Telemetry talks. Flynn listens.
A whitepaper on deterministic, embedded anomaly detection — in telemetry, at the edge of the world.
Executive summary
Industrial equipment fails for reasons that are almost always visible in the signal before they become visible in the world. A bearing wears. A pump cavitates. A motor drifts out of phase. The data is there. The listener almost never is.
This whitepaper introduces Flynn, an embedded anomaly detector that turns equipment telemetry into usable local intelligence. Flynn runs bare-metal on the microcontroller already inside the equipment, in 8,480 bytes of deterministic C. It self-calibrates from normal behavior in 1,700 samples — under two seconds at kilohertz-class sampling rates — with no labels, no cloud, and no per-deployment tuning.
Flynn is what happens when you stop trying to send the signal somewhere else, and start trusting what the equipment already knows about itself.
The telemetry era
The signal is everywhere
From sub-sea to deep space, telemetry talks. Vibration. Current. Temperature. Pressure. Flow. Timing. Every rotating asset, every fluid system, every electrical bus, every thermal envelope emits signal continuously. A modern industrial site instruments ten thousand sensor channels, each emitting hundreds to thousands of samples per second.
The listener almost never is
The infrastructure for converting telemetry into action remains overwhelmingly centralized: a sensor reads, transmits, accumulates in a historian or a cloud data lake, and is eventually analyzed by humans or by models running on infrastructure far from where the signal originated. A vast and growing class of applications cannot accept this architecture, for reasons that are structural rather than incidental:
- Connectivity is not guaranteed. The most consequential equipment operates where backhaul is intermittent, slow, expensive, or absent.
- Decision latency matters. A pump dry-running can destroy itself in seconds. The decision cannot wait for a round trip to a cloud.
- Trust cannot be outsourced. Decisions affecting safety, compliance, or product integrity must be auditable and reproducible.
- Cost-per-decision matters at fleet scale. Sending every sensor reading to a cloud collapses economically at ten thousand assets.
The four gaps
The state of the art in anomaly detection leaves four specific gaps unaddressed. Each one prevents a class of equipment from being instrumented usefully today.
Non-local intelligence
Telemetry exists. A detector you can trust close to the source does not. The decision lives far from the action it informs.
No labels, no joy
The dominant supervised approach demands labeled failure data — which most real equipment cannot supply. Most equipment is designed to not fail; when it does, the failure mode is rare, expensive, and often catastrophic.
Cloud can't reach
Cloud-first systems assume connectivity. Most consequential equipment does not. The cloud is slow. Or worse, gone when you need it most.
Can't embed
Detection tools built for dashboards do not belong in firmware. Determinism and minimal footprint are not optional in embedded systems. They are entry conditions.
Flynn closes that gap in 8,480 bytes — self-calibrating, embedded, bare-metal anomaly detection that turns telemetry into deterministic, auditable intelligence.
Why Flynn is different
8,480 bytes
Flynn's runtime memory footprint is 8,480 bytes. Not eight kilobytes — eight thousand four hundred and eighty bytes. The exact number matters because the size of the deployed detector determines the silicon it can run on, the equipment it can be embedded inside, and the cost-per-node of a fleet deployment.
Self-calibrating
Flynn learns the statistical signature of normal operation from the first sampling period of the signal itself. There is no labeled training data, no per-deployment configuration, no machine-learning team behind it. The deployment workflow for an integrator is: install, power on, walk away.
Deterministic
Flynn produces bit-identical output for bit-identical input, across runs and across silicon. This determinism is the structural property that allows Flynn to participate in safety-certified voting architectures, to be replayed forensically after an incident, and to be audited line-by-line.
Auditable
Flynn is delivered to commercial licensees as a single human-readable C source file. No model blob, no opaque binary, no proprietary runtime. Auditability is not a feature — it is the file format.
Bare-metal
Flynn runs without an operating system. It does not require a network stack, a filesystem, a process scheduler, or any external dependencies beyond a basic math library.
How Flynn works
Flynn's operating model is two phases. Learning. Detection. The transition between them is automatic and one-way.
Learning
For the first 1,700 samples after deployment, Flynn observes the signal without producing alerts. The detector accumulates a statistical model of the signal's normal behavior. At the end of the warmup, Flynn commits a detection threshold based on what it has observed. The committed threshold is then locked. It does not move. It does not adapt. It does not drift.
