Tags: Devices

An Overview of Open Standards for IoT Communication Protocols

In its simplest terms, an IoT solution is a collection of sensors combined with a centralized management application permitting the user to modify the environment in some way. Examples include being able to monitor the temperature of your home and adjust it based on occupancy; and being able to...
Read 0 Comments

scripting-languages-iot.jpg

Scripting IoT
At the upcoming Embedded Linux Conference + OpenIoT Summit, Paul Sokolovsky will discuss some of the challenges of using scripting languages in embedded development.

Using Scripting Languages in IoT: Challenges and Approaches

Scripting languages (aka Very High-Level Languages or VHLLs), such as Python, PHP, and JavaScript are commonly used in desktop, server, and web development. And, their powerful built-in functionality lets you develop small useful applications with little time and effort, says Paul Sokolovsky, IoT...
Read 1 Comments

openSUSE on Raspberry Pi 3: From Zero to Functional System in a Few Easy Steps

Deploying openSUSE on Raspberry Pi 3 is not all that complicated, but there are a few tricks that smooth the process. First of all, you have several flavors to choose from. If you plan to use your Raspberry Pi 3 as a regular machine, an openSUSE version with a graphical desktop is your best option...
Read 0 Comments

Practical Approaches to IoT Test Challenges

For engineers working on wireless-enabled IoT system designs, a variety of design challenges and tradeoffs transpire from start to finish. Moving efficiently through the process requires a good test-and-measurement strategy and proper instrumentation to ensure that you make timely and correct...
Read 0 Comments

iot-security.png

IoT security
At ELC + OpenIot Summit, Adam Englander will discuss some practical steps developers can take to make their devices less vulnerable to attackers.

Practical Steps for Protecting IoT Devices

The security of IoT devices is a high priority these days, as attackers can use Distributed Denial of Service (DDoS) attacks to target them and wreak havoc on a system. “Due to the sheer volume of unconnected devices, it can take hours and often days to mitigate such an attack,” says Adam...
Read 0 Comments

IoT Cybersecurity Alliance Will Collaborate on Standards, Education

A new IoT Cybersecurity Alliance formed by AT&T, IBM, Palo Alto Networks, Symantec, and Trustonic promises to help solve one of the most critical elements of the Internet of Things (IoT) — security. The group says its goal is to work on IoT security standards as well as raise awareness about...
Read 0 Comments

Embedded Linux Conference Europe 2017

ELC is the premier vendor-neutral technical conference for companies and developers using Linux in embedded products. Now in its 12th year, the conference gathers user-space developers, product vendors, kernel and systems developers to collaborate.  
Read 0 Comments

marcel-holtmann-linuxcon.png

Marcel Holtmann
Marcel Holtmann explains how he optimized Linux to run on a tiny device, at LinuxCon Europe.

Running Linux on Tiny Peripherals

It seems like every day new IoT devices with a very limited amount of RAM and storage space are appearing in homes, gardens, businesses, labs, and elsewhere. This includes things like heart rate monitors, thermometers, home automation components, and other devices that only need to perform small,...
Read 0 Comments

The Internet of Things: 10 Types of Enterprise Deployments

As the Internet of Things (IoT) market continues its explosive growth and development, more and more businesses are looking at the ways they can generate business value from connected devices and the data they generate. By 2020, research firm Gartner predicts that more than half of major new...
Read 0 Comments

SSL or IPsec: Which Is Best for IoT Network Security?

Internet of Things (IoT) devices are soon expected to outnumber end-user devices by as much as four to one. These applications can be found everywhere—from manufacturing floors and building management to video surveillance and lighting systems. However, security threats pose serious obstacles to...
Read 0 Comments

Pages

Click Here!