs search for innovations that can bolster profits in such a difficult environment. With the recent purchase of the Whole Foods brand by Amazon, it's clear that at least one big technology player will be entering the grocery business and leveraging connected devices in a big way.

Let's look at some of the ways that connected devices are influencing the future of grocery shopping.

 

Trending in Europe - Online Grocery on the Rise

Online grocery shopping was one of the earliest innovations that changed the way we shop for groceries. There are hundreds of grocery delivery services operating around the world, and while they haven't caught on everywhere, the industry has grown steadily in France and the United Kingdom by 10-12% annually.

It's clear that online grocers are doing something right, but with online deliveries on the rise, connected devices are likely to play a role in streamlining delivery and addressing some of the most common consumer gripes with online delivery - high prices, prohibitively expensive delivery fees, and unpredictable service.

Connected devices are already enabling people to skip the checkout lines at their local grocer, but they'll have to be leveraged even more to provide the standards of service and reliability that consumers expect, and at the right price. For example, grocery delivery services can integrate real-time route tracking to add transparency to their delivery process and better estimate delivery times. Connected devices can be used to optimize delivery routes and save on gas, helping to drive down delivery costs.

 

Redefining the Network - Connected Devices in Transportation

If you're envisioning a future where you can have your groceries delivered each week according to your own preferences, all without having to leave your home, you're certainly not alone. In a 2017 survey, just 15% of consumers reported that they enjoyed shopping for groceries - but we know they all loved eating them! If that's the case, why isn't grocery delivery even more popular?

The main challenge for online grocery delivery services is economizing the process of picking the groceries for each customer, managing them according to their unique handling and storage requirements, and transporting them to the customer at a predetermined time. In a business where food prices are highly competitive, it's difficult to turn a profit while charging a delivery fee that the customer can afford and maintaining a reasonable standard of service.

Using connected devices in transportation could play a major role in reducing delivery costs. Customers of Uber love the interactive platform that lets you watch as your Uber car navigates to your location, what if grocery delivery worked the same way? Connected devices can be used to estimate traffic and manage delivery routes, increasing transparency and customer satisfaction, and generating more accurate estimated delivery times to improve customer convenience.

Amazon Grocery is already applying Amazon's existing warehousing system to support next-day delivery of groceries to certain locations, but the service offers only non-perishables, making it impractical as a sole provider of grocery for most consumers despite offering shorter turnaround times than its competitors.

 

Driver-less Distribution on the Horizon

The annual cost of global delivery is currently in excess of $70 billion, with growth constantly driven by e-commerce, and with the rise of online grocery shopping, that's not likely to change. What will change, however, is how those products reach their destinations.

Driverless cars are the end-game of distribution automation for the grocery delivery business. In the future, these autonomous vehicles will use information from billions of connected devices to optimize the delivery of goods. With minimal labor costs, grocery suppliers will pick orders automatically using robots, fill refrigerated parcel lockers on automated vehicles, and send them off on optimized routes to residences of consumers.

Consumers will receive regular updates and tracking on their orders, along with an electronic code that enables them to access their goods when the vehicle arrives. Transactions will be processed electronically in advance, streamlining the entire process.

By reducing labor costs and enhancing logistics with connected devices, we'll be able to get groceries and other items delivered for cheaper than ever before, and with better customer service.

 

Amazon Go - A Grocery Revolution

Connected devices are already revolutionizing another area of industry - payment processing. While its competitors look to enhance the shopping experience by shaving seconds off of their check-out times to save on labor, Amazon is taking a totally different approach with Amazon Go, its own innovative approach to making grocery shopping a tenable experience again.

The new business model will allow consumers to simply walk into a grocery store, take whatever items they'd like to purchase and walk out - no waiting in check-out lines, no payment processing, and no hassle.

The secret is using connected devices to track what items leave the store with each shopper. Shoppers interface the Amazon Go app on their connected devices with special turnstiles when they enter the store, and from then on, their purchases are automatically tracked in the app's digital shopping cart - it can even tell when the shopper returns items to shelves.

When shoppers finish in the store, they simply walk out with the purchased items and the transaction is completed automatically.

 

Conclusion

With 10 billion connected devices already present in the world, and up to 40 billion more expected to exist by 2020, businesses that leverage the Internet of Everything to enhance their processes and improve customer service stand to benefit significantly over the next decade.

In the grocery business, connected devices will continue to support the growth of home grocery delivery services, and enhance the in-person shopping experience, through improvements to transportation, inventory management, and payment processing.

How Do Isolated Devices and Life-Saving Micro-Power Devices Run on Minimal Energy?

$
0
0

Sensors, processors, controllers - all electronic devices require power. Sometimes the energy source is continuous, such as direct AC power or AC converted to DC, easily replaceable batteries, or only need to function during the day, which makes solar power a viable solution. However, some devices don’t have access to constant external power, are not easily accessible, yet continuously run long-term. There are very remote sensors and implanted medical devices that must provide continuous support without frequent recharge or battery replacement.  In such cases, it’s not practical to depend on “ordinary” power sources; the solution is dependent on less power.

 batteries  High-voltage power transmission towers , Power Lines Stock Photo  medical implant devices

What are the options?

One option is speed – less speed requires less power. The required processing speed for medical devices is much slower than the Smartphone you use. Many of these devices run in the kHz frequency range, not the GHz range of the computing devices you use for programming complex games, streaming videos, or getting GPS driving directions.

