Operations | Monitoring | ITSM | DevOps | Cloud

IoT

An Introductory Guide to Cloud Security for IIoT

The state of industries has come a long way since the Industrial Revolution with new technologies such as smart devices, the internet, and the cloud. The Industrial Internet of Things (IIoT) is a network of industrial components that share and process data to gain insights. But as IIoT involves sensitive data and life-critical operations, this also comes with various IIoT cloud security challenges. Therefore, it is important to strengthen security.

How Memory Usage Patterns Can Derail Real-time Performance

In this article, we will learn how memory usage patterns can affect the real-time performance of an embedded application, drawing from a recent experience tracing an audio DSP application running on an embedded Linux platform. First, I will introduce the product in question and the real-time audio software I developed for it. Then, I’ll describe the issues I encountered with audio callbacks and the strategy I followed to determine the cause of the issues, ending with my solution and lessons learned.

The Impact of IIoT and Real-Time Analytics on Renewable Energy

Technology focused on building a more sustainable future continues to advance at incredible speed. The Industrial Internet of Things (IIoT) and real-time analytics are opening up new horizons for renewable energy. This post looks at the intersections of innovation and ecology, where small chips and sensors play major roles in the renewable energy sector.

Anomaly Detection for IoT: A Basic Primer

In the world of IoT, ensuring the reliability, efficiency, and security of connected devices is critical. As IoT devices generate massive amounts of data, detecting anomalies becomes increasingly important. Anomaly detection helps identify potential issues before they escalate, providing businesses with valuable insights and the ability to improve operational efficiency if used correctly. In this article, you will learn about some potential use cases for anomaly detection across different industries.

Diving into JTAG - Security (Part 6)

The JTAG interface is an important tool for debugging and testing embedded systems, providing low-level access to the internal workings of microcontrollers and other integrated circuits. However, this powerful interface also presents significant security threats. In the sixth and final part of this Diving into JTAG article series, we will focus on security issues related to JTAG and the Debug Port.

Optimizing IoT Development: Key Takeaways from the 2024 Industry Report

Listen to VDC Research’s Executive Vice President, Chris Rommel, as he dives into the 2024 State of IoT Software Development Report. He breaks down the data collected from over 775 professionals directly involved in IoT and embedded electronic systems and shares key insights to guide your software development processes.

The MING Stack: What It Is and How It Works

The Internet of Things (IoT) is rapidly reshaping the world. From smart devices in our homes to connected sensors in industrial settings, the amount of data generated is rapidly increasing. But what use is this data if we can’t collect and analyze it in real-time to gain key insights? This is where the MING stack (which includes Mosquitto/MQTT, InfluxDB, Node-RED, and Grafana) comes in. This powerful combination of open-source tools is intended to simplify IoT data management.