Updates of the terms of service for Hosted Mender
On October 10, 2022, we’re updating our terms of service for Hosted Mender. You can review the updated terms here. This update covers the inclusion of a separate Yocto Layer license to comply with the license requirements in the Yocto Project. Please make sure you read the updates to the terms. By continuing to use Hosted Mender after this date, you are agreeing to the updated terms. Thank y...Read the article
Remote OTA Updates for Wind River Linux
Wind River is one of the biggest enterprise grade Yocto-based Linux providers. In late 2019 they released their LTS19 version based on Yocto Zeus (3.0).
As Mender is also compatible with selected Yocto releases including Zeus, the integration with Wind River Linux just requires some small tweaks to make it work seamlessly. In this tutorial we will describe basic steps required to make both wor...Read the article
Two Factor Authentication is now available in all the Hosted Mender plans
Two Factor Authentication (2FA) is an extra layer of protection for user authentication with OTP-compatible applications like Authly and Google Authenticator.
This feature is now available to all the Hosted Mender users independently from their subscription plan.
You can enable Two Factor Authentication on your profile’s page, selecting the “Enable Two Factor authentication” option and followi...Read the article
Personal Access Tokens simplify the API-based integration with Hosted Mender
It is now possible to generate and use Personal Access Tokens on Hosted Mender when performing management API calls.
Before the introduction of this feature, the only way to obtain a JWT token to perform API calls was using the log-in end-point. However, the token returned lasts one week only. Therefore, storing and reusing it, for example, from a CI/CD pipeline or a scheduled job, is not practi...Read the article
Using QEMU Virtualized Environments to Develop and Deploy Embedded Software for x86 LinuxIntroduction
Before shipping software for embedded devices, it is crucial to test it on real devices, in an environment as close to the actual operating environment as possible. But that does not mean that development and testing necessarily has to happen this way. Running on real devices can often be tedious, time consuming and in some cases may be impractical.
This article will be a step-b...Read the article