Another option is managing jobs run by the CPU. Two such methods are spinlock and mutex.

Spinlock is best used with multi-core processors that run very short-term jobs. Jobs repeatedly try to access the core until the job using that core has completed its task. The operating system can forcibly switch the core to another job when the runtime of a thread has exceeded a defined limit.

Mutex, mutual exclusive, is used to prevent race conditions, multiple signals trying to affect the same output. Threads that have to wait are put to sleep until the CPU Core is unlocked. Various lock strategies can be applied to prevent a thread from “taking over” the core or CPU. This is most effective when locks are short-term; it prevents the tasks of repeatedly rescheduled jobs.

How can you monitor, simulate, program and interact with embedded devices? You can contact us and request a demo that applies to your application, as well as ask questions about Protocol Analyzers, Host Adapters and other Total Phase products.

Request a Demo

Connected Classrooms: How Technology in Schools Have Changed the Way We Learn

$
0
0

The last two decades have been a period of unprecedented innovation when it comes to integrating technology into the classroom environment. In just twenty years, educators have had to adopt significant paradigm shifts in regard to using technology in the classroom. Consider the following examples:

In 1998, training in cursive writing was a mandatory aspect of the curriculum in most schools. Today, students almost never submit assignments in written form, and even note-taking in class is often done on laptops. In most schools, cursive writing is no longer taught.

In the early 2000s, educators encouraged students to do math in their heads because "you won't always have a calculator". In 2017, the widespread adoption of mobile connected devices gives all of us access to calculators and other highly sophisticated numeracy tools on a constant basis.

As the world of work evolves to include more technology applications, it's crucial that educators get kids working with technology from an early age in order to enhance their life outcomes. Here are a few ways that the integration of technology in schools in enhancing the way we learn and preparing our children for successful futures in the job market.

 

Google Classroom Enhances Student/Teacher Connectivity

In 2014, Google released a new learning platform called Google Classroom, which facilitates the administration of classrooms by enhancing connectivity between students and teachers.

The project leverages several of Google's existing tools to create web-based learning portal that connects teachers and students through a variety of functional processes - students use Google Docs, Sheets, and Slides to create documents, spreadsheets, and slideshow presentations, and file sharing between students and teachers is facilitated through Google Drive.

In addition, the Google Calendar tool is used by teachers for planning, scheduling, and to set deadlines or give extensions, and students are assigned Gmail accounts that they can use to communicate with the course instructor. The platform can be used by teachers to direct multiple classes, and by students to participate in multiple classes. Accessibility to the platform is supported across multiple device types, including iOS and Android-enabled mobile devices.

Reviews of Google Classroom have been positive.  Paperless processes centralize the course date and eliminate the need for teachers to print and distribute assignments to students, meaning that the assignments are never lost.  Google Classroom also supports assignment grading, shortening the feedback loop between students and teachers while facilitating rapid academic development.

There are also great benefits to be gained by exposing young children to the most common office tools at an early age. Getting kids working with web-based calendars, office tools, and electronic communication platforms is now a superior means of ensuring they get the computer literacy skills that are needed for today's working world.

 

Connected Classrooms Offer New Educational Opportunities for Students

Google Classroom does an exceptional job of leveraging connected devices to facilitate interactions between the teacher and student, but what about delivering new learning opportunities through the use of connected devices?

Connected Classrooms is a revolutionary program on Google Plus that teachers can now use to connect their students with a variety of new learning opportunities. The program makes use of two new types of interactions -  Virtual Field Trips and Hangouts on Air.

With budgetary cutbacks across education systems, it is becoming more difficult to offer students the kinds of enriching experiences that should be characteristic of their education - visits to the local zoo or aquarium, a bus ride to the wilderness to explore what is outside the city, etc.  Virtual Field Trips connect cultural institutions like museums, aquariums, and even NASA, with students around the world, providing unique interactive experiences through live video conferencing. Google has partnered with a number of institutions to continue delivering this feature to schools around the world.

Hangouts on Air are live video conferences that enable real-time education, communication, and collaboration with up to ten parties at once. A quick look at the Connected Classrooms page reveals that the program already has over 25,000 users, and educators across the United States are actively seeking opportunities to interface with others across borders - educators in the USA are looking to connect their classes with students across the world to discuss differences in climate, or with other classrooms in Britain to discuss the American Revolution, and much more.

Google Classrooms is using connected devices to offer students formative experiences and new perspectives that they could never have accessed otherwise, and with significantly lower costs.

 

McGraw Hill Connect Program Achieves Great Outcomes in Case Studies

McGraw Hill is one of the biggest publishers in the education space, and now they're using that experience to enhance education outcomes for students with a new program, called McGraw Hill Connect.

Similar to Google Classroom, Connect is a learning platform that integrates assignments, grading, and course content. The program also includes an application called SmartBook, a digital version of the course textbook that uses algorithmic learning to provide an enhanced, interactive experience. SmartBook quizzes students as they learn, automatically highlights important points in the text, and is cheaper than purchasing textbooks.

Case studies on the outcomes produced by McGraw Hill Connect and Smartbook have been extremely positive, with reports of the following:

  • 20% increase in student retention for colleges that adopted the system

  • 13% improvement in pass rates for students using the system

  • 9% increase in average exam scores

  • 15% more students earned A and B grades than before

  • Instructors spent 72% less time on administrative tasks and 90% more time on learning experiences

 

Conclusion

The education system is in a state of rapid change. As technology advances by leaps and bounds, and the requirements of the workplace continue to evolve, adapting our educational practices to enhance learning and produce skilled and qualified people is vital to our future.

