Operations | Monitoring | ITSM | DevOps | Cloud

IoT

Self-Service Analytics for the Shop Floor [Part 2] - A Practical Example using MQTT

In the first part of this blog article, I introduced key concepts surrounding data ingestion for the industrial Internet of Things, the role and importance of metrics and self-services capabilities for shop floor personnel. So let's see how this looks in practice and how the knowledge of a process or control engineer can be turned into action.

Here's How the Internet of Things is Transforming Healthcare

Industry 4.0 technology is transforming industry all over the world. Digital innovations such as data, virtual reality, automation, and robotics are all helping brands create products and services and deliver them to customers in better and more efficient ways than ever before. One of the most useful elements of Industry 4.0 technology comes from the Internet of Things.

Getting Started with Kubernetes using MicroK8s

Single-node deployments of Kubernetes are more common than what one would expect. In some scenarios, single-node clusters make much more sense. For development purposes or testing, there’s no need to deploy a full-blown production-grade cluster. Single-node deployments are also handy for appliances and IoT applications since they have a much smaller footprint. Enter MicroK8s, a tool by Canonical that enables you to easily deploy a lightweight single-node cluster in your local environment.

Improving IoT security with log management

The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 80 billion connected devices – practically outnumbering the human population tenfold.

Why K3s Is the Future of Kubernetes at the Edge

By next year the number of connected devices will exceed 20 billion. The vast majority of these devices run on Arm architecture, increasingly at the infrastructure edge. With this growth in mind, the need for an agile, Arm-based development methodology has become increasingly urgent. Arm Neoverse provides the required IP for building the next gen of edge to cloud infrastructure to support the data explosion we are seeing, primarily caused by IoT.

Security Strategies for Mitigating IoT Botnet Threats

As DevSecOps continues to redefine the IT security landscape, security is becoming everyone’s responsibility. That means that staying ahead of the latest cybersecurity threats—such as IoT botnets—should be a priority for every DevOps professional. To help you do that, this article discusses strategies for combating IoT botnets.

The Importance of Security in IoT

IoT, or the Internet of Things, has made its way into every corner of our lives. Once upon a time, the idea of an inescapable internet may have seemed like a far-off dream. Today, it’s our reality. Internet connected devices are everywhere—from our fitness trackers to our vehicles and appliances. These devices track our sleep patterns, enable us to set our coffee machines remotely, and find our pets after they have wandered off, among countless other tasks.