Building Mender-Rust in Yocto, and minimizing the size of a Rust binary
This is part II in a series on writing a Mender-client in Rust. Read part I.
In this post we are going to explore how to try and create an embedded version of the Mender-Rust binary which we created in the project from the previous post in this series. The original goal is to get it below 1 MB, but this sounds a bit ambitious to me. Let us see how we fare in the world of binary minimization.... Read the article
Mender partners with Konsulko Group to deliver robust and secure software updates
Mender.io is excited to partner with Konsulko Group, a team of embedded Linux and Open Source Software community and industry veterans and provide their customers with an out-of-the-box OTA solution integrated into their products. This enables Konsulko’s customers the ability to securely manage and deploy software updates remotely anywhere in the world. This allows for faster bug and vulnerabili...Read the article
Mender 2.3 beta: Easily update system and applications
We are excited to release Mender 2.3 beta!
The focus for Mender 2.3 is to easily update all your device software.
This Mender release includes a ready-to-flash OTA-enabled Raspbian image, a new way to snapshot into system updates and support for generating application updates directly from the Mender server! All new features of Mender 2.3 are fully open source under the permissive Apache 2.0 license.
The key features of Mender 2.3 beta are covered below, and you can see the detailed items in the Mender 2.3.0 beta release notes.Read the article
State scripts: A powerful tool for customizing your OTA software updates
When deploying over-the-air software updates, you will benefit from having the capability to customize software releases and installations on your devices with more flexibility and control over your deployments. During the installation process on the device Mender State scripts and Update Modules are complementing features to customize the installation process to meet your requirements. In...Read the article
Top 3 IoT security challenges
With the advent of IoT and proliferation of connected devices across a variety of industry verticals, we are seeing a slew of new security vulnerabilities emerging. We live in an era where everything has turned ‘smart’: Smartphone, smart home, smart lock, smart camera and so on. A day going by without interacting with an internet connected device seems next to impossible. IoT has created a more c...Read the article