×

Happy to Help!

This website doesn't store cookies. Enjoy the experience, without worrying about your data!

Great, thanks!

Monthly Archives: November 2020

  • 0

Disruptive IoT Trends to Watch in 2021: Strategic Industry-Specific Classification

Category : Embedded Blog

Businesses have been rapidly evolving in the past few years by adopting digital transformation in their operations. The business climate is conducive, now more than ever, to accelerated digitization across industries.

IoT adoption has remained a gamechanger for businesses during the whirlwind 2020. And connected devices will continue to redefine business operations as industries evolve from the pandemic-induced challenges and step into 2021.

We recently conducted an elaborate research on the unmissable IoT trends of 2021, and here is an overview of our findings. We have classified the data based on industry, so that you clearly understand the trending IoT buzzwords!

IoT Trends in Automotive Industry – Digital Cockpit Solutions Lead the Way

Digital Cockpit Solutions

 

The possibilities offered by In-Vehicle Infotainment systems are now no longer limited to navigation and music playback. These have undergone a significant transformation over the years and are now referred to as digital cockpit solutions in their new avatar.

Enhanced with phone connectivity, telematics functionalities, cloud connectivity and customized user experiences through HMI, custom-designed digital cockpit solutions have been redefining the status quo in the automotive industry.

  • A digital cockpit solution combines the instrument cluster, head unit and Advanced Driver Assistance Systems (ADAS) functions on a single platform. This type of ECU consolidation is a big step ahead for the industry as automobiles are transforming into software-defined machines.
  • Usage of Hypervisor technology to separate out the infotainment OS, enables distribution of workload across different computing resources. This, in turn, guarantees superior system performance and availability.
  • Adherence to functional safety guidelines through ASIL compliance can assure complete safety of operations as well.
  • Automakers are also using Augmented Reality-based Head Up Displays to enhance driver and passenger experience.
  • Firmware of the Air (FOTA) updates enable seamless upgrade and maintenance of the system.

In a nutshell, the digital cockpit is one of the hottest automotive trends to watch out for in 2021.

Industrial IoT Trends – Automated Asset Management & Predictive Maintenance

Industrial IoT Trends

 

In our article on Top Industrial IoT trends for 2020, we have explained the emergence of Cobots, Augmented Reality and 5G in Industry 4.0. These trends will continue to take center-stage in 2021 as well.

Let us now explore other key levers of business process efficiency in Industry 4.0 today:

  • Automated asset management – Automated asset management is a hot Industrial IoT trend that will see increased adoption in 2021.

    Streamlined asset management processes can improve operational efficiency and boost revenue in Industry 4.0. Once businesses realized this, they have been harnessing the power of IoT and automation for effective asset management.

    Here is a case study of how the automation of asset monitoring benefited a solar power plant. The development of a cloud-based IoT gateway and SCADA solution to monitor and manage field-deployed solar panels significantly improved the efficiency of the plant.

  • Predictive maintenance – Another trend that is being increasingly adopted in Industry 4.0 is predictive maintenance. This is essentially a strategic method of preventing the failure of industrial equipment through continuous monitoring and analysis of data. By doing so, unusual behavior/wear and tear of equipment can be “predicted” ahead of time through data analytics or AI algorithms. The necessary corrective/maintenance actions can also be taken based on the insights.

    Predictive maintenance, hence, keeps long periods of system downtime at bay. This also saves a lot of time, effort and resources in the long run. Our case study on predictive maintenance of the batteries in an industrial UPS network throws light on the many benefits it can bring to Industry 4.0.

    No wonder predictive maintenance is expected to be one of the primary business objectives for progressive manufacturing companies in 2021!

Healthcare IoT Trends – Telemedicine for Remote Patient Monitoring & Diagnosis

Healthcare IoT Trends

 

Telemedicine is one of the most disruptive technologies in the healthcare domain today. It is essentially the use of electronic information and communication channels by medical institutions to provide healthcare. Through this technology, patients at remote locations can avail quality medical care. Although telemedicine has been around for several decades, it saw renewed interest and adoption in the post-COVID era.

  • If a healthcare provider’s technology is enabled for telemedicine, doctors can communicate with patients in real-time and provide a treatment plan. This is particularly beneficial for patients in rural areas where public health facilities are limited.
  • Remote patient monitoring systems enable continuous collection of patient data at regular intervals. This information is then sent to the healthcare agencies for interpretation. This is of immense benefit to elderly patients who are homebound. A nurse can visit the house of the patient and configure the remote patient monitoring equipment. The tests can also be conducted and sent electronically to the doctor.
  • Telemedicine technology is increasingly being used by doctors for continuing medical education and research.

Since telemedicine has been found to deliver on all its promises, this trending technology is expected to grow in popularity in 2021.

IoT Trends in Ecommerce – Personalization Through Artificial Intelligence

IoT Trends in Ecommerce

Ecommerce trends for the future are heavily influenced by the use of machine learning (ML) and artificial intelligence (AI). Today, AI is enabling unparalleled user experiences in online retail through personalization.

