Operations | Monitoring | ITSM | DevOps | Cloud

How To - Monitor IoT with Catchpoint

In this How-To, we’re going to look at a specific Catchpoint synthetic monitor that helps you analyze the health of systems built around the Internet of things (IoT). Now, IoT is obviously a huge category, so in this case, we’re going to look at systems that utilize the Message Queuing Telemetry Transport or MQTT for short.

Not All Buzzwords are Created Equal: Real Applications of Zero Trust Security for IoT

Zero Trust security. Some would say it’s the latest and greatest buzzword and this disposition is understandable given the amount of jargon introduced into the Information Technology market each year. With vernacular being used interchangeably like “AI,” “Machine Learning,” and “Deep Learning,” these words get stripped of their real significance.

10 Ways to Implement Effective IoT Log Management

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All kinds of everyday things make up this network – fridges, kettles, light switches – you name it. If it’s connected to WiFi, it’s part of the Internet of Things. IoT raises significant challenges that could stand in your way of fully realizing its potential benefits.

Ubuntu Core 20 secures Linux for IoT

2nd February 2021: Canonical’s Ubuntu Core 20, a minimal, containerised version of Ubuntu 20.04 LTS for IoT devices and embedded systems, is now generally available. This major version bolsters device security with secure boot, full disk encryption, and secure device recovery. Ubuntu Core builds on the Ubuntu application ecosystem to create ultra-secure smart things. “Every connected device needs guaranteed platform security and an app store” said Mark Shuttleworth.

Applying Strong Cyber Hygiene Security to IoT Endpoints

The Internet of Things, better known as IoT. You’ve heard of it, right? But do you know what it is? Simply, it is the interconnection of things (or endpoints) on the Internet to send and receive data. Today, experts calculate that there are 31 billion things connected to the insecure Internet, and growing exponentially. Did you know there are different types of IoT applications?

Monitor Azure IoT Edge with Datadog

Azure IoT Edge is a Microsoft Azure service that allows you to run containerized workloads on IoT devices. With IoT Edge and Azure IoT Hub, Azure’s device-management platform, organizations across science, manufacturing, energy production, and other industries can provision their IoT devices and workloads at the edge of their cloud networks for immediate in-unit computing, a necessity when running AI algorithms or parsing large datasets directly on IoT devices.

Monitor your NVIDIA Jetson IoT devices with Datadog

NVIDIA Jetson is a family of embedded, low-power computing boards designed to support machine learning and AI applications at the edge. Organizations use Jetson boards for complex video and image processing and analysis, automating build processes in factories, and improving city infrastructures. For example, Jetson-based devices enable cities to analyze traffic patterns with their existing traffic cameras in order to find ways to improve their most congested intersections.

How to Monitor IoT Devices at Scale Webinar

Releasing a connected device in today's world without some form of monitoring in place is a recipe for trouble. And as you increase your fleet size, more and more issues arise, causing more and more trouble. In this webinar, Tyler demonstrated how to build out your IoT monitoring solutions using metrics allowing you to scale your fleet without adding more issues. Using metrics to monitor a fleet of connected devices allows for assessing the health of thousands to millions of devices, all while keeping complexity, bandwidth, and power consumption to a minimum.