Embedded World 2019 Flashbacks

If you want to keep in touch with the newest trends in embedded systems, Nuremberg Embedded World is the right place for you. In order to heighten your expectations, we want to share our impressions on the latest event.

More and More Chips

This year the embedded market has undergone a serious segmentation of chip manufacturers. One of the main event threads was producing chips for the deep learning and their implementation.

For instance, Nvidia’s video chipsets and their end devices for video cameras. Qualcomm in cooperation with NXP, which is famous for the achievements in vehicle automation, also follow this trend.

Companies that specialize in producing power efficient chipsets also participated in the event. A large variety of solutions with up-to-date FPGA and DSP onboard were introduced as an alternative to the standard CPU. For example, one company, produces chips with long life period for voice recognition that are as small as a pencil point, respond to certain activation words and word phrases, and has extensive battery life.

Foggy Calculations

Teradek attracted a lot of attention with the solutions based on peripheral calculations (also known as fog computing) that make the system more stable and independent from network environment and its quality. The main principle of this approach is making all the calculations on edge devices, excluding any cloud interference, that accelerates the process as there is no delay in receiving and processing the information. This approach reduces price and improves the data transfer security. Developers are now presented with a wider range of opportunities. For instance, such type of solutions can be used for elderly care without the need to install IP cameras that send the video stream to the external end user, as all the necessary information is processed and distributed to the assigned person right here and now.

Another company that uses such type of approach is Elite Vision that produces cameras with high accuracy for manufacturing facilities. They introduced camera with in-built computation module that processes the signal and provides the user with an end result of its computation. The device can be used for counting objects, scanning QR-codes, analyzing road traffic information or in any classification processes.

Such events encourage companies working in the same sphere to start new cooperation and partnerships. In that spirit, DSR is looking for camera and server station manufacturers for joint solution development.

Weapon Detection System in Public

DSR demoed a system for detecting any weapon or another predefined object (for example, products in a store) in the hands of people in a crowd. This system recognizes people and focuses on their hands. That is its peculiar feature. This product can be used for searching for people with a weapon in their hands in a small crowd. The small, power efficient chipset guarantees a long battery life period of the device and allows it to transfer the computed data and video via different types of wireless networks. This implementation of the fogging is unique because it removes the necessity of transferring data using expensive traffic. The algorithm consists of 2 neural networks: first one is responsible for identifying the wrist; the second is in charge of recognizing the object it is holding. We created a new set of data for machine learning, taught the system to accurately analyze the data, optimized the architecture and chose the right framework.

What’s Inside

In the core of the solution is the goal to make devices with such analytical power more power efficient and available to a larger number of customers without dependency on expensive hardware. That’s why our choice for a cheap machine learning device is dragonboard 410 powered by Quad-core ARM® Cortex® A53 CPU and Qualcomm Adreno 306 GPU with WiFi, Bluetooth and 3G/4G modules. Due to differentiated Quadcore CPU and GPU the development board is capable of processing several parallel tasks locally.

In addition, the system contains an Ethernet video camera, a switch, and a display. We also utilized a high performance VGA adapter produced by Nvidia and AMD for deep machine learning. Although this hardware set up meets the system requirements, its cost is still not optimal. Similar solutions are rumored to use hardware that can heat a small apartment, especially once the price of cryptocurrency falls.

This development is deep in the middle of Computer Vision – a self-learning system that is capable of learning on examples of types of weapons and human movement patterns. We are working on evolving the solution to utilize it in the area of video surveillance and public safety.

Self-Sovereign Identity

DSR has been working in the area of Blockchain for some time now and we are honored to be involved in the development of Sovereign Identity. As a follow up on a recent Blockchain meetup we organized, we wanted to share information on revolutionary concept of Self-Sovereign Identity, a practical and real application of Blockchain technology.

Identification

Human beings face the identity issues a million times during their lifetime. Passports, diplomas, driver’s license, certificates, and so on help us prove our identity and abilities that we possess. We graduate from university and get a diploma. After passing a Microsoft exam, we get a certificate that proves our qualification. But what can happen if the society is overwhelmed with information? How can we differentiate what information can be trusted and what is falsified?