Connected devices are playing a major role in bringing enrichment and new experiences to students of all ages. A connected classroom is one where teachers spend less time on administrative tasks and more time focused on how to enrich and enlighten our youth. Google Classroom and McGraw Hill Connect are just two of many examples of how learning can be integrated through technology platforms to enhance outcomes for students.

In the future, technology in schools will continue to help address many of the social issues that affect our education system, such as budget cuts, increasing class sizes, lack of funding for field trips or materials, increased environmental consciousness, and the need to enhance computer literacy across all levels of society.

The 4 Most Common Problems with Host Adapters

$
0
0

Host Bus Adapters (HBA) are an important part of any general use computer's server or in embedded systems, without a Host Adapter the computer would not be able to store memory. Host Bus Adapters are designed to connect computers with Storage Area Networks. Host Adapters are very similar to Network Adapters in the way that they are able to provide a computer with access to a Local Area Network (LAN) or a Wide Area Network (WAN).

Host Bus Adapters use fibre channels to connect the Storage Area Networks (SAN) to the different embedded devices or components the Host Bus Adapter is connected to. Host Bus Adapters generally are used to connect SCSI, Fibre Channel, and SATA devices and are basically able to free up the servers so they are able to perform pure application processing. Their functions include input/output translation and CPU offload. The Host Bus Adapter is able to map SCSI data to the Storage Area Network, reducing the time CPUs may spend on storage tasks. Host Bus Adapters are able to streamline the work that the servers need to do to save information to the memory.

Host Bus Adapters need to be properly integrated into the computer servers or embedded systems. Most of the common problems related to Host Bus Adapters deal with proper setup and ensuring that they are properly configured for the software or firmware the server or embedded system uses. There are other installation issues that the engineer needs to consider while setting up their Host Bus Adapter within the server or embedded system. We want to ensure that you are aware of some of these issues so that you are prepared before you begin the installation process of your Host Bus Adapter.

 

The 4 Most Common Problems that Happen with Host Adapters

When engineers are creating their own PCs, repairing their computers, or making upgrades, they may come into some problems when it comes to dealing with their Host Adapters. Understanding these problems and knowing how to fix them helps engineers understand how to keep their computers running properly.

 

1. Incorrect Host Bus Adapter Choice for the Operating System

Host Bus Adapters can be used on many different operating systems, including Solaris, Linux, AIX and other Unix flavors. However, they are not a one-size-fits all choice when it comes to each operating system. Some types of Host Bus Adapters are made for certain operating systems, but not others. When engineers are choosing the Host Adapter for their computer, it is important that they choose an Adapter that has been configured to work with their operating system and that is compatible with the drivers that the computer uses. A Host Bus system may be compatible with the operating system, but the computer may use certain drivers that will not work with the Host Bus Adapter. Both of these types of software need to be able to work with the Host Bus Adapter in order for everything to work properly.

 

2. Configuring the Host Bus Adapter with the Hardware

Once engineers understand that the Host Bus Adapter will work properly with the software in the computer, they need to pay attention to the hardware. Certain Host Bus Adapters will work with the hardware of a particular computer, but not the hardware of another, even if they use the same software. Before installing the Host Bus Adapter into the computer, engineers need to make sure that the host server or embedded system will be compatible with the Host Bus Adapter. It is important for engineers to check that the Host Bus Adapter will work within the physical space within the server as well as can be configured properly with the hardware already installed into the server or embedded system.

 

3. Configuring the Host Adapter with the Storage Area Network

Not only is it necessary for the Host Adapter to be properly configured to the operating system, but it also needs to work properly with the Storage Area Network. The Storage Area Network works on a specific fibre channel link speed. When engineers are choosing their Host Bus Adapter, they need to make sure that it can be configured to the same speed. For example, if the fibre channel switch maximum speed is 1 GB/sec, then the Host Bus Adapter needs to be set to that value. The correct configuration will ensure that the Host Bus Adapter will work correctly with both the computer's server as well as the Storage Area Network.

 

4. Incorrect Fibre Channel Cables

While this may not be an issue with the Host Bus Adapter itself, it is still often a problem that engineers face. Host Bus Adapters work with fibre channels in order to connect to the servers or embedded system as well as the Storage Area Network. Fibre channels make use of optical fiber cables within and between data centers. Certain cables will work with particular Host Bus Adapters but they will not work with others. Often times, the cables need to be purchased separately from the Host Bus Adapters themselves. It is important for engineers to do the research so that they use the correct cables.

 

Installing Your Host Bus Adapter Within Your Server or Embedded System

Before you begin on any installation of Host Bus Adapters, it is vital that you have all of the information that you may need. This way, you will not install an incorrect Host Bus Adapter for your computer. This will make sure that it is working as efficiently as possible to improve your CPU's performance.

Whenever you are installing a Host Bus Adapter, it is important to handle it with care and to keep it away from electrostatic discharge as the electrostatic sensitive components can be seriously damaged. Once the Host Bus Adapter has been installed, it is important to pay attention to the lights that will turn on or flash. These lights will inform you if there are any issues with the Host Bus Adapter or if there are any installation issues that require troubleshooting.