  • Personalized product recommendations are now seen on most leading ecommerce websites. These recommendations have completely replaced endless product lists to offer unique shopping experiences to users. A product recommendation engine uses machine learning algorithms to gather data about each online user based on their historical browsing and purchase activity. Collaborative Filtering and Next-in-Sequence models are predominantly used for these predictions.
  • Personalization also goes a step beyond product recommendations. Ecommerce websites use different welcome texts, product descriptions, online shop navigation sequence, etc. based on the user’s historical data.
  • Big ecommerce players are additionally using visual search solutions to offer unique user experiences. Consumers can take photos of the products that they have seen offline and upload the images to get similar product suggestions.
  • Dialogue-oriented online retail involves the use of voice-controlled services or smart chatbots to engage with the customer.
  • Consumer location data is crucial for ensuring their convenience. An example of this is the curbside pickup facility that has gained popularity in some countries since the pandemic-induced lockdown. Such location-based services will see further growth in 2021.

Enterprise IoT Trends – Workforce Management Solutions

IoT systems and workforce management can go hand-in-hand as they rely on similar technologies – communication protocols and cloud storage of data. Hence, integration of an IoT infrastructure in an organization can be a great value-add. It provides flexibility and improved visibility of operations. Analytical tools can also be deployed to predict profitable measures for the organization.

In the post-COVID era, it is expected that a large number of companies will adopt comprehensive strategies for the offices of the future. This includes enhancement of employee safety and measures to increase productivity through the usage of smart lighting, environmental monitoring, and effective space utilization.

IoT Trends in Banking/Finance – Capacity Management, Personalization and Improved Security

In 2021, the financial sector will leverage the potential of IoT for improved efficiency of operations. Some areas where the impact will be clearly visible are as follows:

  • Improvement in security of payments – Smart cards and biometrical tokens are emerging as new forms of payments. These technologies are likely to see increased adoption in the upcoming year.
  • Personalized wealth management – Valuable wealth management insights can be gathered by employing IoT-enabled data processing algorithms. This facilitates increase in the speed and accuracy of data collection as well. IoT-powered wealth management solutions are also beneficial to customers as they receive alerts when their financial stability is at risk.
  • Capacity management – IoT-enabled sensors can be deployed to gather and process data regarding customer footfall at branches. This real-time data can be used by the banking authorities to plan for maximum efficiency of operations. They can decide how much staff is needed for peak efficiency and how the counters can be manned full-time. They can also predict the amount of cash that needs to be in stock at the ATMs in bank branches.

Conclusion

In 2021, the adoption of IoT in various industries is expected to reach new heights. Meanwhile, the challenges of IoT security that has been a hot topic of discussion within the industry is being diligently tackled by system designers and developers.

A holistic IoT security approach is the need of the hour, wherein security best practices are engraved in the design strategy and development life cycles right from the beginning of the project.

If you have a great idea in mind and are looking for assistance on developing a real-time application based on that, reach out to us. As a leading IoT development company, we have been crafting transformative IoT solutions for clients across industries for the last 15 years.


  • 0

How Manufacturers Can Leverage Ecommerce to Address Their Business Challenges

A lot has been discussed about how ecommerce as a technology has emerged as a gamechanger for B2C companies, especially in the retail segment. In this digital era, businesses have a pressing need to shorten their time-to-market, capture the customer’s attention, and offer them more relevant and contextualized services.

Ecommerce helps them achieve all this and more – seamlessly and quickly. The B2B segment, especially the manufacturing sector, can also benefit immensely if they embrace ecommerce as a strategic growth channel.

The B2B sector, specifically the manufacturing industries have been relying on conventional one-size-fits-all methods for:

  • Inventory management
  • Supply chain management
  • Product distribution
  • Driving sales and revenue
  • Dealing with distributors, suppliers and even buyers

But now in the digital era, the online presence of a business is a bare minimum expectation from customers and suppliers alike. Hence, B2B companies, especially in manufacturing domain, are increasingly considering ecommerce to offer faster and more relevant solutions to their customers.

In this blog, we explore how manufacturing companies can leverage the power of ecommerce to boost ROI and uncover new growth opportunities.

ecommerce manufactures

Why Manufacturers Must Consider Ecommerce?

  1. Added revenue channel

    Digital Commerce endows your manufacturing business with newer opportunities to improve brand awareness and market reach through social media and digital marketing channels. With better visibility and more customer reach, you can achieve sustainable sales growth.
    Additionally, through digital commerce, you can automate hitherto cumbersome operations, offer personalized product catalogues and pricing, drive more customers (individuals as well as dealer/suppliers) to your website, and leverage data analytics tools to asses customer behaviour for improving your offerings.

    All this trickles down to improved sales and revenue growth in the long term.

  2. Foray into B2B as well as B2C seamlessly

    In the conventional mode, most of manufacturing firms sell their products through a complex network of distributors and suppliers. This often limits their customer reach in the market.
    With ecommerce you don’t have to make huge changes to your existing distribution model.