When a new account is created in a social network, the system and other users identify new account as an authorized one and begin to trust it accordingly. On one hand it’s great, but on the other hand, the system can bump into serious security issues of fake information provided by the user or a third party’s identifier. Who can we trust in this case? Leader’s opinion? The Authorities? Those who establish identities?

Personal information is considered one of the most valuable goods nowadays. Many are stealing, trading or using the information to influence and manipulate other people. So, the question is can we really trust our information to such kinds of establishments?

As a result, Self-Sovereign Identity (SSI) is created to solve these exact issues and also meets all the GDPR requirements.

Self-Sovereign Identity

The main purpose of identification is to answer the question: “Who are you?” The evidence confirms the information to be true. We all know what a passport looks like. That makes it hard to forge. Self-Sovereign Identity is a new concept that provides a user with a unique independent ID. This is the way to secure your personal data according to the GDPR principals. For instance, the new digital SSI identity model stores a number of public keys and ID numbers corresponding to the concrete private data the user wants to share. The system gets rid of necessity of storing an enormous number of passwords that can be stolen, manipulated and misused.

How Exactly Do Users Control Their Data?

Good question. Let’s work it out. There is no data stored in the blockchain. We have only pseudonymous identifiers (DIDs), pseudonymous public keys, and agent addresses. This enables the exchange of any private data to happen entirely off-ledger. The user (a person or a company) that stores the private information spreads it in a number of entities that get their unique identification numbers.

For instance, user can keep the information about the passport and educational background in different entities. When the government institution needs some approval, whether the user is authorized for a particular service, it sends a request containing the unique identifier and the public key issued for this request. On the user’s behalf he/she receives the notification about the organization’s request containing another pair of key and identifier for disclosing the required information. If the user accepts it, the establishment is allowed to get the information needed and the user, if it’s valid, is granted with required permission. From the application user’s point of view he/she clicks on the button and receives a dialogue box with the accept/decline options. After it, the information shared or protected accordingly.

This truly puts the individual in charge of their personal data and gives him/her the control to choose who else has access to their information and how. Some of the progressive official institutions are trying to implement this new technology. For instance, e-governance in British Columbia, Canada.

 

10 Principles of SSI

  1. Existence — Users must exist independently.
  2. Control — Users must control their identities.
  3. Access — Users must have access to their own data.
  4. Transparency — Systems and algorithms must be transparent.
  5. Persistence — Identities must be long-lived.
  6. Portability — Information and services about identity must be transportable.
  7. Interoperability — Identities should be as widely usable as possible.
  8. Consent — Users must agree to the use of their identity.
  9. Minimization — Disclosure of claims must be minimized.
  10. Protection — The rights of users must be protected.

In short, Self-Sovereign Identity provides the best solution to the challenges of digital identification:

  • Based on the open source code and standards
  • Decentralized system (“Blockchain”)
  • Stores private data outside the public ledger
  • Selective Disclosure by default
  • Pairwise-pseudonymous identifiers
  • P2P network of distributed private agents

Our teams are working on the open source SSI version called Hyperledger Indy. We are developing a blockchain for distributed data and keys storage. We also share our experience by organizing meetups on this and related topics. One of the aims is to create a strong blockchain developers’ community in Voronezh.

Learn more about the new secure way of sharing private data | Sovrin Foundation | Evernym

World Ruled by Robots?

“What’s New in the World of Artificial Intelligence?” asked me Alexa….

Some people believe that artificial intelligence does not exist, while others watch Sci-Fi movies and devise survival plans for when robots rise against us. Artificial intelligence today is weak, meaning many of the tasks and operations being performed now are limited in scope, but that is continuing to change every day. The development of AI is building at a rapid pace and is poised to change how we interact with the world around us on a daily basis.

Recently, with the help of artificial intelligence, companies are beginning to solve individual niche issues.  For example, emails and responses can be automated in the workplace, reducing the need for human attention. Self-driving cars are operating independently and more safely, reducing the number of accidents on roads. Experts have even predicted that in 10 years self-driving cars will be a normal reality in the US, along with radical organizational and cost structure changes for transportation companies like taxi and bus services.

