Category Archives: Guides

Energy Monitoring with the Raspberry Pi

If you are looking for an all-in-one device for monitoring your home energy needs, a low-cost single board computer such as the RBPi or Raspberry Pi along with an add-on shield is all you need. The emonPi board is a low-cost shield that is bereft of any enclosure, HDD and LCD.

However, when connected with an LCD for status display, hard-drive for local logging and backup and a web-connected RBPi, the emonPi makes a high-quality and robust unit. Enclose it in a suitable enclosure and you have a stand-alone energy monitoring station.

The design of the emonPi allows it to be a perfect fit for those who install heat-pump monitoring systems. Usually, these systems require several temperature sensors that must also be wired up along with power monitoring. Accompanying modules offer a myriad of options.
For example, the emonPi can also act as an emonBase, as it has options for rad
io (RFM12B/RFM69CW) to receive data from other wireless nodes. These nodes include emonTH, for measuring room temperature and humidity. Another energy-monitoring node, the emonTX V3 can send the current time to the LCD, emonGLCD.

The status LCD makes it easy to install, setup and debug the emonPi system as an energy monitor sensing mode and an all-in-one remote posting base station. This makes the emonPi a great tool for remote administration, since, with a proper networking configuration the RBPi can be accessed remotely. Thus, you may check its log files and even upload firmware onto the ATmega328 of the emonPi.

The emonPi monitors energy through a two-channel CT or current transformer along with an AC sample input. It can power up the RBPi and an external hard disk drive without using an external USB hub. Additionally, the emonPi can function even without a hard disk drive being connected to it.

The RJ45 breakout board makes it very easy to attach several temperature sensors to the RJ45 on-wire temperature bus provided by a DS18B20. This is eminently suitable for multi-sensor setups such as in heat pump monitoring applications. The RJ45 also has IRW and PWM I/Os.

The emonPi is compatible to all models of the RBPi and its options for RFM21B and RFM69CW along with an SMA antenna makes it capable of receiving or transmitting data from other sensor nodes. One can control remote plugs with the OOK or On-Off keying transmitter.

All hardware, firmware and software are open-source and the ATmega328 on the emonPi can remotely upload sketches via the serial port of the RBPi. However, compared to the emonTX V3, emonPi has some disadvantages.

The emonPi module is not capable of making measurements on three-phase systems as there is only one CT monitoring two channels. As the RBPi has high power requirements, it is not possible to power the emonPi from batteries. You cannot also use an AC-AC adapter, because, for measuring real power, you must use both a 5VDC and a 9VAC adapter. Remote location of the utility meter requires Ethernet connection or Wi-Fi connectivity. Additionally, the emonPi requires a larger enclosure as compared to what an emonTX V3 uses.

How Does A Measurement Pillow Work?

In human life, sleep is the period when the body rejuvenates. Two body systems regulate the timing and amount of sleep – the sleep/wake homeostasis and the circadian biological clock. Depending on external circumstances and the health of the individual, people experience different levels of alertness and sleepiness throughout the day. After being awake for a long time, the sleep/wake homeostasis tells the body it is accumulating the need for sleep and that causes us to feel sleepy. It also regulates the period of sleep throughout the night, to let us make up for the hours we will remain awake. The sleep/wake homeostasis balances the wakefulness and sleep periods in the body.

We also have an internal circadian biological clock that regulates the timing of wakefulness and sleepiness throughout the day. The circadian rhythm rises and dips at different times of the day. Typically, an adult has the strongest sleep drive between 2:00-4:00 am and again in the afternoon between 1:00-3:00 pm. However, this varies from person to person.

Sometimes, due to various reasons, things go wrong with the body systems regulating the timing and amount of sleep. Doctors advise monitoring your sleep to know where things are going wrong. However, this becomes a “Catch 22” situation – if you sleep, it is impossible to monitor how you sleep and you cannot sleep if you are monitoring. Now, there is a solution to this dilemma – a measurement pillow.

A chiropractor, Rick Loos, founder of the company Proper Pillow, is all set to develop a pillow containing a set of sensors to monitor the quality of your sleep. The pillow will monitor your sleep position throughout your sleeping time, collect the data and transmit them to an app on your smartphone.

