IoT Security – Part 3 of 3: IoT Cloud Security and IoT Application Security

This is the last and final part of our IoT security blog series. In this blog, we explain the security considerations to safeguard the IoT cloud computing platform and communication channels (PAN and WAN). We explore various security concepts such as encryption of data at rest & in transit, certificate based authentication, frequency hopping, SIM based authentication and much more!
November 6th, 2020

IoT Security – Part 2 of 3: Analysis of IoT Gateway Security

Here is part 2 of our IoT security blog series that explores holistic security elements. In this article, we familiarize you with the security components that constitute IoT Gateway Security. This includes security considerations at the device hardware/software level, Bluetooth PAN level and WAN level.
October 22nd, 2020

Linux OS Porting Best Practices for Embedded Systems

This blog explores the advantages offered by Linux for embedded system development. It also highlights the importance of selecting the right version of Linux for embedded projects and the best practices followed in the industry during development. HMI components, security considerations, library and API development, device tree setup, board bring-up, boot time optimization, power management – the blog explains all this and more!
August 21st, 2020