Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Anomaly Detection for IoT: A Basic Primer

In the world of IoT, ensuring the reliability, efficiency, and security of connected devices is critical. As IoT devices generate massive amounts of data, detecting anomalies becomes increasingly important. Anomaly detection helps identify potential issues before they escalate, providing businesses with valuable insights and the ability to improve operational efficiency if used correctly. In this article, you will learn about some potential use cases for anomaly detection across different industries.

Diving into JTAG - Security (Part 6)

The JTAG interface is an important tool for debugging and testing embedded systems, providing low-level access to the internal workings of microcontrollers and other integrated circuits. However, this powerful interface also presents significant security threats. In the sixth and final part of this Diving into JTAG article series, we will focus on security issues related to JTAG and the Debug Port.

The MING Stack: What It Is and How It Works

The Internet of Things (IoT) is rapidly reshaping the world. From smart devices in our homes to connected sensors in industrial settings, the amount of data generated is rapidly increasing. But what use is this data if we can’t collect and analyze it in real-time to gain key insights? This is where the MING stack (which includes Mosquitto/MQTT, InfluxDB, Node-RED, and Grafana) comes in. This powerful combination of open-source tools is intended to simplify IoT data management.

What Is IoT? Benefits for IoT Asset Management

In today’s fast-paced business environment, the efficient management of assets is crucial for maintaining productivity and profitability. The Internet of Things (IoT) has emerged as a game-changer in asset management, offering innovative solutions to traditional challenges. This blog post explores what IoT is, its benefits and drawbacks, and how it is revolutionizing asset management using IoT.

Making The Case for Continuous Observability

Software complexity grows exponentially, developer efficiency grows far slower. And debugging often takes up 20-50% of development time. More complex, connected systems means increased data flow at the edge, and in the cloud. That leads to increased exposure to vulnerabilities, cyber threats, malfunctions, and bugs with risks that are hard to assess.

A Schematic Review Checklist for Firmware Engineers

Schematic reviews are a part of the hardware development cycle in many if not most, hardware development companies. Typically led by the electrical engineering team, it is easy to overlook design issues that will be important to the firmware team. This post tells of a few stories of design misses that I have made and puts some common lessons learned into a checklist for other firmware engineers.

Unified Namespace and InfluxDB: Streamlining IIoT Operations for Industry 4

The Industrial Internet of Things (IIoT) has revolutionized the way industries operate, enabling businesses to collect and analyze data from their operations in real-time. However, managing and analyzing data from diverse sources can be a challenge. While sensors and systems may use the same transport protocols, the shape and type of data generated can vary from one device to another. A lack of uniform, clean data creates challenges and obstacles when it comes to getting timely insights.