Detection
After warmup, every subsequent sample passes through the detection pipeline. A score below the threshold is normal. A score at or above the threshold is anomalous. The magnitude of the score indicates the severity of the deviation.
The locked threshold is not a limitation — it is a design choice with consequences. Adaptive thresholds have a well-documented failure mode: a slow-developing fault gradually drifts the baseline upward, the threshold tracks it, and the fault is silently absorbed into the new "normal." Flynn refuses this failure mode by construction.
The architecture of trust
The prior should be a voice, not a verdict
In any learning system, two things must coexist: the accumulated experience that lets the system get better at its job, and the direct measurement that lets the system notice when something has changed. The common failure mode is that the prior wins when it should yield.
Flynn separates them by locking
In Flynn, the structural separation between prior and evidence is enforced by the locked-threshold design. There is no feedback path from accumulated experience back into the classifier. The system that judges each new sample is, by construction, isolated from any updating influence after deployment.
The signal dominates at the moment of conflict. The prior persists. The two never share the wire.
Validated across domains
Flynn has been validated across five distinct industrial signal domains, with zero configuration changes between them.
| Domain | Headline | Notes |
|---|---|---|
| Bearing vibration (CWRU) | P 0.988 · F1 0.829 · R 0.996 | Tandem mode: P 0.972 · R 0.996. |
| Run-to-failure | 3–4 day lead | 30+ days · 8 channels · zero healthy-bearing alerts. NASA IMS Bearing dataset. |
| Ambient & diurnal | 0.074–0.080 FP/h | 336 hours across environmental signals. |
| Electrical grid | F1 0.532 | 10,000 instances · 12 features. |
| Synthetic soak (vibration) | 0 FP / 120 h | 5 seeds · bounded <0.025/h at 95% CI. |
Zero false positives on bearing data. Operationally low on diurnal. The numbers operators actually care about.
Where Flynn runs
Any compliant microcontroller
Flynn is a single C99 source file. It compiles with any C99-compliant compiler. It has been hardware-validated on commodity 32-bit MCU architectures including both proprietary and open instruction sets.
Bare-metal C
Flynn requires no operating system, no network stack, no filesystem, no process scheduler. It does not allocate memory after initialization.
Zero heap
Flynn performs no dynamic memory allocation after initialization. Its working set is fixed at compile time — a hard requirement for safety-critical firmware where dynamic allocation is forbidden by certification.
From sub-sea to deep space
The same source file runs on commodity industrial silicon, on radiation-tolerant microcontrollers, and on power-constrained sensor nodes.
The Flynn roadmap
Today · the neuron
The Flynn detector is the foundational unit. One signal in, one score out. Deployable today as embedded firmware. Validated across five domains.
In development · the spinal cord
A coordination layer that composes multiple Flynn detectors on the same asset. Three to ten detectors covering different sensors on one piece of equipment, with a fabric node maintaining operational-regime memory. Pilot deployments are engaging in 2026.
Beyond · the nervous system
A facility-wide distributed cognition. Reflex-class response to sub-millisecond events. Cerebellar memory of operational regimes. Cortical decision-making across the whole site. Long-term memory with forensic replay back to any moment in the equipment's history.
Tiers and engagement
Flynn supports multiple engagement models, scaled to the needs of the user. Specific terms are formalized through direct conversation.
- Evaluation access — no-cost, source-level audit rights, bounded scope.
- OEM licensing — per-unit royalty, integration support, long-term source stability.
- Enterprise deployment — direct support, custom integration, compliance reporting, multi-year maintenance.
About Flynn
Flynn is developed by EntroMorphic, an embedded-systems and machine-intelligence company founded on the conviction that the most consequential equipment in the world should not need the cloud to stay safe. EntroMorphic's engineering leadership brings deep experience in high-performance computing, embedded firmware, and applied machine-intelligence architecture.
Flynn validates the principle that small, deterministic, auditable, structurally-separated detectors can serve the operational reality of industrial equipment better than the centralized analytics architectures that have dominated the last decade.
Next steps
For evaluation access, OEM licensing, or enterprise deployment conversations:
tripp@entromorphic.com →