Proper Pillow Plus will have a network of pressure sensors to collect the data. It will use BLE or Bluetooth Low Energy to transmit this data. Of course, this requires a power source, a sensor network with ADCs, and a micro-controller with a BLE radio. Normally, all data collected will remain stored until you decide to transmit it to your smartphone. Watch the pillow doing its work here. Proper Pillow also provides better sleep by giving its user a proper spine alignment.

According to Dr. Loos, the Proper Pillow Plus will contain 9-12 pressure sensors, a digitizer board, a micro-controller with Bluetooth capabilities, a battery, a microphone and a temperature probe. It will use 3-point redundancy to detect correctly the head and neck of the sleeper. The microphone will record various sounds such as the person’s breathing and external sounds such as a dog’s bark. The pillow will also record the ambient temperature to know if the sleeper woke up due to changes in temperature. The pressure sensors will determine how much time the user spent on his back or on his side.

Usually, the hardware will remain in low-power mode to maximize power efficiency. The algorithm wakes the hardware only when there is a change is pressure due to the sleeper’s movements. The slow changes in pressure and temperature permit low-speed digitization.

What are Counterfeit SD Cards?

Many of us use SD or Secure Digital memory cards, but seldom do we check if the total capacity actually matches that specified on the card. According to the Counterfeit Report, several dishonest sellers on Alibaba, Amazon, eBay and other reputed sites offer deep discounts for high capacity cards. They use common serial numbers with cards and packaging nearly identical to the authentic products from all major SD card brands.

According to tests conducted by the Counterfeit Report, although the cards work, buyers usually purchase a card based on the specifications printed on it. What they think and buy as a 32GB SD card, may turn out to be a counterfeit with a capacity of only 7GB. Counterfeiters usually overwrite the real memory capacity, imprinting a false capacity figure to match any model and capacity they prefer. Usually, the actual memory capacity cannot be determined by simply plugging the card into a computer, phone or camera. Only when the phony card reaches its limit, it starts to overwrite files, leading to lost data.

According the Craig Crosby, publisher of the Counterfeit Report, such fake cards also come in capacities that do not exist in any product line and counterfeiters target mostly cards above 32GB. They make a great profit on selling fake cards, with practically no consequence.

Usually, people cannot make out counterfeit cards from real ones, until these stop working. Usually, the blame falls on the manufacturer for making faulty products. This may happen even if you buy from a major retailer, as counterfeiters buy genuine items, only to exchange them unopened with their fakes.

Although software packages are available to test whether the card capacity matches the specifications on its packaging, organizations find it time-consuming, especially if they have bought cards in bulk. Additionally, the problem is not with SD cards alone, counterfeiters make fake portable flash drives including USB sticks as well.

Although the SD Association does make standards and specifications for SD cards to promote their adoption, advancement and use, they do not monitor the trade of products such as SD memory cards. The responsibility of counterfeit SD cards falls in the realm of law enforcement.

Manufacturers of SD memory card products can contract with several SD standards-related organizations for different intellectual property related to SD standards. Additionally, SDA member companies can resort to compliance and testing tools for confirming their products meet the standards and specifications, providing assurance to users about interoperability with other products of similar nature.

Consumers, especially bulk purchasers, should be careful to buy from authorized resellers, distributers and sellers. The best resource for any enquiry is the manufacturer of the SD memory card product.

This malaise is not restricted to counterfeit SD cards alone. It is a part of a larger problem. According to the Counterfeit Report, several other items face the same situation. Phony items exist for iPhones, other smartphones, airbags and many other peripherals such as chargers. It is very difficult for consumers to make out the counterfeits and many are even unaware of the existence of such phony high-end items.

Raspberry Pi and the Intel Edison

The Intel Edison is an extremely small computing platform suitable for embedded electronics. Intel has packed the Edison with many technical goodies within its tiny package. That makes it a robust single board computer, powered by the Atom SoC dual-core CPU. It includes an integrated Bluetooth LE, Wi-Fi and a 70-pin connector. A huge number of shield-like blocks are available to stack on top of each other on this connector.

Do not be misled by its small size, as the Edison packs a robust set of features within the tiny size. It has a broad spectrum of software support, along with large numbers of IO, delivering great performance with durability. Its versatile features are a great benefit to beginners, makers and inventors. The high-speed processor, Wi-Fi and Bluetooth radio on board makes it ideal for projects that need low power, small footprint but high processing power. These features make the Edison SBC suitable for those who cannot use a large footprint and are not near a larger power source.