    • It gives you the flexibility to operate both as B2C (direct to customers) and B2B (selling to distributors and suppliers).
    • With an ecommerce store at your disposal, your manufacturing business has better control over your customer relationships.
    • You also have more options to target and serve them directly through buyer-specific promotions, product recommendations, etc.
    • Also, in the conventional distribution models, users have to do bulk buying from the manufacturing businesses. With an ecommerce site, users can even order on demand. Hence, the customer base of the manufacturer is widened.
  3. Enhanced options for customer support

    Ecommerce platforms offer more streamlined and contextual support to the customer. Thus, manufacturing business organizations can leverage this capability of ecommerce to understand their customer’s concerns and serve them better.

    Chatbots, Voice assistance, Social media – the modern digital commerce platforms offer endless options for automated customer support to assist your customers round the clock.

  4. Tapping new market opportunities

    Manufacturing companies can leverage Digital Commerce as a powerful medium to assess market trends and explore new sales opportunities. This holds relevant in the current context of the pandemic where business organizations are rising to the occasion by going beyond just “keeping their lights on”.

    The success story of Bedford Industries is a case in point. A plastic fabrication manufacturer, Bedford Industries responded to the Covid-19 pandemic by foraying into the production of PPE kits (Personal Protective Equipment) . In order to quickly meet the surge in demand for the products, they set up an ecommerce store. In a matter of few days, Bedford saw a huge surge sales. Additionally, due to wide reach and faster sales offered by their ecommerce site, soon they saw customers , ranging from individuals to schools to hospitals, from different geographies showing preferences to their supplies.

Challenges Faced by Manufacturers in Adopting Ecommerce

All said and done, manufacturing industry is still wary of making a full-fledged foray into ecommerce. SO, what’s hindering them? Let us look at some bottlenecks that have been preventing the manufacturing industry from considering ecommerce as a channel for growth and sustainability, so far:

  1. Many manufacturing organizations are concerned about the huge investment, in terms of money, time and resources, required to set-up an online store.
  2. Establishing an online presence with minimal disruption to existing revenue, infrastructure and operations can seem challenging, especially for businesses in the niche B2B segment like manufacturing.
  3. Businesses have concerns related to the time required to set up an ecommerce website and see measurable results.

But once you talk to an experienced digital commerce consultant, you would realise that these are just concerns faced by every business taking their first step into the online world. And with the right technology solution and roadmap, these concerns can be effectively addressed.

Setup an Ecommerce Store in Just 8 Weeks with Embitel’s Magento Accelerator Package!

With the aim to help business organizations have a successful foray into ecommerce, we have launched our Magento Accelerator solution – RapidRetail.

Embitel’s RapidRetail Accelerator is an Omnichannel Retail solution that helps modern business organizations to set up an ecommerce store in the shortest possible time. The solution is available in multiple variants to suit the budget and timelines of small and large B2B businesses alike.

Magento deployment

Features of Embitel’s Magento RapidRetail Accelerator Packages

– Faster & effortless Deployment
– In-built Omnichannel features
– Endless customization for realization of unique business needs
– Customized for rapid deployment of B2B/B2C/ B2B2C/ B2B2B business models
– Get the best of Enterprise Magento Commerce and deployment practices

If you are looking for a cost-effective and rapid solution to launch a fully-functional ecommerce store, please schedule a call with us today and know more about our Magento RapidRetail Accelerator Packages.

 


  • 0

Development of Omni-Channel Retail solution & PWA on Magento 2 in Health and Beauty Domain

 

About the Customer

Our customer is a leading producer and supplier of the finest perfumes (Eastern and Western) and home fragrances in the Middle East.
 

Business Challenge

The website of the customer faced several technical glitches during promotional activities. It also lacked a streamlined approach for SCM (Source Code Management) and displayed inaccuracies in the usage of SCM & CI/CD tools.

The customer desired to update the existing sales platform and enhance their product portfolio. The primary requirement was to develop an intuitive and user-friendly website with high performance attributes.
 

Embitel Solution

Our experienced Magento 2 consultants assisted the customer in the analysis phase and developed a plan to enhance the overall performance of the website.

The ecommerce store received a fresh design and PWA application using Magento 2 Commerce Cloud Edition version 2.3.4.

ScandiPWA, a Magento-first, read-to-use theme, was used for a seamless, fuss-free PWA implementation on Magento 2.

Migration of Customer Details, Catalog (Categories, Products, Attributes) and Sales Orders from the current system was also done.

Key highlights of our solution include:

  • Logistics Service Provider (LSP) integration of Labaih, Safe Arrival, Ajeek and SMSA Express.
  • Merchant Services Provider (PSP) integration of Payfort, STC Pay, Payfort (Apple Pay).
  • Microsoft Dynamics 365 ERP Integration.
  • Integrations for Communication – Helpdesk and Chat.
  • Majority of users access the website through mobile devices and hence, the business desired a mobile-friendly solution. We suggested using PWA as the Mobile-First approach. Thus, using PWA features like Add to Home Screen, Push Notifications & Offline Access and a Mobile-First UI, the CX was increased manyfold, leading to repeat purchase and high conversion ratio.
  • Headless Magento was implemented for faster and highly scalable commerce solution.
  • Omni-channel strategy was implemented, allowing retail stores spread across the Middle East to act as fulfillment centers.