Social networks, neural networks, and learning algorithms… Russian search engine Yandex is currently conducting closed testing of a new social network using AI and neural networks. Access is only available by invitation of someone who already exists on the network. By tapping into AI and neural networks, you are able to find completely new friends solely on the information you have provided to the system. The algorithms are configured so that you see people based along your selected features. Interestingly, the development with the use of artificial intelligence began to appear in areas such as beauty, cosmetology, and health.

Other large companies continue to use artificial intelligence to help predict events. Mobile operators can analyze the behavior of subscribers in order to offer services that will help improve the user experience, while other applications of modern development are aimed at helping users make decisions.

Google, Siri, Alexa, Cortana, Alice, how many virtual assistants can you remember?  There are many others, but these are some of the most popular we see today. Each of these assistants can allow you to do basic searches, analyze or processes information, but the fact remains that each assistant relates back to weak AI. Just think about how many times you’ve tried to talk humanly and gotten a response that didn’t quite seem to make any sense.

So why don’t we see strong artificial intelligence?  Well, why grow an artificial tree, if you can grow the present faster and cheaper?  Perhaps humanity doesn’t need strong AI just yet.

We are going to continue to dive deeper into this subject in our next issue. In the meantime, please remember that not all robots can be correlated with artificial intelligence. If you have a floor cleaning robot at home, this does not mean that it can study neural networks, collect or process your personal data.

Nordic Chooses DSR & Wins

Nordic Chooses DSR & Wins

DSR Corporation announces its partnership with Nordic Semiconductor. DSR’s ZBOSS 3.0 Zigbee 3.0 software stack is part of the Nordic offering for the multiprotocol nRF53840 SoC.  ZBOSS software was formally certificated by the Zigbee Alliance in September of 2018 as a Zigbee 3.0 compliant platform.

Satisfied Clients

“We are very satisfied with the choice of the Zigbee 3.0 solution vendor for our nRF52840 multiprotocol System-on-Chip (SoC),” says Nordic’s Pär Håkansson, Strategic Marketing Manager. “DSR Corporation has proven itself as a highly reliable partner, working closely with Nordic to make joint production quality software. We appreciate DSR’s professionalism, teamwork and extensive experience in software engineering and Zigbee to help us deliver a new solution to the market that will broaden Zigbee reach around the world.”

What`s Inside

nRF52840 is designed around an Arm® Cortex-M4 CPU with floating Point unit (FPU) and provides the ability to support complex and demanding applications as a single chip solution. Implementation of Zigbee in the nRF52840 SoC expands Nordic’s already broad portfolio of mesh networking solutions for smart home, industrial, and enterprise industry.

DSR’s ZBOSS 3.0 is a cross-platform, high-performance Zigbee 3.0 software protocol stack implementing Zigbee 3.0. ZBOSS 3.0 is highly interoperable and has been used as a Zigbee Pro compliant platform for several chipset solutions. ZBOSS 3.0 is a market-proven product that is used to provide interoperability between 200+ products at more than 40 companies.  ZBOSS 3.0 allows all devices roles and provides extensive support for various cluster libraries.  User-friendly, high-level APIs support fast creation of applications on a predictable budget.  Built with a fixed memory footprint, ZBOSS does not use dynamic memory allocation, which leads to predictable memory budgeting.  Lastly, an important stack feature is optimized power consumption: ZBOSS interrupt-driven I/O improves battery consumption and excludes polling. Additionally, ZBOSS utilizes low RAM capacity on the target device with a special technique in handling data structures.

Worldwide Acceptance

Following the launch of this product, we are happy to announce that Nordic’s advanced Bluetooth® 5/Thread 1.1/Zigbee PRO solution won “2018 Product of the Year”. The nRF52840 chip was named winner of the “RF/Microwave” category by Electronic Products Magazine, which has been an industry icon for more than 40 years. We are both excited for Nordic and honored that they selected us as a trusted technology partner.

