Draught is worse than ever, and overwatering wastes scarce natural resources. Zenseio IoT products help our customers in Oregon and Washington State to reduce water use.
Our friends at Multitech remind us about impending 2G/3G sunset with the US carriers.
Replacing the cellular-based sensor infrastructure takes time and good planning. Don’t be caught off-guard.
LoRa is a proven, low-cost alternative to LTE, especially for Smart Ag applications. Zenseio has had LoRa sensor solutions deployed on fields for the last year, and customers are happy to dramatically reduce their recurring connectivity costs.
If interested, drop us a line.
What will happen when you lock a bunch of hackers, entrepreneurs, and mentors into a room for two full weekends, give them powerful tools, dangle a valuable prize, and ask them to come up with an idea for an industrial IoT product? This was an experiment masterminded by my dear friend from college days, Tahir Hussain, who heads a tech accelerator – Collide Village in the Dallas metroplex. And, it was executed just recently.
On a fall afternoon last year, Tahir told me about his hackathon idea and asked me to provide mentorship as well as to sponsor Zenseio IoT hardware for the event. He was lining up the leading IoT companies as partners and successful local businessmen/entrepreneurs as mentors. It sounded like an interesting idea, so I jumped on it without hesitation. More info
Researchers just published a startling discovery we’d never want to read about. It turns out that 100 Million Volkswagen vehicles sold since 1995 can be relatively easily hacked to open doors wirelessly without having the key.
It turns out 100 million vehicles used only a handful of private shared keys. Once a single private key is breached, millions of vehicles are compromised. The way cryptography based on Pre-Shared Key (PSK) works is that two devices (a vehicle and a key fob, in this case) share a secure private key that was programmed at a factory or at a dealership. This private cryptographic key, along with a rolling code are used for encrypted wireless transmission of authenticated commands to open/close doors.
Ever heard of the “epoch time”? I’m not talking here about history periods or geology. Epoch time is simply a standardized time and date reference used in UNIX and many other computers. It defines time, measured in seconds, starting from January 1, 1970 epoch. This is based on an arbitrary, somewhat historical epoch, but, what matters is that it is a commonly followed standard. More info
- IoT Sensors include three fundamental functions: sensing, communication, and power supply, as well as additional functions: processing/system management and user interface
- IoT application is determined by the types of sensors, cloud connectivity, power sources, and (optionally) user interface used in an IoT sensor device
- It is possible to realize a variety of IoT applications with a single IoT sensor hardware platform by employing appropriate functional modularity and interface abstractions
- An application processor and well defined interfaces help abstract functions for versatility and ease of use
- Cost-effectiveness is very important for sensor devices
- In IoT, cost effectiveness is a system-level, not a component-level, optimization
- Full-custom versus semi-custom versus off-the-shelf hardware is an complex application-specific tradeoff to be made
- Hardware prototypes are far from deployment-ready
- IoT sensor productization is an often overlooked, complex, specialized task that drastically impacts time-to-market and cost
- “Hardware is hard” is not a cliché, especially for highly reliable industrial applications
- Security is critical for IoT
- End application defines security policy requirements
- Security is weak if device crypto key are not well protected in IoT devices
- Best-in-class security policies for IoT sensors are achieved with tamper-proof hardware crypto key management
- Easy to use or die
- Using off-the-shelf components/boards is mighty hard
- Ease of use needs to be matched to a user’s desire for flexibility
- Ease of use can be provided for by a system based on best proven, popular software frameworks
- Battery replacement impacts the bottom line
- Power efficiency reduces operating expenses
- Energy harvesting eliminates battery replacement
- Power efficiency enables new energy sources, miniaturizes size, and slashes cost
- Power optimizations is an expert domain
With my two decades of experience designing complex electronic systems as well as recent two years focused on building IoT systems and solving System Integrators’ pain points, several key characteristics became evident to me that define the best-in-class industrial IoT sensor devices:
- Power consumption efficiency
- Ease of use
- Industrial deployment readiness
- Cost effectiveness
Now, I will cover each consideration in more detail. More info
The previous article – “What Are IoT Sensors?” – gave a high level overview of IoT system, now let’s drill down to what are IoT sensor devices.
- IoT sensors are necessary components of any IoT application
- Consist of sensors combined with communication capabilities
- Many different types of sensors exist
- Wireless communication is key to new applications
- Multiple wireless standards exist since no one size fits all
- Need a way to abstract application from sensing and communication methods
Internet of Things (IoT) is such an overloaded term that it can mean many things to many people or nothing at all. The purpose of this series of articles is to explain what some of these popular terms mean in the context of the latest technologies. Then, I will segue into something much more valuable to learn about – the anatomy of (IoT) “things”, how they fit into the larger Industrial IoT landscape, and what are the key considerations for connected sensors (“things”), especially as they relate to industrial applications. More info
Last week, Ed Hightower gave an excellent high-level overview of popular Low Power Wide Area Networks (LPWAN) and Smart City initiatives, including what’s going on in Dallas area. You can watch the recorded presentation below.