 

Embitel Impact

  • The customer’s website benefitted in multiple ways by leveraging a modern enterprise digital platform.
  • The website was able to handle traffic and order surges during promotional events.
  • Uniform and consistent Scandi PWA application was set up.
  • The website was configured in both English and Arabic languages.
  • The online store could be integrated with multiple social media channels, SMS modules and shipping & payment platforms.
  • The user experience on the website was enhanced multifold, as navigation was easier and product search/discovery was streamlined.
  • The home page, content pages, and product description pages had a clean and modern design, as per the project requirements.

 

Tools and Technologies

  • Magento Cloud based ecommerce capability
  • Scandi PWA for Progressive Web App (PWA) implementation
  • Magento Security Scan Tool for monitoring the site security
  • Visual Studio Code as code editor

  • 0

Development of AUTOSAR MCAL Drivers for a Smoother Transition to AUTOSAR Paradigm

 

About the Business Use-Cases

  • Microcontroller Abstraction Layer drivers access the on-chip peripherals functions such as CAN, Ethernet, General Purpose Timer, Watchdog, SPI, DIO and a few others.
  • This AUTOSAR layer makes the upper software layer independent of the microcontroller unit by acting as an interface between them.
  • These drivers are specific to the Microcontroller Unit.

 

Business Challenge

While developing our proprietary Body Electronics reference design, our development team realized the importance of making few of its modules AUTOSAR compliant. The body control module reference design was powered by a Renesas RH850 microcontroller; therefore, the process of AUTOSAR compliance had to begin with the creation of necessary MCAL drivers for the Renesas MCU platform.

These drivers were crucial for achieving reduced turnaround time for AUTOSAR projects where the customers wished to migrate their prototypes to a Renesas platform with full-fledged functionalities.
 

Embitel Solution

In the 1st phase of AUTOSAR implementation, the AUTOSAR team took up the task of developing the MCAL drivers required for CAN communication. Our development team identified the MCAL drivers that were required for successful CAN communication. As CAN bus protocol is primary for inter-ECU communication, our team decided to build the MCAL drivers for CAN in the first phase.

autosar-mcal-software

 

The 5 AUTOSAR MCAL drivers that were taken up in the 1st phase of AUTOSAR implementation are:

  • General Purpose Timer (GPT): Performs timer count by using on-chip MCU timer
  • Controller Area Network (CAN): Initializes CAN and performs CAN input and output
  • Microcontroller Driver Specification: Accesses MCU power and clock unit
  • Port Driver Specification: Initializes the whole port structure of the microcontroller and allows configuration of different functionality on each port and port pin
  • DIO (digital input/output) Driver Specification: DIO drivers provide services for reading and writing to/from DIO channels, DIO ports and DIO channel groups

 

Embitel Impact

  • Ready-to-integrate MCAL drivers can reduce time-to-market for AUTOSAR compliant automotive projects by 10-12 weeks.
  • These MCAL drivers would also help our prospective customer migrate from an existing BCM prototype to a full-fledged BCM solution using our BCM reference design. Since the MCAL drivers are independent of the application layer, they can be easily ported for any kind of applications ranging from Powertrain, Motor Controller for Electric Vehicles, Infotainment system and more.
  • More than 40% of the MCAL driver source code, requirements, test plans and work products can be re-used while migrating them to a different Microcontroller family such as NXP, TI, Fujitsu and others. This would also lead to reduced turnaround time for the customers.

 

Tools and Technologies

  • Microcontroller: Renesas F1KH-D8
  • Compiler: IAR Embedded Workbench IDE

  • 0

Can AGILE Methodology and ISO 26262 Based Functional Safety Go Hand in Hand?

Category : Embedded Blog

The automotive industry is a highly competitive and regulated industry in terms of innovation and standardization. A delay in rolling out of new technology by one OEM can prove to be a blessing for another. Add to it the concept of Functional Safety (ISO 26262) and you have a plethora of parameters to meet, which only increases the time-to-market.

The race to develop robust software in a tight timeframe has prompted the automotive product engineering companies and OEMs to adopt a fast and efficient software development methodology.

While analysis records are fundamental requirement of ISO 26262 standard, AGILE methodology is more inclined towards working software than the documentation. This practice helps save a lot of time and cost. You can see the contrast very clearly here. However, since AGILE is a proven methodology for reducing development time, the automotive stakeholders decided to ditch the concept of ‘pure Agile’ and instead modify it to suit their requirements.

How do the automotive developers align Agile and ISO 26262? How does ISO 26262’s concept of extensive analysis record keeping and Agile’s ‘working software’ concept go hand in hand? We will try to answer these questions but first let us understand both Agile methodology and ISO 26262 standard in brief.