Host Adapters have a vital role when it comes to the embedded systems development industry. With their help, engineers can easily connect their computers to embedded systems environments to gain the ability to develop, program, or debug.

For example, the Aardvark™ I2C/SPI Host Adapter allows engineers to interface their embedded environment through I2C or SPI protocols as a master or a slave. Engineers who want to quickly program can also use Host Adapters to easily develop all of their applications. The Cheetah™ SPI Host Adapter is an example of a high-speed Adapter that has the ability to communicate over SPI at 40+ MHz.

Total Phase offers Host Adapters to help engineers interface with their embedded system. Contact us if you would like to learn more about how Total Phase can help or you are interested in having a personal demo to address your needs.

Phase products.

Request a Demo

A Primer for Embedded Systems Security

$
0
0

With the growing popularity of embedded systems, concerns about security and privacy of these systems have risen dramatically in a short period of time. While operating systems like Windows and MacOS have well-known antivirus solutions that are constantly updated with new virus definitions, the ubiquity and modularity of embedded systems makes them more difficult to secure.

In a world that increasingly relies on embedded systems, security threats can result in serious damage in the best cases and utter chaos in the worst. In Poland, a 14-year-old high school student spent weeks trespassing at a train yard, gathering information that he used to convert a TV remote controller into a control device for the track points. The youth, now facing juvenile disciplinary hearings, caused 4 trains to derail and injured 12 in the process.

Your embedded systems application may not carry the inherent risks of one used to operate a train yard, but it's still important to know and understand the security risks associated with embedded systems and how to mitigate them. This article explains some of the most current security risks associated with embedded systems and how you can address them in your own devices. We'll also look at some of the security concerns in embedded systems around the world and how their architects are working to keep them secure.

 

Conducting Risk Assessment for Embedded Systems Design

It's important to understand first and foremost that no system is entirely secure. Given sufficient time, resources, and information, a sophisticated hacker or team of hackers can break into any system. In view of that, it's difficult to define what security measures are appropriate - how can you decide when you'll be vulnerable in any case?

The best approach is to conduct a risk assessment for your embedded system that asks several key questions - does my system need to be protected? What are the risks associated with a successful attack on the system? Who might want to attack the system? It's important to not only define the reasons you're protecting the system but also who you're protecting it from. If you're building a system that processes credit card data, you'll treat security threats differently than if the system were to operate a washing machine, for example.

This analysis will help you understand how to implement layers of security within your embedded systems and which layers are most important for mitigating attacks.

 

A Classification for Embedded Systems Attackers

It is useful to create a classification system for different types of embedded systems attacks in order to understand the threats you could face and how they may manifest. Whether you're building an embedded system to secure your home against intruders, to control manufacturing or industrial equipment, or to facilitate banking transactions, it's important to recognize potential attackers and customize your security measures to keep them out.

The Clever Outsider - Many hacks and computer attacks are perpetrated by clever outsiders like the Polish high school student mentioned in the introduction. These hackers are intelligent, but their methods are often unsophisticated. They are often pranksters, looking to exploit system vulnerabilities to stroke their own egos - not to actualize any material gain.

How could a school student do some damage on such a low budget? A TV remote control is a device that emits infrared signals - it requires a receiver on the other end in order to function. If the train tracks are already controlled by infrared, the only thing left is to monitor the signals used and reverse-engineer them so they can be sent via the TV remote instead of via the secured track controls.

The Knowledgeable Insider - Sophisticated embedded systems attacks often come from knowledgeable insiders. These attackers use more specialized methods - they often have advanced technical knowledge that can be used to manipulate embedded systems the way they want. These attacks are often done with real malicious intent - to get access to financial or credit card information that can be sold to fraudsters.

These types of attacks are becoming especially common as embedded systems cement their place in our society. In the past, criminals would stage attacks against computers to try and obtain critical data. Now, it's easier to attack routers and intercept data packets where they're most vulnerable. In fact, a researcher from Kaspersky Labs found that 4.5 million routers in Brazil fell victim to a silent DNS attack in 2011 whose goal was to steal financial data. Sky News reported in 2013 that of the 89,000 reported car break-ins, around half resulted from hacking the vehicle's computer systems.

The Funded Organization - Major cyber attacks on embedded systems can be conducted by funded organizations with large teams and virtually unlimited budgets to get the job done. It's unlikely that you'll be a victim of this type of security breach, but these attacks exemplify just how resourceful big organizations can be when it comes to achieving their aims in the domain of cybersecurity.

Stuxnet, a malicious computer worm, was programmed jointly by American and Israeli programmers to facilitate an attack that destroyed 20% of the nuclear centrifuges used in Iran's nuclear program. Stuxnet infected the computers used to run the centrifuges, exploiting four zero-day flaws and causing the fast-spinning machines to tear themselves apart. An attack of this magnitude could involve 15-20 programmers working together for years.

 

Implement Layered Security for Embedded Systems Security

Embedded systems, like the computers we use each day, are vulnerable to security threats from several different vectors. It's important to implement multiple kinds of security in layers that keep attackers from penetrating your devices and manipulating them for nefarious purposes. Let's briefly summarize each layer of security and how it functions:

Systems-Engineering Security - Implementing security features at the systems-engineering level is an effective means of preventing hackers from interacting with your software. This includes applications like firewalls, secure network communication protocols, proper authentication of data sources, and data encryption. These measures regulate interaction between your software and the outside environment, making it more difficult for attackers to access the system. They are especially important for devices that connect to the internet and could potentially be accessed remotely.

