Raspberry Pi 5 - What to Expect and When
Raspberry Pi 4 Model B is here now and we can show you how to perform over-the-air software updates for Raspberry Pi 4 Model B with Yocto Dunfel, Zeus and Warrior releases. If you still want a sneak preview of Raspberry Pi 5, please read on...
Raspberry Pi 5. Will it even be called that? What could the next generation Raspberry Pi SBC bring? We round up the most intelligent preview points.... Read the article
IoT Device Security: Why are Best-of-Breed OTA software update systems required?
Many organisations suffer from having fragile and insecure homegrown solutions for software updating of IoT devices. A best-of-breed OTA software update solution from a professional system management vendor is the only alternative for a robust and secure IoT device fleet and a properly protected corporate network.
Where USB sticks are used to update the devices manually, additional cost and bur...Read the article
What is Reverse SSH Tunneling and how does it work?
Want an easy way to SSH to a device behind a firewall but don’t want to set up a VPN? Welcome to the pragmatic person’s approach - Reverse SSH tunneling.
If you’re reading this you’ve probably heard of SSH, the cryptographic network protocol usually running on port 22 which allows you access to the shell of a remote machine.
In the most basic form, you use the SSH client on your workstation to...Read the article
OTA Updates for Raspberry Pi
Due to its low cost, modularity, and open system design the Raspberry Pi devices have taken the computing and digital world by storm.
In embedded Linux development, there are two approaches when it comes to what operating system to run devices on. Either build a custom distribution with tools such as Yocto or Buildroot, or use a binary distribution where Debian and derivatives are commo...Read the article
WebSockets for fun and profit: a communication channel for the IoT
Imagine a swarm of IoT devices. They do not possess strong CPUs and not only have little local persistent storage and not much RAM, but with their weak network connections some are not online at all times. At the same time they provide a powerful platform. You may argue that the power comes from their number. I believe that it originates from the fact that they are connected. Assuming, for the s...Read the article