Thoughts After CES 2019

CES 2019 at a Glance

Every year we make our way to CES (Consumer Electronics Show) in Las Vegas for the annual consumer electronics exhibition. Imagine over 4,500 vendors presenting new ideas and technological developments spread across an entire week — it really does give a whole new meaning to the city of lights. CES presents a great opportunity to meet like-minded individuals in similar fields, or different, helping catch new ideas, contacts, and ideas – it’s wonderful here.

The history of CES began over 52 years ago with organizers showing more progress each and every year. With the main theme being innovation and information technology, the width of coverage is vast:

  • Robotics,
  • Artificial Intelligence,
  • Three-dimensional Printing,
  • Design,
  • Drones,
  • Sport Technologies,
  • Smart Home,
  • Family & Lifestyle,
  • Virtual Reality (VR),
  • Games,
  • Unmanned Vehicles,
  • Music,
  • Entertainment & Content,
  • Cryptocurrency,
  • Internet of Things (IoT),
  • and Machine Intelligence.

 

All About IoT

The beginning of the year confirmed that IoT is coming to the mass market.  Focus has shifted from smartphones to other smart devices — and manufactures are taking notice.  Improved air quality sensors, door positions, windows, just to provide a few quick examples.  There are even smart window systems being developed that can inform the home when a window is opened wider than an indicated gap, for example.

Consumers can now choose between a wide variety of smart devices and systems, putting real pressure on manufactures and companies to advance smart home ecosystems. But the problem doesn’t just end there. Consumers need a way to connect many different smart devices to a single system – easy management.  This is where Zigbee and other wireless technologies flex their strength; gateways with multiantenna and customization service suggestions come to the rescue.

Hi Computer, Talk to Me

Voice automation control becomes more the norm than the rarity.  It falls into many devices and almost everyone has them now. People want to have a voice assistant in their home, in the office, and in the car, like Jarvis from Iron Man. Project recipes from the Internet to the kitchen door by voice request?  Yes, please!  Yet, even Alexa from Amazon or Google-assistant do not always suit as a compromising option.  Artificial intelligence is poised to grow wiser and communicate with people better and faster.  Companies that once winced at the idea of software in their products are now flocking to CES.  For example, Procter and Gamble – L’Oreal, are developing mirrors that can look at your face to determine if your skin needs support or treatment.  Maybe just a care cream?  Cameras take pictures of the users face and follow changes of the face in real time.  Maybe they’ll even notice skin cancer in due time.

It is interesting that companies that are seemingly far from “software” come into the sphere of technology.  These companies expand the development zone to such wide branches like automation for pets, children, sleep, and beauty.  There are even smart leashes and collars!  People even get interested in buying devices that can distribute pleasant smells throughout their homes.  And what if you could connect a device that could command three-dimensional TV? Cars? Batteries? Spotify on your steering wheel?  The ideas and possibilities are endless.

Robotics help businesses change their models.  It is especially gratifying that companies competing in the past are starting to cooperate.  To denote such activity, the new term ‘coopetition’ has appeared.  ‘Coopetition’ should bring even greater breakthroughs in overall development.  Teamwork gives rise to new achievements.  SDKs help bring the product to market.  Quick starts are real.

Meet & Talk

DSR had a lot of productive meetings with existing and prospective clients and it was the most successful CES to date. DSR was also a proud  sponsor of the Zigbee Alliance Social – an invitation only event that was a great opportunity to bring all of the members together in one location and celebrate Zigbee successes from 2018. During this event, Zigbee Alliance announced several of the new developments and expansions of the standard and also unveil the location of the next member meeting. The atmosphere for the event was very warm and inviting and perfect for conversations and celebration.

In Closing

Here are seven key CES 2019 takeaways that caught our attention:

  • IoT is finally an emerging mass market (and the data it gathers has lots of financial implications)
  • Amazon and Google are in “hand-to-hand combat” driving voice technology into the Smart Home and beyond
  • 5G, NB-IOT and Cat-M1 are expanding battery-powered WAN connectivity in amazing ways
  • Drones—from airborne to underwater to John Deere—are becoming platforms
  • Robotics are creating business change
  • Artificial Intelligence is getting smarter
  • “Coopetition” is happening in lots of places

IoT is moving capabilities out of smart phones and into different smart things. People want their homes, cars and offices to have a voice like Jarvis (see the Ironman movie franchise). And not everyone wants Amazon Alexa or Google Assistant as the go-between. Battery-powered WAN connectivity in a variety of speeds is making the cloud easier by “losing the gateway.” Drones and robotics platforms are giving new capabilities to businesses and consumers. Artificial Intelligence (“AI”) is changing the way products and services interact with humans. And if Apple and Samsung are teaming up, is it time to evaluate how “coopetition” might help your 2019 business goals?