Hardware Security - Hardware security can be implemented in several ways. This level of protection uses physical barriers to prevent attackers from accessing, dismantling, or reverse-engineering your devices. Hardened steel enclosures for your connected devices, along with locks and tight airflow channels are all deterrents against attackers trying to dismantle your devices. Some device enclosures are so secure that opening the device would render it inoperable.

Software Security - Software security is the least-implemented layer of embedded systems security, especially for systems that don't connect to the internet. Poor programming, flaws, and bugs can lead to security vulnerabilities, so it's important to follow best practices when writing the software for your system. For starters, remember to remove any functions or debug routines that are not necessary in the final product. These may unintentionally provide attackers with extra information that can be used to manipulate the device.

The nature of your connected devices will affect how you implement these systems to optimize security against any attacks that you anticipate.

 

Conclusion

If you've been left with more questions than answers when it comes to security for your devices, you're not alone. Connected devices and the Internet of Things are expanding opportunities for hackers faster than they can be addressed, and keeping up with current threats is a constant struggle. Thankfully, we've saved our two most important pieces of advice for the end of this article so you can take them with you everywhere.

First, make sure you consider security throughout product development. Don't plan to implement security later, as this almost never happens, and you'll leave yourself open to the most basic attacks from "clever outsiders".

Second, ensure that the cost of penetrating your security system is greater than the benefit. If organized criminals and professional hackers can't profit from breaching your security features, it's much less likely that your security system will come under attack. Added security measures, especially those at the software level, like data encryption, increase the barrier to entry for attacks against your devices.

We hope this resource broadens your understanding of embedded systems security and serves as a starting point for ensuring security in your own connected devices.

How Embedded Systems Impact Your Everyday Life

$
0
0

From the computer systems that control safety features in the latest automobiles to the ATMs we use regularly to access cash, embedded systems can be found everywhere in our society. In fact, a full 98% of microprocessors manufactured today will find their use in embedded systems. That leaves just 2% for use in computers!
To help our readers understand the extent to which embedded systems are at work in their everyday lives, we wrote this article as a "day in the life" look at how embedded systems play a role in our daily activities, interactions and tasks. We'll show you how embedded systems are used to help keep you safe, provide you with goods and services that you could never otherwise have, and generally enhance your quality of life. Enjoy!
 

A Clear Picture of Embedded Systems

As we begin, let's quickly define an embedded system as a computer system with a dedicated function within a larger mechanical or electric system. That gives us two important criteria for understanding what an embedded system is:
The system must be computerized, meaning that it functions with a microprocessor or microcontroller.
The system is embedded in something else; it's part of a larger device that serves a function on its own, and the role of the embedded system is to control the functions or processes of the system which it is a part of.
An additional characteristic of embedded systems is that they frequently operate in real-time, meaning that the system controls the environment by receiving data, processing it, and returning the results quickly enough to affect the environment within a reasonable time-frame, often milliseconds, or even microseconds.
We encourage you to think about how this definition applies to these examples and to envision where else in your life you may encounter embedded systems that fit this definition.
 

Embedded Systems In the Morning

From the time you wake in the morning, you can already thank embedded systems for the role they play in your life. Embedded systems are used in home security and alarm systems to keep you, your family, and your possessions safe. A sophisticated home alarm system is comprised of sensors that detect when something is wrong, a microcontroller that processes the information, and an output system - often an audible alarm. Home alarm systems may include sensors that detect intruders (motion sensors), fires (temperature sensors), or even noxious gases (carbon monoxide sensor).
If you slept well, you can thank the embedded systems that control the temperature of your home via thermostat. Thermostats are programmed by the user to keep the house at a particular temperature. Sensors are used to gauge the warmth of the home, and the embedded system works to activate or deactivate your home's furnace or air conditioning system automatically. That's a big improvement from shoveling coal into a fireplace.
As you're getting dressed for work, you can thank the embedded systems in your laundry machines for the fresh, clean clothes you put on. You choose whether you want a hot or cold wash, and the embedded systems in your washing machine initiate the soak, wash, rinse, and spin cycles. This is done via sensors that track the water level, the open/closed status of water intake and drainage valves, and the motor that controls your spin cycle.
 

Embedded Systems on the Road

You've made it out the door and it's time to head into the office and get your work day started! As you get behind the wheel, remember that your vehicle is literally chock full of embedded systems that sense information about your vehicle and process is to produce various outputs. Let's take a look at just a few of these embedded systems and how they function:
 

  1. A sensor monitors fuel levels in your vehicle and a visual display tells you in real-time how much gas you have left and how far you can travel with it. When you're low on gas, the fuel light on your dashboard turns on.
  2. Embedded systems manage all of the lighting on your vehicle - running lights, 4-way flashers, brake lights, and headlights are all managed by embedded systems. In some cases, you're in direct control of the input - you manually turn your headlights on - but in other cases, sensors detect what you're doing and respond automatically - a sensor detects when you're braking and turns your brake lights on.
  3. Airbags in cars are controlled by an accelerometer, a special type of sensor that detects rapid changes in acceleration that happen during collisions. This information is fed to a microcontroller that instantaneously deploys airbags to protect driver and passengers in case of a collision.
  4. The GPS system in your car also works like an embedded system - it interfaces with satellites or a downloaded map of your area and processes information about your speed and location to give you directions.

