Sound Design Services LLC Logo
Software engineering specializing in scaled, purpose-built, and embedded systems.
Product Development:
  • Full scope product design and development
  • Application Development for Linux
  • Linux OS distribution customization
  • Embedded system software
  • RTOS
  • Micro-kernel
  • Filesystem
  • Device driver
  • BIOS & firmware
  • Hardware component integration
  • Analog, digital, or mixed-signal circuits
  • PCB layout and design
  • Product Fit, Testing, and Evaluation

On The Horizon:
  • FPGA implementation with VHDL
  • DSP and signal processing
  • CPLD, programmable state machines

Domain Experience:
  • IoT, Sensor Networks
  • Networked Devices
  • Music Instruments
  • Audio Devices
  • Security Systems
  • Smart Building Infrastructure
  • Mechanical & Motion Automation
  • Edge-device / infrastructure Compute
  • GPU, HPC, Scale-Out Compute
  • Open-source software libraries
  • Build-automation, Source-control systems
Technical Capabilities:
  • Arduino (incl. Nano, Teensy, others),
    Raspberry Pi (3/4/5, Zero+),
    and similar development platforms
  • Pico Microcontroller (Raspberry Pi)
  • ESP32 system-on-chip by Espressif Systems
  • STM32 Microcontroller (STMicro)
  • PIC Microcontroller (Microchip)
  • ARM, RISC-V microprocessors
  • USB Interface Adaptation
  • MIDI Protocol
  • SPI, I2C, RS232/RS422 Serial, GPIO
  • ADC, DAC, FLash memory devices
  • Digital Audio Recording & Playback
  • Music Synthesis, Analog & Digital
  • OS & Platform development: C, C++
  • Sensor Integration
  • Application Development: C, C++, Python, Rust, Go, and other languages

On The Horizon:
Vision:
  • Moore's Law and Convergence - applies to embedded systems hardware now.
  • When we look at the technology used in embedded devices, there was a period for many years where embedded processors were slow and generally lacked modern features. Those times are over, and now it is common to see embedded processors that have 32-bit bus widths, 8MB of RAM, a fast clock rate (150MHz or faster), and a significant number of built-in I/O capabilities.

    There is a convergence happening where the new processors are blending licensable cores (ARM or RISC-V) with complex silicon features ushc as ethernet switches, motion control logic, or other dedicated sillcon technologies.

    In this new world, new approaches must be taken to leverage this hardware securely and efficiently.

  • Devices require cutting-edge design.
  • New device designs are increasingly using hardware components of advanced capability, including high-speed serial (i.e. USB3), advanced networking (i.e. mesh network devices), or rich user-interface elements such as color OLED displays, touch screens and numerous encoders and tactile user-input devices.

  • The marketplace rewards agility.
  • As the complexity of embedded devices increases, there is the risk of development cycles becoming lengthier and more complicated. Our approach is to use a modular software system which allows developers to compose a full solution from individual tested modules, to decrease the time required to deploy, and maintain, the embedded software platform for your modern device.

Our Strategy:
  • We aim to provide the right solution at the right price.
  • We provide the expertise that will help you implement only the necessary technology needed in a solution, while avoiding the trap of selecting all technologies from one vendor. Vendor lock-in not only limits options for long-term supportability, but increases costs as vendors lock you in to proprietary solutions.
  • Our expertise in customizing software enables your highest value.
  • We understand that your solution requires specific capabilities, for you to separate yourself from your competition. Any solution that only partially meets your specific needs is less than ideal. We work with our clients to provide a solution which is exacting and specific, and not just a rebuild of an off-the-shelf product.
  • We work well with others.
  • It's up to you, but your ideal solution may be to leverage our technical approach combined with a best-of-breed selection of multiple hardware, platform, wireless, or even cloud vendors.
Privacy Policy:

Who we are

Our website address is: https://sounddesignservices.net.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

If you provide information through a contact form, the following information (if provided) will be submitted to us:  Name, Email, Website URL, Message Subject, Message Body.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies may last for one year, or may last for an indefinite period of time.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login may persist for two weeks, or possibly indefinitely. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

We utilize an analytics system that gives us the ability to count number of visitors, number of unique visitors, country of visitor, and other basic statistics.  Cookies may be stored in your browser for the cookie domain *.gap-consulting.net, and these cookies provide us the visibility into unique sessions (but do not expose any personal information about you).  We do not share this data, or expose it to any 3rd party.  We honor the Do Not Track setting in your browser, so if you enable "Do Not Track", we will not count your activity in our visitor counting.

Who we share your data with

Nobody.  We do not share our website data with anyone.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

 

Additional information

How we protect your data

All access to this site is through secure-socket (SSL or HTTPS) protected connections. Other than website activity logs, no user data is retained in the system hosting this site.  Access to the system is granted to a single user, and access is only through the use of secure protocols using two-factor authentication.

What data breach procedures we have in place

This system does not contain data, other than webserver logs, which would be vulnerable to exposure of a data breach.  We regularly monitor this system for any unusual activity to prevent improper access to webserver logs.

What third parties we receive data from

None.  We do not receive any third-party data about any visitors to this website.

What automated decision making and/or profiling we do with user data

None.  We have no automated processing or profiling processes and there are no plans to develop any at this time.

Industry regulatory disclosure requirements

None.  We are not members of any regulated industry subject to rules around data retention.  Also, we are not retaining enhanced data.  We only retain web server logs for performance and site verification purposes.

After submitting this form, your information will be reviewed and responded to by a human, not an AI chatbot!