Commandments of Agile Methodology

AGILE methodology

source: Kanbanize

Agile is centered around the idea of iterative development. It implies that the solution evolves as the teams interact for continuous planning and improvement through learnings. It brings about flexibility and dynamism in the problem-solving approach.

There are 4 core values that define Agile:

  • Individuals and team interactions are given more importance than tools and processes
  • Working software is preferred over documentation (artifacts)
  • Customer collaboration is preferred over contract negotiation
  • Response to changes takes precedence over adherence to a plan

Based on these core values, Agile puts customer’s satisfaction at the forefront by ensuring fast delivery of a highly efficient software. Even if the requirements change at a later stage of the development lifecycle, it is welcomed by the developers.

Team members are supposed to meet face-to-face for information exchange as Agile considers it to be the best way of interaction. Daily meetings ensure that the entire team is on the same page and none of the team members are facing any kind of issue.

Now to put things in perspective, we will delve into the Functional Safety aspect of automotive software development.

Fundamentals of Functional Safety w.r.t Automotive Hardware and Software Development

A gamut of electronic and electrical systems operates in automobiles. The risks and resulting hazards emanating from the systems must be minimized for the safety of the passengers. The aspect of safety that may be compromised due to the function of a system is called Functional Safety. It covers only the hardware and software part of a system. In the context of an automobile, ISO 26262 standard has been created to ensure functional safety.

For an automotive hardware or software to be Functional Safety compliant, it must adhere to the practices mentioned in the various parts of the ISO 26262 standard.

The standard considers a V-cycle model for product development which is iterative in nature, and hence, similar to Agile. However, ISO 26262 standard is deeply focused on analysis records which is in a sharp contrast with Agile. The analysis records assume a lot of importance in ISO 26262 compliance as they serve as the evidence to support the activities performed during the safety lifecycle.

As you may have noticed, Agile and ISO 26262 are two different worlds that the automotive industry aspires to connect. The resulting conflicts and how they are resolved make for an interesting read.

AGILE + Functional Safety: The Conflicts and Opportunities

The difference in the basic principles of both concepts brings in a lot of contradiction. While Agile’s goal is satisfaction of the customer, Functional Safety deals with mitigating risk to life. There is a huge difference there!

Following is a list of conflicts that arise when Agile and FuSa are brought together:

ISO 26262 Standard for Functional Safety Agile Methodology
Requirements are paramount and must be very clearly defined Requirements take the form of user stories it is acceptable to accept new requirements at a later stage
All safety goals identified during HARA must be met If a customer accepts a failure, it need not be removed
Clearly defined unit test, integration test and V&V required Tests are flexible; no or very little documents required
To establish accountability, change management is documented thoroughly More of informal and verbal information exchange is encouraged to reduce development time
Interaction with non-Agile team and including hardware development is common Agile is meant for software development only as it finds its roots in IT related development
Whether it is a working or non-working software, a record must be maintained in either case Agile is only focused on continuous delivery of working software without worrying too much about maintaining record of every small detail

 

While the conflicts appear discouraging, they in fact pave the way for a thoughtful implementation of Agile methodology in a safety lifecycle.

A little tweaking of Agile methodology conjures up the magic. It begins with pre-defined compliance workflow and approval process workflow and is executed by carefully planned scrum meetings and user roles.

Agile Practices Suitable for Safety Critical Software (SCSW) Development

There are more than 70 identified Agile practices and most of them cannot be used as-is during an ISO 26262 compliant software development. One such subset or Agile practice is Scrum which is modified for SCSW.

Let’s look at the roles, workflows and artifacts to be considered in Scrum.

Understanding the various roles:

Product Owner (PO) Scrum Master Development Team Safety Manager
Accountable for the product and its ISO 26262 compliance

Supported by the Safety Manager, PO creates safety related backlogs. Eg. Safety mechanism development

Ensures that the organization-specific processes and safety-related processes are adhered to.

FuSa achievement related information is shared by Scrum Master

Derives, implements, and tests Software safety requirement (SSR)

Performs safety analyses such as FMEA, FTA, DFA, etc.

Ensures test coverages, ISO 26262 programming guidelines, tool confidence, etc. are followed

Ensures that the team adheres to the safety plan and organization-specific processes

Supports the PO in activities including safety-related backlog creation

Works with the development team in all safety-related activities

Agile & ISO 26262 Workflow and Artifacts

Sprint Planning I & II: Sprint planning is an extremely important activity attended by the Product Owner, Scrum Master and the scrum team. In the Sprint Planning I phase, the Product Owner introduces the main sprint task to the team. In the 2nd sprint planning phase, the team creates a Sprint Backlog and also a Sprint Retrospective.

Daily Scrum Meeting: This is a communication activity highly recommended for the adoption of Agile in ISO 26262 software development. The focus of the meeting is to discuss and solve the current problems faced by teams and plan for the future. A safety expert must be involved in this meeting in order to assess the safety impact of the completed work.