In addition, the Intel Edison Mini Breakout exposes the native 1.8V IO of the Intel Edison module. On this board is a power supply, a battery charger, USB OTG power switch, USB OTG port, UART to USB Bridge and an IO header.

So, how does the Intel Edison SBC compare with the RBPi or the Raspberry Pi SBC? The first question that comes to mind when starting a comparison between the two is the lack of a USB port on the Edison to plug in the keyboard and mouse. Compared to the RBPi, the Edison also lacks video output, has low processor speed, higher cost and it is not possible to use the IO connector without an extra board.

Although Intel claims it as an SBC, unlike the RBPi, the Edison is a module meant for deeply embedded IoT computing. On the other hand, the RBPi has always been a low-cost computing terminal to be used as a teaching tool. That the RBPi platform also has hardware hack-ability is a bonus feature and purely incidental.

The Edison, a deeply embedded IoT computing platform, does not have video output because usually, Wi-Fi enabled robots do not need video. Since wearables do not need keyboard and mouse, the Edison does not have a USB port. To keep power consumption on the low side for portable applications, Intel has deliberately kept the processor speed low.

Although the Edison is comparatively higher-priced as compared to the RBPi, the difference is lower when you add the cost of an SD card, a Wi-Fi card and a Bluetooth dongle to that of the RBPi. Not only does the Edison integrate all this, it is more of a bare ARM A9 or A11 SoC that can be integrated easily into a product.

Finally, three things need highlighting. The Edison has a Quark micro-controller; it operates at 1.8V and is very small. The RBPi, without the addition of the communication modules, occupies about 93 cubic centimeters, whereas the Edison and its breakout board together require only 14. The RBPi requires about 48 square centimeters of footprint, while the Edison needs only 17.

Raspberry Pi and Energy Harvesting Wireless Devices

Do-It-Yourself home automation enthusiasts will welcome the idea of a wireless arrangement when setting up devices for automating their homes. It would be still better if these sensors and switches did not require an external power source to make them work. EnOcean Pi makes both these scenarios possible, with the tiny ubiquitous single board computer, the Raspberry Pi or RBPi, acting as a home automation server.

Therefore, with the EnOcean Pi, enthusiasts can set up home automation systems without any cables connecting the self-powered sensors and switches. Depending on information from sensors measuring temperature, humidity and from those detecting human presence, the RBPi may switch lights on/off and control blinds on windows.

Enthusiasts may either have sensors and actuators communicating directly with one another, or control them through an intelligent and smart home server. The latter allows adding remote sensing and remote control for home automation, which can be done conveniently through a PC or a smart phone. This type of home server is ideally suited for a tiny single board computer such as the RBPi. The EnOcean Pi then acts as a gateway controller to the EnOcean radio world. Element14 offers three types of kits for this purpose – the starter kit ESK 300, the developer kit EDK 350 and the Sensor kit PSK 300.

The wireless module, EnOcean Pi, comes in three versions – 868MHz for Europe; 315MHz for Japan, India and North America; and 902MHz for North America. This wireless module connects to other self-powered EnOcean sensor modules, which generate their own power through energy converters that use temperature differences, light or mechanical motion as an energy source. Therefore, the RBPi receives necessary data for intelligent control from maintenance-free sensors and actuator solutions.

It is always possible for OEMs and developers to design low-cost gateways for embedded applications including smart home solutions. Rather than developing new products from scratch, developers now have the option of using the EnOcean Pi and RBPi for creating a ready-made smart home box. This can process and visualize the data coming from self-powered wireless sensors, thereafter providing central control of a wirelessly connected house.

Users wanting to develop and integrate quick applications can download the EnOcean Link Trial Version middleware that comes with the new Pi accessory. The RBPi acts as a gateway, automatically controlling the EnOcean-based energy harvesting wireless sensors, switches and thermostats. That ensures a comfortable management of lighting, shading and HVAC, thus helping to save energy.

For a bi-directional communication via radio and serial interfaces, EnOcean Pi also offers the EnOcean Smart Ack controller functionality. The RBPi can use the serial interface to send and receive radio messages transparently in both directions. In this case, using the Smart Ack technology, the EnOcean Pi acts as a postmaster and controls up to 20 bi-directional sensors.