What is Dotdot?

What is Dotdot?

A bit of history — the creation of Zigbee standard required a lot of effort, time and knowledge to construct. Dotdot is an alias for ZCLIP, which stands for Zigbee Cluster Library (ZCL) over IP. It is about exposing ZCL functionality to the IP world, in contrast to classic Zigbee that is always isolated from IP networks and requires a Zigbee gateway to connect Zigbee mesh with the outer world. This would become a bridge between IoT and other networks. Different manufacturers have Zigbee Gateway solutions mostly for connectivity of Zigbee network with cloud.

In classic Zigbee there are all instruments for organization, self-organization, restoring and stability of the network. Above all of this sits the Cluster Library, which calls functions allowing the clusters to communicate. Although, there is one short fall with this system – it cannot get online. With ZCL exposed to IP, it becomes possible to establish a direct communication channel between Internet/Intranet application and Dotdot device when border device remains transparent for and unaffected by the details of communication. The same way communication between Dotdot devices located on different networks is also possible under condition that device services are properly advertised across network borders or devices appear bound by means of a third-party application.

New Language: Old Terms, New Sense

Dotdot is a standard that allows you to put ZCL on any “rails” other than Zigbee – WiFi, Thread, and so on.  This is an add-on for Zigbee.  An application level protocol that allows smart devices from closed networks (with addresses) to communicate more openly through the address space that is on the Internet and other networks.  It is important to not just reach the device itself, but also to address the command to a specific cluster within, and do so securely.

 

Figuratively, Dotdot receives commands in one language and translates them into a language understandable for smart devices.  This makes smart devices ecosystem more open.  Dotdot uses the Zigbee approach in ZCL and has extended it to other types of transports as well. The mesh built for some Dotdot solution deployments is not mandated to contain only Dotdot-compatible devices.

The Commissioning Application

The Dotdot commissioning application was developed next to and based on Thread that was taken from the official Thread Commissioning App mostly as is, courtesy of the Thread Group. The application allows managing the expansion process of the Dotdot network. Seamless integration of the parts and stabilization of Thread for both mobile platforms was also performed.

This application allows third-party devices to enter, which is critical for maintaining network security.  The top layer works with Dotdot enabled devices over Thread. Thread is responsible for commissioning new Thread enabled devices to the home network and discovering devices that are already there. Dotdot makes use of device lists from Thread and as a result uncovers Dotdot enabled devices and their services. The system interrogates the device, finds what services and clusters are running, on which endpoint, and which commands support the device, allowing for a complete picture of the device’s capabilities.  Once this is completed, you are able to change the attributes and send commands from the application itself.  There are clusters, attributes, bindings and reporting.

Why Should Companies Implement Dotdot?

Speed. Abstraction. Interoperability. Dotdot provides the opportunity to create applications in a more flexible way. This is because Dotdot solutions use “generic” border routers that are standard, easy replaceable even at run time, and are not a “single point of failure.” The same data model is provided for different IoT technologies, despite what protocols are used to send data (WiFi, BLE, Zigbee, Thread, and so on), this means there is a wider market for solution spread. You can create a wider IoT system where all the devices understand each other. This creates an easier entry point for companies to develop solutions and allows application developers to focus on the application and functionality, without delving into the underlying specifics of a particular wireless network.

How to Get Started

  1. Download an SDK from a company that provides the solution.
  2. Study the provided API and Zigbee clusters description. Find the needed clusters and start own device (certified by Zigbee Alliance) implementation.
  3. Gain access to the Dotdot Commissioning Application.
  4. To accelerate your development, engage a company with experience in Dotdot and wireless technologies.
  5. Lastly, consider becoming a member of the Zigbee Alliance (if you are not already) to get access to even more tools and become involved in the development of IoT standards.

