The Internet of Things on AWS – Official Blog

What actions customers can take to protect, detect, and respond to Log4j vulnerabilities in Operational Technology (OT) and Industrial Internet of Things (IIoT) environments

In this post we will provide guidance to help industrial customers respond to the recently disclosed Log4j vulnerability. This post covers how to identify if you are susceptible to the issue, and then how to address the vulnerability in OT and IIoT environments. The Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) is a critical vulnerability (CVSS 3.1 base […]

Read More

How to remote access devices from a web browser using secure tunneling

Using firewalls is a common way to protect and secure access to IoT devices. Yet, it’s challenging to access and manage devices deployed at remote sites, behind firewalls that block all inbound traffic. Troubleshooting devices can involve sending technicians onsite to connect to those devices. This increases the complexity and the cost of device management. […]

Read More

Strengthening Operational Insights for Industrial Assets with AWS IoT AIML Solution (part 2)

In this two-part blog post, we propose an AWS IoT AI/ML solution to help our industrial customers for efficiently monitoring industrial assets in a scalable manner. Part 1 of the blog shows: How to create an asset simulator with AWS IoT SiteWise; How to create data pipeline to integrate Amazon Lookout for Equipment with AWS […]

Read More

Strengthening Operational Insights for Industrial Assets with AWS IoT AIML Solution (part 1)

Customers that manage and maintain industrial assets strive to keep them functioning as efficiently as possible, which they can do by monitoring and analyzing the health of their assets. Plant operators measure efficiency with key performance indicators (KPIs) like overall equipment effectiveness (OEE) or mean time before failure (MTBF) and act to improve these metrics […]

Read More

Collecting vehicle data more efficiently with AWS IoT FleetWise

Today, we think of connected vehicles as an advanced class of vehicle with internet connectivity. However, we will soon refer to these simply as vehicles, since by 2030, over 95 percent of new vehicles sold globally will be connected to the internet, up from about 50 percent today.¹ Greater vehicle connectivity gives automakers opportunities to […]

Read More

Introducing AWS IoT ExpressLink, making it faster and easier to develop secure IoT devices

Introduction Developing and deploying secure IoT products can be challenging. It can often take months, or even years to connect a product securely to the cloud in a way that is scalable and easy to maintain for the life of the product. Today, IoT products require developers to handle a complex software stack and master […]

Read More
Screenshot of Waste_Container.glb viewed in Visual Studio Code

How to convert CAD assets to glTF for use with AWS IoT TwinMaker

Customers often have existing 3D CAD (Computer-aided Design) assets that they would like to use with AWS IoT TwinMaker. CAD files are either proprietary formats optimized for use in proprietary applications or interchange formats designed for moving CAD data from one application to another. They are not usually compatible with realtime WebGL viewports like those […]

Read More
Dashboard in Grafana of Floor 6 where half of floor is highlighted indicating an issue. Time series graph of temperature illustrating the temperature crossing the alarm threshold

Improving building operational performance with Cognizant 1Facility and AWS IoT TwinMaker

Post also written by Shardul Pradhan and Ramesh Yechangunja from Cognizant Introduction Recent market conditions have stressed the commercial building management market due to the increased cost of construction, reduced occupancy, and increased cost of labor to monitor and maintain buildings. This is fueling the need for smarter and safer buildings. According to research from […]

Read More

How to implement zero trust IoT solutions with AWS IoT

Introduction Zero trust is often misunderstood. It’s not a product but a security model and associated set of architectural principles and patterns. One of the main challenges customers face is determining how zero-trust principles can be applied to Internet of Things (IoT) and how to get started with incorporating zero trust with Amazon Web Services […]

Read More