Category

IOT & OTA

    Our guest blog post on Embedded Computing Design | Why we created Mender | Mender

    Our guest blog post on Embedded Computing Design | Why we created Mender

    We were a guest blog contributor on Embedded Computing Design with a post on why we created Mender. You can read about it here.
    Unikernels + connected devices | Mender

    Unikernels + connected devices

    By Thomas Ryd Do you want your connected device to be more secure, faster, more energy efficient, and easily managed? The promise of unikernels includes al
    Featured on Embedded.com: how to handle security threats for connected devices | Mender

    Featured on Embedded.com: how to handle security threats for connected devices

    Our good friend Clive Maxfield (@MaxMaxfield) helped us publish our article Handling Top Security Threats for Connected Devices. In the article, our Produc
    Firmware over-the-air: package-based vs image-based updates | Mender

    Firmware over-the-air: package-based vs image-based updates

    Here at Mender.io, we did a comprehensive survey with embedded developers and what they did with devices that required software updates over-the-air (OTA).
    The case for over-the-air software updates and patching the Internet of Things | Mender

    The case for over-the-air software updates and patching the Internet of Things

    Embedded systems have existed since the Apollo space program - the Apollo Guidance Computer in the Lunar Module is regarded as the first embedded computer,
    Security updates for the Internet of Things (part 2) | Mender

    Security updates for the Internet of Things (part 2)

    Part two of two - part one is available here. The Internet of Things are: Resource constrained Field-deployed These devices are beyond the “safety” of the
    Security updates for the Internet of Things (part 1) | Mender

    Security updates for the Internet of Things (part 1)

    Part one of two - part two is available here. A decade ago, managing security patches was not a top priority for most IT security personnel. Vulnerable sys