8 Things to Know Before Choosing a Contract Software Developer

Introduction: Balance = Profitability

To operate profitably in today’s economy successful businesses must balance market conditions with product/project opportunities and available development resources.

Many companies attempt to achieve this balance using contract software developers—some realizing more success than others.

This white paper identifies eight things successful companies consider when choosing a contract software development partner. Understanding them can mean the difference between profit and loss—and between your project’s success and failure.

1. Successful Contract Software Developers Have (and Hit) a Schedule

If you’re investigating a contract software developer, your project probably already has some schedule risk. If you miss your schedule, you fail. Turning over development to a contract software developer who can’t answer schedule questions is a sure-fire recipe for you missing your schedule.

So, choose a contractor who asks you lots of detailed questions about your schedule and deliverables before taking the job. Then, you ask them about the tools they use to plan development work and allocate developer resources. Ask to see those tools with live data from a current project. Look for how detailed those plans are. Since you will often be paying by the hour, the tools the developer uses should provide scheduling and resource usage to the hour.

If they have this, they will likely hit your dates.

2. Successful Contract Software Developers Commit to Your Budget Requirements

Companies large and small have been victims of “outsourcing hype”—the promise of cheap engineering at a fraction of the cost of hiring and using your own employees. While the hourly rates were low, the number of hours spiraled out of control. The result—“outsourced” projects come back (too often significantly) over budget, and late as well.

When your budget can’t slip, and you can’t afford any surprises, look for a contract software developer who can bid the work in a way that meets your budget requirements. Three common ways to have them bid the project are:

  • Fixed hourly rate
  • Time and materials rate
  • Fixed price bid

If you have clearly defined requirements, a competent contract software developer can make one or more of these methods work for you and your budget. However, if you need assistance in defining the software requirements, ensure that the contractor you choose is experienced (and can provide examples and references) to assist you in requirements definition stage of your project as well.

Also, make sure the developer provides up-to-date time sheets. These are the best indicators that 1) the developer has sufficient resources working on the project, and 2) the developer is tracking to your budget requirements.

3. Successful Contract Software Developers Have Real-World Business Understanding

Talented contract programmers are a great asset; however, talent alone doesn’t guarantee your project will succeed in the marketplace. Experience in taking projects/products to market can be as important as the amount of technical competency possessed by a contract software developer. Knowing what works and what doesn’t work in the marketplace is an invaluable asset.

Look for a contract software developer with a track record of completed projects actually delivered to and used in the marketplace. Ask to see some up-and-running examples of live work done for other companies. This kind of portfolio is the best indicator the developer can bridge the understanding of their client’s business with the client’s project deliverables.

A developer who provides you with market experience-based feedback is a greater asset than one who simply agrees with you because you’re the client.

4. Successful Contract Software Developers do Quality Work (and Provide a Warranty)

It is rumored that US Government procurement people operate by an unwritten rule that purchasers expect at best to realize two of the following three attributes in buying a product or service:

  • Quality
  • Timely
  • Cheap

Because you already know you get what you pay for, applying this rule to contract software developers is simple: You want a quality product in a timely fashion.

Find out if the contract software developer operates the quality assurance (QA) function separate from the development function to test deliverables. Superior developers will even warrant their work and provide free bug fixes during the warranty period. A developer who is fearful of providing a warranty is a “red flag” from a quality-of work perspective.

5. Successful Contract Software Developers Provide Documented Deliverables

For companies that build their businesses on the backs of their software deliverables, few things are more frustrating than contract developers who deliver poorly documented (or undocumented) projects and source code.

Successful contract developers understand the need for accurate, readable, useable documentation. Ask for representative samples of:

  • Project requirements documents
  • Design documents
  • Fully commented source code
  • Test cases and methodologies
  • Project documentation
  • User training and help documents

This is vital for venture-funded companies, as these documents are essential in any exit or liquidity event.

