Mender blog

Showing posts tagged: mender x

Using build information from Yocto to deploy software updates (part 1)

When designing an embedded or IoT product, the problem of deploying software updates to the devices in the field quickly becomes a problem. The main drivers for having the ability to deploy updates are to fix bugs, security issues and add new features after the devices have left manufacturing. Not having a way to update the software or firmware puts companies at significant risk and competitive disadvantage.

In this post, we will look at some of the basic device information that needs to be in place to enable software updates.

Read the article

The case for over-the-air software updates and patching the Internet of Things

7th Oct 2015

Embedded systems have existed since the Apollo space program - the Apollo Guidance Computer in the Lunar Module is regarded as the first embedded computer, enabling the historic mission to land mankind on the Moon. Decades later, we are now in the age where embedded devices are being connected. The first wave was connected mobile phones, which have fundamentally changed the way we interact. As t...

Read the article

Security updates for the Internet of Things (part 2)

31st Aug 2015

Part two of two - part one is available here.

The Internet of Things are:

Resource constrained Field-deployed These devices are beyond the “safety” of the corporate firewall Manually repairing a “bricked” device is prohibitively expensive May be responsible for human safety, such as medical devices or connected cars

Given these constraints, having a robust process for security pat...

Read the article

Security updates for the Internet of Things (part 1)

13th Aug 2015

Part one of two - part two is available here.

A decade ago, managing security patches was not a top priority for most IT security personnel. Vulnerable systems were rarely updated and when they were it was an after thought. In the early 2000’s, most security professionals relied on network security to defend vulnerable systems and most assumed they could build strong defenses around vulnerabl...

Read the article