Sprint Review: A sprint review meeting is conducted after each sprint and is a very important aspect of SafeScrum. During a sprint review, a coded and tested piece of software is presented for review. All kinds of errors such as modelling errors, tool errors or source code errors are reviewed at this stage.

Retrospective: This is among the communication activities performed at the end of one or more sprints. This activity is helpful in ensuring that the team is working in the right direction and if any improvement is required.

Backlog Refinement: During the sprint planning, the requirements are split into safety and non-safety critical requirements. After the splitting, each of these requirements are inserted into backlogs. The safety requirements are also tagged based on the ASIL value. This backlog needs to be refined by the Product Owner, Scrum Master and Safety Manager. This refinement leads to better understanding of the requirements and their efficient implementation.

The artifacts from the Scrum are Product backlog, sprint backlog, task board and a few more.

Key Takeaways

Various instances of combining Agile with ISO 26262 have provided ample evidence that it can be quite beneficial. Not only does this union promote faster time-to-market, but the developers also get complete control over the processes without worrying about the traceability issues. Additionally, Agile practices can support the V-model of development if used in a pragmatic manner. This makes the adoption of Agile in ISO 26262 software development even more realistic.


  • 0

What Makes commercetools the Most Robust Headless Platform Out There?

In August 2020, Gartner recognized commercetools as the Leader in the 2020 Magic Quadrant for Digital Commerce. This is an evaluation programme whereby Gartner identifies commerce players who support and contribute to digital commerce by making informed evaluations.

In fact, commercetools has emerged as a leader in the B2B ecommerce platform market, over the past few years. And what is driving commercetools to emerge as the market leader,  in terms of performance? Undoubtedly it’s the API-first aka headless approach for commerce!

In this blog, we will set out to explore what makes commercetools a pioneer in the field of headless technology, so much so that it is almost considered synonymous to the word headless!

The BIG FOURS of commercetools

The commercetools platform is built on its trademark MACH principles. MACH stands for Microservices support, API-first, Cloud-native, and Headless – everything the contemporary commerce platform represents! Coined in the year 2018, the term “MACH” has paved way for a host of advanced, agile and open-source technology products that are available in the market today.

These four pillars of the next-generation commerce platform are also referred to as the “Big Four”:

  • Microservices
  • API- first Approach
  • Cloud-native
  • Headless

These enable the platform to deliver business benefits including superior and fast performance, flexibility, faster time to market, and endless customization – to name a few. Let us look at the architecture, in a bit more detail.

  1. Microservices

    Microservices follow a principle whereby small services/applications, that communicate via APIs, are independently built and deployed in the main application. One of the key features of microservices is its modular and flexible architecture that enables businesses to independently build and customize applications at any point of time to fulfil their commerce needs.

    Unlike monolithic software where all the business logic is built in one go, microservices-based development offers several benefits. It ensures modularity and flexibility to modify only a specific functional module of an application, rather than having to update millions of lines of code in every iteration. This also enables easier testing, more optimized code, lesser error, and faster editing/iteration cycles – to name a few.

    Microservices enable the ecommerce platforms to be upgraded with new features rapidly and seamlessly. Modern-day digital businesses are hence, able to launch new features and prototypes in minimum time.

    Thus, adopting microservices empowers your digital business with strategic benefits including agility, faster time to market, and shorter release cycles.

  2. API-First Approach

    With its API-first approach, commercetools enables businesses to independently execute app implementation and API development. An API acts as an abstract layer between the presentation layer/front-end technologies and the back-end. It delivers information/commands between the front-end and back-end in the most flexible and seamless manner.

    Also, APIs allow the business to connect any number and type of interfaces/devices ranging from – mobile apps and social media sites to even IoT devices- to deliver information to the user. With API, the business doesn’t have to modify its underlying business logic to accommodate a new front-end technology.

    An API-first approach, means leveraging all the benefits of an API in the best possible manner by building the API first and then building mobile/web apps on top of the API. API-first software development paves way for a strong, agile development that enables considerable cost and time savings along with future scalability.

    The commercetools platform has one of the most advanced commerce-specific API suites integrated to its core. The ecommerce platform is known to have nearly 300+ API endpoints that enable businesses to integrate any number of functionalities and platforms like Digital Experience with their ecommerce applications.

  3. Cloud-Native

    A cloud native application is far different from applications hosted on the cloud. Such applications are developed in the cloud, only to form a core component of the cloud ecosystem. Everything related to a cloud-native application like commercetools (including development, testing, and integration) – happens within the cloud.

    Understanding the benefits of APIs and cloud-native technology, many modern-day systems have developed their own versions of cloud-based systems. Thus, we have cloud-native payment systems, warehouse management solutions (WMS), and API-friendly logistics solutions available in the market. When connected with a cloud-native and cutting-edge ecommerce platform such as commercetools, it enables you to launch or update your ecommerce webstore at a lightning fast pace!