6. Successful Contract Software Developers Keep You Informed on Your Project’s Status

Knowing where your project is at, and who you can talk to find out the details is critical to being successful when using contract software developers. It’s not a good sign when your contract developer keeps you in the dark about your project’s status. Direct access to project managers, programmers and QA staff can mean the difference between getting a question answered in five minutes or five days. If you’ve ever had to report that you “don’t know what’s going on with the contract programmers,” then you know what we’re talking about.

Clear communication using multiple means is a vital key to successfully working with contractors. See that the developer allows you to talk directly with the programmers, project managers and QA people. Find developers who share their code-developing tools with you so you can stay in-the-loop. Look for developers who offer multiple means of communication including:

  • Phone
  • Web conference
  • E-mail
  • Instant messaging
  • IP telephony
  • Web-based project management tools

These give you an added advantage and ensure collaboration when working with contractors and resources in multiple geographies and time zones, and will keep you in-the-know at every step along the way.

7. Successful Software Developers Protect Your Intellectual Property

A word to the wise: intellectual property (IP) ownership is one of those clauses that even the biggest companies forget to take care of. If you fail to do this, questions will almost certainly arise over what happens to the intellectual property (IP) or who has rights to it.

Another word to the wise: IP ownership conflicts are compounded when your contract software developer is incorporated in another country than your own.

Last word to the wise: Avoiding “open source” software licensure and IP entanglements is critical to protecting the value of your company’s IP in a technology sale, license or transfer to another company. You will be required to assure the buyer that your code is “clean” from an IP perspective.

From an IP ownership perspective, two of the biggest success factors for operating a contract software developer engagement are: 1) choosing a contract developer who assures you that what they develop for you is yours and yours alone; and, 2) choosing a contract developer incorporated in the same country as yours–and thus subject to the same laws as your company; and 3) choosing a contract developer with experience in delivering “clean” code free of any “open source” contamination. (You can lose your legal shirt on this one.)

These three factors will provide you with legal confidence and means of recourse that avoid the costs and difficulties associated with adjudication under US and international law.

8. Successful Software Developers Deliver Great Value for the Price

The one topic you’re guaranteed to discuss in every contract software developer engagement is price. Managing project headcount requirements by making additional labor costs a variable item rather than fixed item on the balance sheet is compelling to the people in your organization who count the money and manage profit and loss.

While this white paper has already raised multiple items to consider regarding budgets and pricing, the short answer is this: You get what you pay for. Low hourly rates are no assurance of a value-based engagement. If you do your part with clearly defined requirements (or find a contractor that is experienced in help you define your requirements to create a smart product), a successful contract software developer will deliver with high-predictability on those requirements.

Developers who deliver quality, timely software may cost a little more up front, but they’ll assure you have a solid deliverable in your hands by the deadline and will have delivered solid value for the dollars you spent.

Conclusion

Successfully using contract software developers to achieve your objectives doesn’t just happen. Companies who enjoy this success don’t do it on accident. Give your company a quick “self-diagnostic” and ask if your current contract software developers:

  1. Have (and Hit) a Schedule
  2. Commit to Your Budget Requirements
  3. Have Real-World Business Understanding
  4. Do Quality Work (and give a Warranty)
  5. Provide Documented Deliverables
  6. Keep You Informed on Your Project’s Status (Clear communication)
  7. Protect Your Intellectual Property
  8. Deliver Great Value for the Price

Find out today how DSR can help with you balance market conditions with product/project opportunities and available development resources. Contact us at contact@dsr-company.com.

Migrating Legacy Systems

With IBC fast approaching, you are probably already considering that you’ll return from the show with a list of new features and requests from your existing customers and prospects. We know that not every company has the resource pool to handle the volume of software changes necessary to secure the desired orders, and DSR is here to help. With nearly 20 years of experience in helping vendors build software, we truly understand how to listen, define and manage projects, and implement solutions that work in the media & entertainment industry.

Many companies are considering porting existing applications to the cloud in order to increase automation, enable innovation, and reduce operational costs. However, migrating legacy media services and applications poses a variety of technical issues including trouble with porting codecs and methods from a desktop environment to a more distributed, service-oriented environment. On some occasions, this can be more complex than moving from linear threading to multi-threading with worker thread separation from data sources, service identification, availability publication, and service management. Working with a company like DSR that has experience in building and porting applications to web services can substantially ease your burden.