Even traffic lights are controlled by embedded systems. They may change on a particular schedule, or use sensors to detect the presence of vehicles and adjust their timing to optimize the flow of traffic.
 

Embedded Systems at Work

By the time you get to your office building, you've already interacted with and benefited from multiple types of embedded systems throughout the day. You may even have provided the input for some of them, like a traffic light that sensed the arrival of your vehicle and stayed green for a bit longer, or you may have initiated your coffee machine's protocol for your favorite morning brew.
You won't be surprised to find that your workday is full of interactions with embedded systems as well.
The elevator that you take to your office floor contains an embedded system that optimizes the movement of the elevator based on what buttons are pressed. Elevators operate on a simple algorithm - they're either going up, or going down, depending on what buttons have been pressed, and they are programmed to move people between floors as efficiently as possible to limit energy consumption.
Calculators are one of the oldest and most commonly known types of embedded systems. A sophisticated calculator includes a high-performance processor that can complete many types of complex calculations based on user input.
Printers are often considered a peripheral or accessory for a general computing system, but printers contain their own embedded systems that perform a special function - reading the contents of files and printing them onto paper.
 

Embedded Systems at Play

Embedded systems are present in many different types of technology, including the ones that we use for fun or hobbies. A digital camera is a perfect example of how embedded systems have changed the way we produce art and how we engage with our hobbies.
The systems embedded in digital cameras serve three essential functions:
 

  1. Capturing Images/Data - This happens when you take a picture!
  2. Storing Image Data - Memory systems present in cameras allow today's models to store hundreds and even thousands of images at once. External storage modules can also be used to support further storage.
  3. Representing Image Data - Most cameras have digital screens where photographers can view images right away - there's no need to produce and develop film.

Today's smart cameras can even detect humans, faces, eyes, and other features in images, allowing the user to initiate algorithms that fix red-eye or change the appearance of lighting in the image.
 

Conclusion

We hope you enjoyed this article on how embedded systems impact your daily life. These systems are everywhere around us, and their modular components mean they can be customized in limitless different ways to serve many functions. What other examples of everyday embedded devices can you think of?

How Do I Best Choose Which Level of Cable Tester Applications to my Applications?

$
0
0

Question from the Customer:

I clearly have use for the Advanced Cable Tester. I will be testing USB cables and want to know if I need the Advanced Cable Tester - Level 2 Application if I am just testing Type-C USB 3.1 Gen 1 cables? What is the benefit of using the Level 2  Application?

Response from Technical Support:

Thanks for your question! The Advanced Cable Tester - Level 1 Application can be used for continuity tests such as detecting opens/shorts, measuring IR drop, and checking e-Markers for proper programming for USB 3.1 Type-C cables.

The Advanced Cable Tester - Level 2 application enables Signal Integrity testing.  The SI tests signal quality for D+/D– (480 Mbps) and all four SuperSpeed pairs (5 Gbps, 10 Gbps, up to 12Gbit/s), validates eye openings, and displays eye diagrams.

Essentially, Level 1 performs your safety checks and Level 2 adds quality checks.

For an easy comparison, here is a table that shows the capabilities of the Level 1 and Level 2 applications. Note: SuperSpeed represents USB 3.1. The maximum speed for the Advanced Cable Tester is 12 Gbit/s; the table reflects the USB standard speeds.

cable tester specificationsAdditional resources that you may find helpful include the following:

We hope this answers your question. Need more information? You can contact us and request a demo that applies to your application, as well as ask questions about our Advanced Cable Tester and accessories, and other Total Phase products.

Request a Demo


The Inside Story of Medical Equipment and Embedded Devices

$
0
0

The human body is a complex system. Engineers, scientists and physicians are doing their best to keep our systems running with embedded devices and medical equipment.

embedded devices and medical equipment
Paralysis may not be a permanent condition. 

When applicable, nerve stimulation and physical therapy are used to help the brain relearn how to communicate with an area where the nervous system was damaged. For more severe cases, specialists are looking into restoring the neural pathway with embedded devices.

embedded neural devicesource - allaboutcircuits.com

To help those with more severe neural damage, the Swiss Federal Institute of Technology (EPFL) is working on silicon neural implants to restore the ability to walk. The wireless device is implanted in a specific part of the brain, and decodes muscle movement as electrical impulses through the nervous system to the associated muscles.

So far, there has been success in lab trials to restore the abilities to again move hands and legs.  Having many positive results with monkeys that quickly regained the ability to walk, they hope to soon start trials with human beings, offering realistic hope to people who cannot walk today.

Since the bionic man of Six Million Dollar Man television show from the 1970s, Bionic Vision is becoming a reality.

vision and embedded medical devicessource – pixium-vision.com

Not long ago, the year 2013, Second Sight's Argus II received FDA approval for their retinal prosthesis. It was the first commercial device to restore some vision to those who suffered blindness from retinitis pigmentosa.  The benefits may seem minor to someone with full vision, but imagine going to a door by sight only, without a service animal’s guidance.  Today, the effects are more promising. Pixium Vision’s Iris II device helps restore partial vision.  The summer of 2016, Pixium Vision received CE market approval in the European Union.