The EnOcean Sensor Kit has a set of three wireless sensors that includes a temperature sensor, a reed switch and a push button. Rather than use a battery, the sensors have a solar cell that supplies them with power. Each sensor has a wireless module with a built-in antenna requiring no cables. That makes the sensors totally self-powered and maintenance-free.

What is the Torrent Protocol?

When downloading a large file, you can do so from a single source, with a multiple mirror sources technique for data distribution. This presents a problem when used on networks with lower bandwidths and in the presence of sever recipients. As an alternative, a Torrent (also known as BitTorrent) protocol increases the efficiency of the distribution by reducing the network and server impact. The torrent protocol allows users to join a swarm of hosts that download and upload from each other simultaneously. That increases the efficiency of distributing files to many recipients, working over low bandwidth computers and mobile phones.

A user wanting to upload a file has to create a small torrent descriptor file first. They can distribute this file by conventional means such as web, email, etc. The file itself is made available through a seed or BitTorrent node. Those wanting to download the file present the torrent descriptor file to their own BitTorrent nodes on their computers. These nodes further act as peers or leeches and the node downloads the file by interconnecting to the seed and to other peers.

The file under distribution is divided into several segments called pieces. When a peer downloads a piece of the file, it turns into a source for that piece for all other peers. That exempts the primary seed from having to transmit that piece to all computers or users connected to copy. BitTorrent allows the task of file distribution to those who want the file. While the seed may only be sending a single copy of the file itself, the distribution ultimately reaches an unlimited number of peers.

A cryptographic hash within the torrent descriptor protects each piece of the file. Therefore, any modification of the piece is reliably detectable. That prevents any modification – accidental and malicious – of any piece received at other nodes. If any node starts downloading with a genuine copy of the torrent descriptor, it can verify the genuineness of the entire file it downloads.

This way of downloading pieces makes the collection non-sequential. However, the BitTorrent Client rearranges them in the correct order. The client continually monitors the pieces it has, and uploads to other peers, as they need. Throughout a single download, all pieces are of the same size. That makes the BitTorrent process very useful for transfer of large files as you can stop a file download any time and resume it later, without the loss of any information previously downloaded.

The non-sequential download typically reduces the overall length of a download. The client can seek out readily available pieces and download them immediately. It does not have to halt the download process to wait for the next and possibly unavailable piece in the line.

As a peer completes its file download, it turns into an additional seed. This eventual shift from peer to seed actually determines the overall health of the file. This is also shown as the number of times the file is available in its complete form. In reality, BitTorrent type of distribution creates a spreading akin to a torrential flood throughout many peer computer nodes. As the number of peers goes up, the likelihood increases for any particular node to complete a successful download.

What are UEFI and Secure Boot?

When you first turn on the power button of a computer at the start of your day, your PC or laptop goes through a set of procedures before allowing you to log in. The first thing that happens is the reset signal generated sets the registers of the CPU to their pre-defined values. The reset vector within the CPU now points to the start address of the BIOS or Basic Input Output System.

BIOS is a small firmware stored in a flash memory on the motherboard of the computer. It functions as a startup process for setting up the various hardware peripherals attached to the motherboard. BIOS starts with the POST or Power-on Self-Test, which checks for the presence of basic stuff such as the monitor, keyboard, mouse and memory – primary and secondary. Next, it looks for the MBR or the Master Boot Record on the secondary memory storage – the hard disk or a Solid State Device.

The MBR contains the Primary Boot loader that redirects the CPU to the Secondary Boot loader. What you see on the screen as GRUB when booting into Linux is the Secondary Boot loader is responsible for loading the actual Operating System present on the memory device of the computer.

Hackers planning to usurp the control of your computer have been targeting some of the elements in this chain of the booting process. Malware planted in the computer can modify the boot loaders so that it first enables a sleeping Trojan horse (a form of virus), before actually loading the Operating System. That allows the virus to control whatever you are doing with the computer and report it back to its original master.

To prevent this from happening, members of the PC industry have modified the plain and simple BIOS to a UEFI secure boot type. When booted through UEFI or Unified Extensible Firmware Interface, the firmware ensures that the system boot loader has a cryptographic key as authorized by a database within the firmware. The next steps involve the boot loaders in a series of signature verification for the kernel and possibly of the user space. That prevents any unsigned code (the Trojan horse) from executing and compromising your computer.