Legacy Migration Process:

DSR acts as a partner, which sets us apart from other companies. We take the time to truly understand your existing application, and are then able to take what we learn to help you move forward. While moving forward is different for everyone, DSR has the technical expertise under its belt to address any challenges that may arise. DSR will be with you step-by-step through your unique migration.

We have extensive expertise in this industry, having worked with major clients like Sony, Quantum, and Netflix, as well as with companies like XenData, Brightcove, and many others.

Are you going to IBC this year? If so, take this opportunity to schedule a 10-15 minute consultation with one of our media and entertainment application specialists today!

Email: ecarson@dsr-corporation.com

 

 

 

European Utility Week, Amsterdam Recap

Last week (October 3-5) DSR took part in the European Utility Week in Amsterdam. European Utility week is the premier business, innovation and information event that connects utility community with network operators, vendors, consultants, and integrators covering the entire smart system value chain.

 

 

 

 

 

 

 

Together with Watt + Volt, the 3rd largest energy provider in Greece, DSR Corporation showcased its 4-times Gold Award for Utility Solutions (SmartWatt) at our shared booth. DSR is proud to be contributing to the success of SmartWatt by empowering the solution’s embedded software, mobiles apps and the hardware solution.

The event also showed a trend of utility companies moving towards analyzing smart metering data to enable them to provide advice and insights to their customers, enhancing the customer experience and delivering a more complete package of services for the modern day energy consumer. However, there still appears to be a large fragmentation of metering protocols and different standards in the European energy market. As the solution providers are continuing to work on unifying the market, the trends towards utility companies becoming more of lifestyle providers are evident.

Would you like to learn more about DSR Corporation, utility trends or Zigbee? Get in touch with us via e-mail: contact@dsr-corporation.com

#EUW17 #DSR Corporation #IoT #DSR ZigBee

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CES 2017 Impressions

Every year CES is the culmination of the latest and greatest in technology and invention. From TVs to cars, cellphones to virtual reality, industrial grade hardware to watches and players, everything is competing for consumer attention and it’s barely possible for a person to see everything displayed. CES 2016 was all about TVs, virtual reality and drones. 2017, while still following last year’s trend, moved towards the Smart Home, Smart Appliances, and Artificial Intelligence (AI). The entire IoT industry was there: starting from end-to-end solutions to wireless connectivity chips and platforms. This includes the well-positioned ZigBee Alliance booth, which included the products showcase powered by DSR with an impressive 105 products from 30+ companies for both Residential and Commercial markets.
CES2_1
This was the largest wireless ecosystem display in the entire show and is a true testament to ZigBee interoperability and presence on the market. The devices in the display were connected to DSR’s zHome IoT cloud and mobile apps, working through DSR’s low cost gateway. 
 
CES1_1
The discussion and questions at the ZigBee Alliance products demo were mainly around the gateway and ecosystem. The impressive wall also raised some questions if the products all truly  function together and they do. The impression from previous shows is that consumers as well as installers have experience with a mixed bag of installation and controls. Providing a single display demonstrated a cohesive and diverse ecosystem of interoperable products.
 
CES3_1
 
 
Some other interesting observations from the IoT/Smart Home space showed that Data and Security applications are as relevant as ever. Voice control, driven by the major push in AI is gaining major traction, with Alexa embedded in Echo leading over Google Home. The start-up area is always full of new and reinvented ideas, including speaker products, data analytics, energy consumption profiling, health sensors and apps, analytical mirrors, security and nursing products. Finally, a visible expansion in child caring and monitoring beyond the standard baby monitors and cameras are looking to address the growing needs and demands of the market and modern day parenthood. 
 
To conclude, CES 2017 was as big as ever and full of new, amazing, and improved. DSR was excited to be part of the experience and to also represent the products demo wall at the ZigBee Alliance booth, making it the largest display of products from different companies working together via a single protocol in one space. 
 
For more information about DSR products and services in IoT, please visit www.ioticity.solutions and www.dsr-zboss.com.