2015年6月29日 星期一

The fast-growing M2M market presents a series of wireless design challenges (part 1)

When selecting wireless modems, there's a checklist of features to consider. We've presented those here.
The growth rate of machine-to-machine (M2M) connections now far exceeds new connections between people, and soon there will be many more machines than people connecting over cellular industrial computer networks, as shown in the GSM Association forecast in Figure 1. These in-vehicle system include security systems, meters, robots, vending stations, asset trackers, and emergency call systems. The variety is growing by the day, as are the silent conversations between millions of machines exchanging data 24 hours a day, 7 days a week, with no human intervention.
At the same time, it's becoming cheaper and easier to connect to fleet management the Internet and even mass produced computing devices are able to gather and process ever-larger volumes of data. The one potential bottleneck to greater M2M connectivity, the fact that all 4 billion+ IP version 4 (IPv4) addresses are already allocated, has been removed with the introduction of embedded system. This supports 2128 addresses, more than enough for every grain of sand on Earth to have its own address. It's perhaps no surprise then that LTE, the fourth generation of mobile networks (4G), is designed to deliver services such as data, voice, and video over IPv6.
To join the M2M in-vehicle system revolution, all that's needed is to embed machines with small, economical (wireless) modems. Where location, speed, or navigation information needs to be established, the machines also need a GPS or GNSS (Global Navigation Satellite System) receiver. Both industrial computers, with an antenna, can fit easily in a device smaller than a mobile phone. GNSS is the standard generic term for satellite navigation systems that provide autonomous geo-spatial positioning with global coverage. It includes GPS (U.S.), GLONASS (Russia), Galileo (Europe), BeiDou (China), and other regional systems.
When thinking about how to equip an embedded system with communications capability, start by thinking about the needs of the application. Factors such as industrial computer longevity, geographical network coverage, or future-proofing to take account of future wireless network upgrades, are all important considerations. Here are some of the product features to consider when selecting wireless fleet management modems.
refer to:
http://embedded-computing.com/articles/the-fast-growing-m2m-market-presents-a-series-of-wireless-design-challenges/

2015年6月22日 星期一

Acrosser Launches Its Latest Fanless 35-mm Vehicle Computer: AIV-HM76V1FL

ACROSSER Technology, a world-leading vehicle PC supplier, announces the launch of its 35-mm-high fanless in-vehicle computer, AIV-HM76V1FL. This ultra-slim car computer, equipped with an Intel® Core™ i7-3517UE processor, enables unparalleled computing performance for vehicle applications.
Capable of BIOS modification, AIV-HM76V1FL provides significant flexibility for power management applications. For system integrators, the default power on/off value of the vehicle can be customized based on task requirements. For advanced in-vehicle infotainment service applications, Acrosser’s AIV-HM76V1FL includes two HDMI connectors for digital output, and one combo cable for analog output.
The two optional Mini PCIe modules are designed for wireless communication.  If equipped with a 4G LTE module, this fanless on board computer makes an excellent solution for developed markets where high-speed telecommunication services are well-established and widely used. A versatile set of I/O features includes four COM ports, four USB slots, and 9-32V wide voltage compatibility. The design includes a SIM slot on the side of the device to enable easy SIM card installation without opening the case, alleviating the task load of your technical team.
Product Information:
Ultra Slim In-Vehicle Computer: AIV-HM76V1FL
Receive a product quote RIGHT NOW!
http://www.acrosser.com/inquiry.html
Subscribe to our social media sites and stay connected!
Acrosser Twitter
Acrosser Facebook
Acrosser Google+
Acrosser Youtube

2015年6月15日 星期一

Acrosser Kicks Off Sale of Its Latest Ultra Slim Vehicle Mount Computer Sale

ACROSSER Technology, a world-leading in-vehicle computer supplier, is pleased to announce the kickoff of a presale event for its latest ultra-slim vehicle mount computer, AIV-HM76V1FL. Acrosser has been an expert manufacturer of in-vehicle computing solutions for nearly a decade. For 2015, Acrosser is releasing its first slim Vehicle mount computer, AIV-HM76V1FL, to fulfill the growing market demand for a thinner hardware platform.
The detailed specifications for AIV-HM76V1FL have been released on the Acrosser Web site. A limited number of samples will be available in early June, and we urge all customers to make a quote for a sample soon! The versatile, ultra- slim AIV-HM76V1FL fits easily into any vehicle no matter the size, ranging from taxis, police cars, ambulances to fire fighter trucks, heavy duty trucks, buses, construction vehicles and trains. Taking real-time environmental factors into consideration, AIV-HM76V1FL was built to perform under a variety of road conditions, including road bumps and unexpected vibrations. Acrosser will have a live demo of the product available at Computex 2015. To experience this product’s shock and vibration endurance firsthand, come visit us at Computex 2015, located at Booth K0409a in the TWTC Nangang Exhibition Hall. Acrosser’s rugged vehicle platform can withstand any challenges and fulfill all of your vehicle computing needs. Stay tuned for our upcoming product launch press for a full introduction to this amazing in-vehicle computer!
Receive a product quote RIGHT NOW!
http://www.acrosser.com/inquiry.html
Product Information:
Fanless Ultra Slim In-Vehicle PC / Car Computer: AIV-HM76V1FL
Subscribe to our social media sites and stay connected!
Acrosser Twitter
Acrosser Facebook
Acrosser Google+
Acrosser Youtube
#acrosser #In-Vehicle Computer #Industrial PC #AIV-HM76V1FL #Computex 2015

2015年6月8日 星期一

The case for security in Linux-based IoT devices (part 1)

Are you among the embedded system OEM and software consultant adding Internet connectivity and services into devices that were not originally intended to do so? If you are, then you know that by connecting these products to the Internet, customers are discovering new forms of revenue and, in some cases, entirely new business models. What's more, they are able to make their current products both more valuable and cost-effective.
As we continue to see more Internet-connected devices, we must acknowledge that they will be vulnerable to attack, remotely disabled, or compromised in some other undesirable way – each scenario seriously threatening the entire underpinning of these new business models.
Consider the following example in the world of home automation. It is one of the biggest consumer applications for the Internet of Things (IoT), and potentially one of the most lucrative for attackers. What could a criminal do with information stored in what might be considered a rather harmless home-automation device like an IP-connected smart thermostat? Well, these devices are built to learn your habits. They are designed to recognize or "learn" when you are home and when you are away, so that they can optimize the industrial computer used to heat and cool your house. You can guess where I'm going with this. They'll know your habits and track your routines – sensational fodder for someone thinking about stopping by uninvited.
Remember the case of the Samsung Smart TV? In order to be able to respond to voice commands, it constantly "listened" to your chatter, interpreted it, and then might even send it to "authorized" third parties. Yes, I am serious. The Smart TV was demonstrated to be hackable (what isn't without lock down security) back in 2013. This is a perfect example demonstrating the need for multiple embedded system accessibility levels. In the in-vehicle system case, there was only one user account possible, and that user could access anything on the device[1][2].
Security through obscurity
In many past instances, product developers would rely on the fact that their in-vehicle system devices were too few and too uninteresting to hackers to attempt to exploit them. In other words, these devices were obscure – ostensibly unknown nodes on a network. Unfortunately, this strategy will no longer work. With what is expected to be billions of devices connected to the Internet in next five years (with tremendous variety of functionality), these once "no interest" devices will become quite tempting as targets for exploit.
To address how security by obscurity will no longer work, let me offer an example of how a website is being used to search for Internet connected devices: www.acrosser.com
refer to:
http://embedded-computing.com/articles/the-case-security-linux-based-iot-devices/