  4. Headless Commerce – Shaping the Future of Digital Commerce

    Headless Commerce is envisioned as the future of digital commerce, driven by the countless benefits it offers. One of the most attractive and robust features of the headless technology is that it enables brands to be limitless when it comes to reaching out to customers on any digital touchpoint – be it mobile app, web shop, social media platforms, voice/digital assistants or even AR/VR applications.

    Suggested Read: Read this blog to know more about – How a headless commerce solution works

    Apart from this, it endows digital businesses with the following value-adds:

    • Market adaptability: In today’s fast paced digital landscape, brands have to respond to the changing market as quickly as possible. Headless commerce solutions can help retail brands to do just that- to respond to market changes quickly!

      It enables the business to integrate the most modern commerce technology with their ecommerce application without affecting the business logic/backend and without slowing down the systems.

    • Improved scalability: With headless, you can scale up your front-end and back-end without affecting the performance of each other, because they are decoupled. This paves way for better system availability and reduced task overheads.

Conclusion

While there are a plethora of headless commerce platforms out there, what makes commercetools different is that its foundation itself is based on the logic of syncing the front-end and back-end using a separate API layer.
It can thus be concluded that, commercetools, powered by the “Big Fours” or the MACH architecture offers a robust, secure, rapid solution to fulfil the commerce needs of the modern day business.


  • 0

ISO 26262 Consulting for a Futuristic Electric Vehicle Project

 

About the Customer

Our customer is a pioneer in providing technology solutions for automotive and other industries. We collaborated with the customer for ISO 26262 compliance of one of their electric vehicle projects.

The partnership was extended from Functional Safety consulting to ISO 26262 training of their automotive teams.
 

Business Challenge

Automotive functional safety has transcended from being discretionary to an absolute necessity for OEMs as well as Tier-1 suppliers. However, it takes years to make an organization ISO 26262 ready. Right from setting up the ISO 26262 compliance program to training the engineers, there is a plethora of activities to be done.

Our customer was in a similar position where they required the creation of an ISO 26262 Functional Safety roadmap for one of their EV projects. They also desired to train their workforce to adopt the ISO 26262 standard. The customer further required support from us while bidding for projects to OEMs.

As the OEMs are now heavily focused on Functional Safety, our FuSa experts would help the customer showcase the ASIL compliance of their solutions.

SEDEMAC

 

Embitel’s Solution

Our FuSa team identified 5 major activities to achieve the desired results:

  • Process gap analysis of the existing controller system
  • ISO 26262 rollout plan
  • Software tool evaluation review
  • Support the team for customer interaction from ISO 26262 standpoint
  • Detailed training of the engineering team on all parts of ISO 26262 standard version 2018
Software Tool Evaluation ISO 26262

 

Our FuSa team undertook the activities parallelly to reduce time and cost. The safety and QA team started the process gap analysis to identify the changes required for ASIL compliance. Gap analysis is the assessment of existing processes against the requirements of ISO 26262 standard.

Software tool evaluation review was performed as per ISO 26262 part-8 to ensure that software tools do not introduce any errors in the final software or hardware.

Our team of consultants supported the customer’s product development team for ISO 26262 related discussions with their end customers.

And most important of all, we provided the training to the product development team with example walkthroughs. The training was meant to make the team aware of all parts of the standard and the different safety activities to be performed while working on ISO 26262 compliant projects.

The training would help them in setting up the ISO 26262 safety lifecycles in future projects.
 

Embitel’s Impact

Our multi-pronged approach helped the customer in understanding the gaps in the project, while undergoing ISO 26262 training and software evaluation review simultaneously. The customer could save time and cost resources due to the approach.

Our support in customer interaction led to increased confidence in ASIL compliance of the solution offered by our customer.


  • 0

IoT Security – Part 3 of 3: IoT Cloud and Application Security

Category : Embedded Blog

In part 1 and 2 of this blog series, we introduced you to the building blocks of an IoT infrastructure and explained how holistic security principles can be applied to the connected IoT devices and gateways.

In this article, we explore how the IoT cloud, applications and PAN/WAN communication can be secured.

IoT Cloud and Application

IoT Cloud Security

Cloud computing offers several advantages to businesses, including greater technological flexibility, reduced operational costs and easy scalability. When cloud computing is implemented in an IoT network, the cloud platform and connected applications become highly vulnerable to cyber threats. Here are some ways in which the cloud infrastructure can be secured using holistic security principles:

    Encryption of data at rest

    Businesses embracing IoT for the first time lay a lot of focus on the security of the cloud infrastructure. So, it is crucial to deploy encryption technologies to secure the cloud. Encryption is a process in which legible data (plaintext) is converted into an output (ciphertext) that does not reveal any information about the input plaintext. An encryption algorithm is employed for this conversion. Encryption ensures that even if an attacker obtains access to storage devices with sensitive data, they would not be able to decipher it.

    Encryption of data at rest implies that an encryption algorithm is used to safeguard data that is stored on any kind of disk, including backup devices and solid-state drives. Several layers of encryption can be used to protect data at rest. An example of this is the encryption of sensitive information prior to storage along with the encryption of the storage drive itself.