Iris II consists of an implant and an external prosthesis. The implant connects 150 epi-retinal electrodes to the inner retina. Electrical impulses are sent from the headset’s camera to the retina. The pocket-held computer processes the signals that are delivered from the camera to the inner workings of the human eye.

Real-time data, with no refresh rates, provides a more realistic, real-time vision experience. Following the trend of technology, allowing upgrades and ongoing improvements, the Iris II is not a permanent as-is device. It can be easily replaced or upgraded as Pixium continues making improvements.

Pixium Vision is also working on a sub-retinal photovoltaic implant, to help restore vision from age-related macular degeneration.

With the intention to gain full approval to the market, Pixium Vision continues its trials.

Are there better ways to monitor and care for Diabetes, including Type I?

current glucose monitors

Either form of Diabetes, Type I or Type II, affects the quality of physical life. Type I takes additional care as the pancreas is incapable of providing insulin to control blood sugar levels. Continuous glucose monitoring (CGM) is also an option for those with Type 1 diabetes, but it doesn’t replace pricking fingers and using strips with blood glucose meter, typically 6-10 times a day. As individuals have their own specific needs, which can vary throughout the day and night, self-care is often trial and error. The wrong amount of insulin can be significant, even life threatening.

To ease the stress of how often, how much, and when to administer insulin, Beta Bionics has created an automated system, the iLet, that monitors blood sugar levels and provides insulin injections as needed.  For those with hypoglycemic issues, glucagon can be included with this system.

advanced meters for glucose source - betabionics.org

The iLet provides the function of a pancreas: distribute vital hormones when needed. It is a portable device that fits in a pocket, allowing the patient to see the readings. The results have been truly impressive, providing healthy, consistent levels that are rarely, if ever, achieved with manually using strips, meters and injections.

For a presentation about the potential benefits and accuracy of this device, watch Edward Damano, PhD.,  CEO of Beta Bionics, inspired by his son who has Diabetes I.

Currently, the iLet is limited to investigational research. Beta Bionics is continuing their research and trial studies to obtain FDA approval.

How do you monitor, simulate, program and interact with your embedded devices? Contact us and request a demo that applies to your application, as well as ask questions about Protocol Analyzers, Host Adapters and other Total Phase products.

Request a Demo

With the Right Tools, It Is Easy to Expand from Single SPI to Dual and Quad SPI Modes

$
0
0

Question from the Customer:

I’ve been using Cheetah SPI Host Adapter and Flash Center Software and they work really well together.  I have a new client and their new design includes Quad SPI – is there any way to use your high-speed Cheetah adapter for that project? What are my options?

Response from Technical Support:

Thanks for your question! The Cheetah SPI Host Adapter supports single SPI mode only. However, the Promira Serial Platform does work with Dual and Quad SPI.  We recommend using our Promira Serial Platform with the SPI Active - Level 3 Application, which includes support Dual and Quad modes.  The Promira platform also supports Flash Center Software, so you can continue to create and modify XML files as needed, as well as use our ever-growing library of XML files for various SPI devices.

You can also take advantages of additional high performance options available on the Promira platform including integrated level shifting, USB 2.0/Ethernet connectivity and other advanced features. You also have the option to select additional applications to use with I2C and eSPI devices, in addition to SPI.

Here’s a chart so you can compare the capabilities of the Promira platform and the Cheetah adapter.

Comparison of Promira, Aardvark, Cheetah and Beagle For an example of how to use the Promira platform, take a look at our knowledge base article Programming QSPI Flash Using the Promira Serial Platform and the Flash Center Software.

We hope this answers your question. Additional resources that you may find helpful include the following:

 More questions? More projects? You can contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

I need to capture high-speed eSPI traffic, what do you recommend?

$
0
0

Question from the Customer:

I’m trying to monitor eSPI traffic at 48 MHz. However, the method I’m currently using degrades the eSPI signals.  To get clean signals, the bus had to be slowed down to 8MHz before it was reliable again. Unfortunately, that does not support the functionalities that I need to verify and support.

In addition, I want to monitor at least two sideband signals along with the traffic. I see this option should be available with your Promira Serial Platform and eSPI Analysis Application – how is that done?

I have one last question about connecting to the system under test (SUT). I am concerned that attaching the 34-pin cable that comes with the Promira platform could degrade the eSPI signal. Do you have any other cables you could recommend to minimize the impact of attaching the analyzer to the bus?

Response from Technical Support:

Thanks for your questions! The Promira Serial Platform with the eSPI Analysis Application can monitor communication between an eSPI master and slaves up to 66 MHz with support for single, dual and quad I/O.  It works with our Data Center Software to stream all of the eSPI bus data to your PC in real time.

Promira Serial Platform eSPI Analysis Application

About sidebands - you can use the Virtual Wire channel to communicate the state of sideband pins or GPIO tunneled through eSPI as in-band messages. The Promira platform has 11 digital IO signals that can be configured as input or output signals.

  • Digital input supports inserting events into the data stream.
  • Digital output supports matching certain events as well as sending output to other devices, such as oscilloscopes.

This allows you to synchronize events (such as a Virtual wire channel transaction) on the bus with other signals you may be measuring. A digital input event (falling edge or rising edge) can trigger a capture. Digital output behavior can be configured as set low, set high, toggle from initially low to high, or toggle from initially high to low.

