Category
All
Simplifying multi-tenant device management with the Service Provider tenant
A deep dive into the Service Provider tenant. The Service Provider tenant offers multiple use cases to effectively scale devices with tenant separation.
|
5 min read
The role of open source software in embedded systems
Discover the role of open source software in embedded systems with insights from Yocto and inovex on transparency, security, and the evolving OSS landscape.
|
7 min read
The reach of AI: Digital, edge, physical, and beyond
The recent NVIDIA GTC 2025 conference outlined AI developments. Learn more about simulations, data generation, and the importance of OTA updates in growing AI capabilities.
|
6 min read
Robust OTA updates with A/B Partitions for Linux devices
Discover insights from Embedded World 2025 on A/B partitions for secure OTA updates, reducing fragmentation, and streamlining embedded system firmware updates.
|
7 min read
The power of over-the-air (OTA) updates in patch management
Learn about the power of over-the-air (OTA) updates in patch management. Outlining the importance of robust capabilities in enhancing CRA compliance.
|
4 min read
Helm chart architectural changes: What, why, and how it affects you
Discover Mender Server 4.0 Helm chart updates—monorepo shift, security boosts, and streamlined configs. Learn how these changes impact your setup.
|
6 min read
What’s new in Mender: Introducing Service Provider tenant and new advanced features
Discover the latest advancements in Mender's IoT device management with the release of Server 4.0, Client 5.0, and Gateway 2.0.
|
10 min read
The European Union Cyber Resilience Act (CRA): Why remediation requires over-the-air (OTA) updates
Discover how over-the-air (OTA) updates are essential for meeting the EU Cyber Resilience Act (CRA) requirements.
|
5 min read
CVE-2024-55959 - Insecure permissions on private key file generated by the Mender Client
A customer recently notified us of a security issue in Mender. On some versions, mender-auth generates private key files with non-strict file permissions.
|
3 min read