Mender blog

Beaglebone and Raspberry Pi: a general comparison

19th Jul 2021

Beaglebone has a key strength over Raspberry Pi and that is the larger number of input and output ports on the board. Beaglebone has 96 ports compared to 40 with the Raspberry Pi. The Beaglebone also features analogue inputs, important for directly connecting analogue sensors whereas Raspberry has digital inputs only. The BeagleBone features impressive Input/Output capabilities: the board has a di...

Read the article

Beaglebone working with Linux operating systems Debian, Yocto and OTA updates

19th Jul 2021

In general, Beaglebone is more customizable so you will strip out what you don’t need. You will use the processing power to run your applications and not the OS, then you would need to focus on ensuring your OS is always up to date, more frequently using OTA updates to run the latest libraries. With Raspberry Pi with more processing power, you will need less control. So it comes back to the entry...

Read the article

Setting up Beaglebone for an Embedded Linux project

19th Jul 2021

There are many different board options for an IoT project. Perhaps for most users, Beaglebone < https://beagleboard.org/ > would not be the first choice. The wider support options and easier path to set up out of the box make Raspberry Pi a more popular option. The Beaglebone Project is a relatively old board project with the Beaglebone having been first released in 2013. There are projects out th...

Read the article

Mender 3.0 release: Synchronized OTA Software Update

15th Jul 2021

We are excited to announce the Mender 3.0 LTS release!

Mender 3.0 introduces new features to get full control over the progress of the update, both centrally through Synchronized update as well as with device application through brand new Mender Device-side API using D-Bus.

We also released maintenance releases 2.7.1 and 2.6.2 which contain stability improvements, but no new features. If you a...

Read the article

What are the IoT security threats?

13th Jul 2021

Implementing a system for provisioning OTA software updates is part of best practice in a strategy to deal with IoT security threats. The best way is to put in place a Zero trust architecture . OTA updates can be scheduled to deliver CVE updates automatically and to scale and to anticipate and patch vulnerabilities minimising the threat vectors. What are the threat types that need to be consider...

Read the article