    Encryption of data in transit

    Data in transit is considered to be at higher risk for security breaches. So, whether the data is being communicated over the internet or  between data centers, it is crucial to ensure that an end-to-end security strategy is in place. In order to protect data in transit, encryption is enabled prior to moving the data. Encrypted connections such as HTTPS, FTPS, SSL, TLS, etc. can also be used.

    Device identity

    Each device in an IoT implementation should have a unique device identity. When a device comes online, this identity is used to authenticate it and authorize secure communication with other components of the IoT ecosystem.

    Device authentication using OAuth 2.0

    OAuth 2.0 is a powerful open standard that can be used by API developers to protect an IoT ecosystem. It is a token-based authentication and authorization solution that also offers a framework for the decisions associated with authentication.

    User role and policy

    As part of access management, a privileged user management system can be deployed to ensure that stringent authentication processes are followed for user access to IoT data. It is also possible to create policies that can be attached to identities/resources to define their permissions. The administrator defines the policies and specifies the access level of resources.

    Certificate based authentication

    A certificate is essentially a signed digital document that includes attributes identifying its issuer and owner (also referred to as subject). It contains two important fields – a public key that belongs to the owner/subject and a digital signature from the issuer. The issuer is usually a Certificate Authority (CA) and X.509 is a popular digital certificate standard.

    The public key can establish a secure communication channel with the subject. The signature is proof that the subject’s identity is verified by the issuer. The subject also possesses a private key that matches the public key, but this is not a part of the certificate. The private key is used for proving the identity of the subject once a communication session is established.

    Certificate based authentication is more powerful than password-based authentication.

There are several other cloud security mechanisms that can be adopted as well, i.e., MQTT token-based authentication, maintaining access control lists and IP Whitelisting/blacklisting.

IoT Application Security

Security at the IoT application side can be ensured by adopting the following technologies:

    RESTful APIs

    APIs are a set of tools, routines and protocols for building software applications. They also help in securely exposing connected IoT applications to consumers/apps in the IoT infrastructure. It is crucial that the API management process is scalable, flexible and secure. In this context, REST APIs are beneficial as they allow data to be transmitted over internet protocols. They also delegate and oversee authorization procedures.

    A unified architectural style (REST) enables a single app to utilize software that is written with several different programming languages. This standardization of the information flow allows interoperable M2M (machine-to-machine) connectivity. REST has now transformed into a de facto protocol for the internet, as it is understood by almost all end point systems out there.

    A RESTful architecture for IoT enables data security authentication and SSL/TLS encryption to safeguard sensitive information.

    Authentication

    Authentication literally means employing digital certificates or tokens to prove the identity of the IoT application connecting to the network. Some of the methods that can be used for the authentication are:

    • Capability based access control model, i.e., single token for the access of a group of applications
    • Standards like Transport Layer Security (TLS) and Public Key Infrastructure (PKI)
    • Organization Based Access Control (OrBAC)

PAN and WAN Communication Security

    PAN Communication

    Some of the challenges faced in IoT PAN communication are the lack of coverage over a large service area and the inability to handle interference in operating frequencies.

    • Spread spectrum signaling – When devices operate in a wide spectrum of frequencies, the signal is more robust as it is spread out. It is also less sensitive to selective frequency fading and interference. Frequency hopping is a type of spread spectrum technique.

      Frequency hopping – This feature enables devices to transmit and receive data over several channels. The device simply changes the receiver channel over different periods of time, based on a random sequence of channels. This helps in combating interference on its operating channels and allows increased coverage.

     

    WAN Communication

    • Encrypted transport protocol with TLS – SSL and TLS encryption layers are often used to ensure security of objects in the IoT ecosystem. TLS usually takes the role of a transport layer that reinforces the SSL (which is the secure layer). TLS supports a wide range of symmetrical encryption systems.
    • Secure 4G LTE connection with 128-bit encryption keys – 4G LTE is a widely adopted cellular protocol for machine-to-machine (M2M) communication. Through this, it is possible to deliver cellular connection at low power and low throughput for high-speed data. 4G LTE connection can be effectively secured using algorithms that employ 128-bit encryption keys.
    • SIM based authentication – Embedded SIM in IoT applications can be used as ‘Root of Trust’ to secure these applications. IoT applications can utilise the SIM capabilities to improve the security of internet protocols such as TLS, DTLS and 3GPP GBA.

     
    Apart from the above points, device-based authentication can also be employed to secure WAN communication.

Conclusion

While the issue of IoT cyber security is a growing concern at a global scale, engineers ought to adopt a holistic IoT security approach to safeguard their IoT project implementations. As discussed in this blog series, the security of the infrastructure should be a priority right from the IoT component design and development phases itself.

Other articles in this blog series:

IoT Security – Part 1 of 3: Principles of Holistic Security and End Point Security Elements
IoT Security – Part 2 of 3: Analysis of Gateway Security in an IoT Infrastructure