The computer requires no specialized hardware to implement and operate UEFI Secure Boot. The firmware resides in the non-volatile flash storage on the motherboard. This storage also stores the UEFI implementation itself as well as the protected variables including the trusted root certificates of the UEFI.

Therefore, unless presented with a signed next-stage boot loader, the UEFI Secure Boot will prevent your computer from functioning, unless you disable or switch off the Secure Boot mode. Note that UEFI Secure Boot does not verify signatures when installing or changing the boot loaders. Signatures are verified only when booting up and any tampered boot path leads to a display of invalid signature, preventing further operations. Unlike web server certificates, there is no information as to who issued the certificate and the user has no way of overriding the decision to reject the signature of the boot loader.

Why are Inductance-to-Digital Converters Useful?

Inductive sensing is bringing a revolution in the technical world. Inductive sensing offers capabilities for measuring position, motion and or composition of a conductive or metal target, with a contact-less, magnet-free sensing technology. In addition, inductive sensing can help to detect twist, compression or extension of a spring.

Now, LDC or Inductance-to-Digital converters from Texas Instruments, such as the LDC1614, is helping to utilize springs and coils as inductive sensors that can deliver better reliability, improved performance and increased flexibility when compared with existing sensing solutions. In addition, inductive sensing offers solutions at lower system costs and with lower power consumption.

Users of LDC technology can expect several advantages –

Higher resolution: 24-bit inductance values and 16-bit resonance impedance offers sub-micron resolutions in position sensing.

Better reliability: sensing is contact-less and therefore, immune to non-conductive contaminants such as dust and dirt.

Increased flexibility: The sensor can be located away from the electronics and in areas that do not have space for PCBs.

Low system power: LDC consumes less than 9mW during standard operations and less than 2mW when in standby mode.

Lower system costs: As no magnets are required for both the sensors and the targets, the entire system can be significantly low-cost.

Limitless possibilities: Permits endless possibilities for innovative and creative system design, such as with conductive ink and pressed foil.

Inductive sensing applications can range from simple push buttons, on/off switches and knobs to high-speed motor controllers, turbine flow meters and high-resolution heart rate monitors. The versatility of the LDC1614 allows it to be used in several markets including medical, industrial, computing, mobile devices, consumer electronics, white goods and automotive industries.

LDC1614, from Texas Instruments, is a series of inductance-to-digital converters comprising four devices. They offer two or four matched channels along with 12-bit or 28-bit resolution. Available in a compact 4x4mm package, users can configure these LDCs easily via an I2C interface. These converters offer precise position and motion sensing almost independent of the environment.

Inductive sensing involves low-cost, high-reliability inductors as sensors. Use of LDC converters enables the sensors to be located remotely from the PCB containing the IC. As the LDC1614 can integrate up to four channels, designers can distribute sensors throughout the system, while centralizing the electronics on a few PCBs. Since the channels are well matched, users can perform ratio metric and differential measurements. That allows easy compensation for aging and environmental conditions, such as those caused by mechanical drift, humidity and temperature.

The 28-bit resolution allows detection of submicron level changes in distance measurements. With the LDC converters supporting a frequency range varying from 1KHz to 10MHz, users can employ a large variety of inductors as sensors. As the converters require powering by a 3.3VDC supply, the power consumption is only about 6.9mW during standard operation and about 0.12mW when in shutdown mode.

TI offers its LDC1614 in QFN-16 packages and in the cheaper WSON-12 packages for both the 12-bit and the 28-bit devices. LDCs applications can be extremely wide-ranging and seemingly endless, covering fields as diverse as automotive, medical, consumer electronics, white goods and other industries.

Start Learning to Program the Arduino

Often, project builders are not sure of what they would like to build with their development boards. This happens mostly for two reasons – one, the user has just been introduced to the board and two, the user is unaware of the methods of interfacing and programming sensors, switches and other components. The second category of users is mostly those new to the world of development and in need of some hand-holding.

A Starter Shield
For these newcomers, Matt Wirth has proposed a Starter Shield for Arduino boards. With the Starter Shield, novices can learn how to interface components such as sensors for building their own interesting projects. Learning involves programming the IO headers of the micro-controller on-board the Arduino. Interestingly, users can do this without any assembly of intricate parts, soldering or wiring.

