Firmware over-the-air: package-based vs image-based updates

7th Dec 2015

Here at Mender.io, we did a comprehensive survey with embedded developers and what they did with devices that required software updates over-the-air (OTA). Our findings included two very distinct approaches to handling updates, which we will go over in more detail in this blog post.

The results of our survey included the following:

Read more

Using build information from Yocto to deploy software updates (part 2)

10th Nov 2015

In our previous post, we discussed the need to check compatibility for software and devices when designing a solution to deploy software updates. We also saw that this entails discovering the hardware device type and the supported device type by the software update.

In this post we will look at how Yocto and OpenEmbedded can be used to obtain this information for builds relying on them.

Read more

Using build information from Yocto to deploy software updates (part 1)

30th Oct 2015

When designing an embedded or IoT product, the problem of deploying software updates to the devices in the field quickly becomes a problem. The main drivers for having the ability to deploy updates are to fix bugs, security issues and add new features after the devices have left manufacturing. Not having a way to update the software or firmware puts companies at significant risk and competitive disadvantage.

In this post, we will look at some of the basic device information that needs to be in place to enable software updates.

Read more

The case for over-the-air software updates and patching the Internet of Things

7th Oct 2015

Embedded systems have existed since the Apollo space program - the Apollo Guidance Computer in the Lunar Module is regarded as the first embedded computer, enabling the historic mission to land mank...

Read more

Security updates for the Internet of Things (part 2)

31st Aug 2015

Part two of two - part one is available here.

The Internet of Things are:

  • Resource constrained
  • Field-deployed
    • These devices are beyond the “safety” of the corporate firewall
    • Manually repair...
Read more