In addition, an eSPI Simple Match can also trigger a capture. A capture event can toggle a digital output pin for detecting a Virtual wire channel transaction. To simplify capturing data with filters and triggers, take a look at the Data Center Software.  If you choose to work with Promira API software, we also provide eSPI Active Example Files.

For signal integrity, the cable we provide is only 6 inches long to minimize signal degradation. We have other cables that can be purchased separately:

Additionally, the Promira platform allows for flexible cabling, meaning you can create a custom cable to fit your specific needs and attach it to the Promira hardware without opening the case.

We hope this answers your question. Additional resources that you may find helpful include the following:

More questions? More projects? You can contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

What Are the Best Tools for Programming 1.8v and 3.3v SPI Devices when Using a Flash Socket Board?

$
0
0

Question from the Customer:

I need to program 1.8V SPI devices with one of your Flash Socket Boards.

I reviewed the user manual for the Level Shifter Board, but it is not clear how to set the target voltage of the Cheetah SPI Host Adapter so that it is 5V when used with the level shifter and 3.3V when it is used with the Flash Socket Board directly. How can I best set up the 5V required for the level shifter, while ensuring that the SPI interface is still 3.3V compatible?

Also, using the Flash Center Software, I can see that the Promira Serial Platform allows the target voltage to be defined. Is there an advantage to using the Promira platform?

Response from Technical Support:

Thanks for your questions!  For your application, we recommend using the Promira platform and the Flash SOIC-8 Socket Board - 10/34. As both the Promira platform and the Flash SOIC-8 Socket Board - 10/34 support 1.8V and 3.3V.  You can connect the Promira platform directly to the Flash socket board - you will not need the level shifter board with this configuration.

 Promira Serial Platform SOIC Flash Board

About the socket boards:

  • The Flash SOIC-8 Socket Board - 10/34 is the latest version that supports multiple SPI signals logical levels (including 1.8V and 3.3V).
  • It also supports connecting directly to the Promira platform that also supports 1.8V and 3.3V via software (without a level shifter.)

The Cheetah adapter operates at high speeds up to 40+ MHz with SPI signals at 3.3V.  To use the Cheetah adapter with SPI flash at lower voltage levels, you can use the level shifter board to provide the required voltages.

The Promira platform is an advanced device with built-in level shifting that can function as either an SPI master or slave, as well as many other features, depending on which Promira Application you have licensed.

Here’s a table so you can easily compare the Promira platform (and Applications) and the Cheetah adapter.

Note: for Active - Level 2 and 3 Applications, the previous levels must first be licensed and installed on the Promira platform.

We hope this answers your questions. Additional resources that you may find helpful include the following:

More questions? More projects? You can contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

Which SPI Host Adapter Can I Use as an SPI Slave that Delivers a Large Enough Response for My Setup?

$
0
0

Question from the Customer:

The lab has a Cheetah SPI Host Adapter. It works great as an SPI master, but for the current project I need an SPI slave that can transmit at least 256 bytes. Unless there’s a way the Cheetah adapter can be programmed as a slave, what do you recommend? I’d also like these other details about your recommendation.

  • Do you have any code example or application software for using the host adapter as a SPI slave to transmit a data file to a SPI master?
  • What is the buffer size inside the adapter for receiving MISO bytes?
  • What is the max clock rate when operating as a slave?

Response from Technical Support:

Thanks for your questions! We have two host adapters that can operate as SPI slaves as well as SPI masters, the Aardvark I2C/SPI Host Adapter and the Promira Serial Platform.  The Cheetah adapter only operates in master mode. For your application, we recommend the Promira Serial Platform, which can deliver 256 bytes in SPI master mode.

promira-insets

The Aardvark adapter is a general purpose device that can actively communicate on an I2C or SPI bus as a master or slave.  For the SPI Slave capability, the Aardvark adapter supports speeds up to 4 MHz.  The API receive buffer size is 16 Kbyte and the slave response size is 64 bytes, smaller than what you are looking for.

The Promira platform is advanced tool, capable of acting as an SPI Master or Slave with the SPI Active Applications.  Here is a summary of the features of the SPI Active applications:

  • Single/dual/quad SPI master up to 80 MHz
  • Single/dual/quad SPI slave up to 20 MHz
  • 2 MB receive buffer
  • 256 byte slave response size
  • Level shifting 0.9 V – 3.3 V
  • USB 2.0/Ethernet connectivity

You can use the Control Center Serial Software, which provides easy access to all the functions.  For more detailed control, you can also use Promira Software API I2C/SPI Active. Here is an overview of using the Slave Set Response API function (ps_spi_std_slave_set_resp) for sending a response in SPI slave mode:

  • If the ps_spi_std_slave_set_resp function num_bytes parameter is 256, and the SPI master requests 256 bytes from the Promira slave, then the Promira platform will send 256 bytes.
  • If the ps_spi_std_slave_set_resp function num_bytes parameter is 512, and the SPI master requests 512 bytes from the Promira slave, then the Promira platform will send the first 256 bytes twice in the data_out.

For more information about API functions, please refer to Promira API Documentation.

The following table provides a quick overview and comparison of device features:

Comparison of Promira, Aardvark, Cheetah and Beagle

We hope this answers your questions. Additional resources that you may find helpful include the following:

 

More questions? More ideas? You can also contact us and request a demo that applies to your application, as well as ask questions about the Promira Serial Platform and other Total Phase products.

Request a Demo

Viewing all 822 articles
Browse latest View live