However, since many users may want to solder their own, Matt Wirth plans to release an optional kit, which will come with an assortment of components that the user will have to solder before starting. These will include potentiometers, multiple LEDs, digital and analog push buttons, temperature sensors and light sensors. To make it easy for beginners, Matt will provide lessons for programming these components, so that users can proceed with their unique creations – light meters, temperature sensor alarms, police lights and siren and many more.

An IoT Relay
For those who already have some experience in building projects with the Arduino, may find Wi-Fi and other home automation projects interesting. Of course, there are several kits available for automating homes, but most are expensive and limited in their functionality. This is where project builders can effectively use Team IoT’s IoT Relay for the Arduino board.
For those interested in home automation, IoT is a favorite subject. However, the relay solution provided by Team IoT is not limited to home automation alone. With the IoT Relay, apart from the Arduino board, users can work with any development board and create interesting project such as making automated feeders for their fish tanks.

On the IoT Relay, four outlets allow connecting to any number of devices. There is also a universal voltage control to handle inputs of 12-120VAC or 3.3-60VDC, protected with a thermal circuit breaker. That allows users to control power safely and not damage their devices. However, the IoT Relay, although inexpensive, does not come with an Arduino board and the users are expected to supply their own.

Makeblock’s mBot
For those beginning to learn to program, code and work with robots, there is nothing better than an educational robot such as Makeblock’s mBot. With STEM or the academic disciplines of Science, Technology, Engineering and Mathematics being implemented widely in schools all over the world, Makeblock’s mBot is a learning robot that helps kids with their STEM curriculum.
Featuring the mCore platform of the company, Makeblock’s mBot is based on the open-source Arduino Uno featuring a simpler wiring system. There are no GPIO pins to solder. Instead, the mCore uses RJ25 connectors, color-coded to make it easier to connect other components. Additionally, the board is compatible with Mindstorms’ Lego, other Arduino boards and shields and the Raspberry Pi.

Happy Gecko MCU Only Sips Power

The EMF32 micro-controller series from Silicon Labs, apart from featuring a smart interface, is also ultra-low power and USB enabled. Going by the name of Happy Gecko, this micro-controller is based on the ARM Cortex M0+ core. It uses autonomous peripherals and an advanced system for managing energy usage. That keeps the total energy usage in most applications so low that the controller can source power comfortably for a year from energy-harvesting arrangements or from a single battery.With the CPU core operating at speeds close to 25MHz, the core peripherals include comparators, 1Msps, 12-bit ADC, a current DAC, counter/timers, GPIO and serial buses such as I2C and USB. It supports encrypted firmware updates over USB with an onboard AES acceleration engine. Users have different memory options for up to 8KB of RAM and 64KB of Flash in a series of pin-compatible family members.

The designers of Happy Gecko have employed a variety of techniques for keeping its energy consumption to the minimal levels. Not only does its circuit design feature only 130uA for every MHz when active, the MCU can trade power for functionality through five energy modes. Therefore, developers have the ability to choose the mode consuming the lowest amount of power at any given time.

Apart from intelligent peripherals, the MCU also offers a peripheral reflex system with six channels. That allows several routine functions to execute without involving the CPU. For instance, an onboard comparator is available to monitor an input voltage, triggering an ADC to take sample as the signal crosses a threshold. The ADC in turn, stores the value in memory using a DMA channel. All this happens without the CPU coming out of its sleep mode. When the CPU needs to be active, its high clock rate ensures that it accomplishes the necessary actions in minimal time and it can return to its sleep mode quickly. Only 2µs are necessary to wake up the CPU from its slumbering state.

For the Happy Gecko, the low-energy USB interface is its key feature. However, this operates only as an endpoint device. That means the device does not require an external USB crystal and automatically synchronizes its internal oscillator to the incoming data. The endpoint device has its own dedicated RAM and an integrated PHY layer with a 5V LDO regulator and resistor. The interface remains in its low power mode, waking up only when it detects activity on the bus different from the idle time following a USB start-of-frame.

Silicon Labs offers a starter kit for the Happy Gecko. This is mbed-compatible and comes with a built-in USB debugger. The internal current measurement makes it very easy for developers to correlate the energy use of the CPU with their code.

Silicon Labs also offers an IDE to support the CPU, called the Simplicity Studio. The IDE features a pin out design tool that makes it easy to handle the configurable IO pins of the device. It also has a real-time energy profiler for synchronizing code to the minimal energy consumption of the micro-controller.