Mender OTA on the ESP32, Part 1
The “DNA” of Mender has two core ingredients: first, care about connected device security and second, care for the users responsible for device management. Security and people go in tandem: The right people should have the ability and knowledge to provide secure devices. The accessibility of the Mender API documentation and the open source-based device client enables this.
One of the most pro...Read the article
Top Trend #5: Support, Training & Superior Customer Experience are essential elements in a best of breed OTA updates solution
It’s common practice now for IoT product managers and digital leaders to buy in technology and not use their precious developers to build low level infrastructure such as an OTA updates solution in-house. The benefit of partnering is to free up more time and resources to focus on core product development to gain competitive advantage in the market. It's a smart decision based on an assessmen...Read the article
Top Trend #4: Ensuring security by design across device bootstrapping, encryption, and compliance
The secure management of connected digital products and software is a critical concern for the enterprise. In recent years, a massive increase in cyberattacks on operational technology (OT) exemplifies the safety implications of poorly protected devices. The SolarWinds attack started the compliance and regulatory snowball for software supply chain security. The LOG4j vulnerability followed s...Read the article
Top Trend #3: Reduce operational costs and realize the business value of IoT with delta updates
Industrial operations, building management systems, or consumer vehicles — to acquire data from connected assets, organizations must invest in a best-of-breed over-the-air (OTA) update solution within its embedded device strategy. As connected assets are often geographically dispersed or exist in remote locations, their operation depends on cellular or satellite data networks. Any data transfer...Read the article
Data Privacy: Compliance Should Be Built-in
Data privacy regulation and compliance remain a top concern for consumers and businesses. Rightly so as data’s power and potential abuse continue to surface in headlines worldwide and regulations continue to evolve.
Covering the European Union, the General Data Protection Regulation (GDPR) remains the strictest data privacy regulation, implemented nearly five years ago. GDPR has served as the...Read the article