The Internet of Things on AWS – Official Blog

Category: Internet of Things

How to build smart applications using Protocol Buffers with AWS IoT Core

Introduction to Protocol Buffers Protocol Buffers, or Protobuf, provide a platform-neutral approach for serializing structured data. Protobuf is similar to JSON, except it is smaller, faster, and is capable of automatically generating bindings in your preferred programming language. AWS IoT Core is a managed service that lets you connect billions of IoT devices and route […]

Building an OCPP-compliant electric vehicle charge point operator solution using AWS IoT Core

The shift from fossil fuels to electric powered vehicles is a key component of government and commercial commitments to achieve net-zero emissions by 2050. It is projected that the United States alone will require a national network of at least 500,000 electric vehicle (EV) chargers by 2030 to support the projected number of EVs on […]

Ingesting industrial media to Amazon Kinesis Video Streams using AWS IoT Greengrass V2 components

Introduction Organizations install hundreds of Internet Protocol (IP) cameras to increase security by surveilling indoor and outdoor spaces. This is a common need for manufacturing plant floors across industries such as automotive, commercial, Oil & Gas, public safety, and agri-tech. Companies connect cameras to the cloud to create a centralized view of their siloed data […]

How to replicate AWS IoT SiteWise resources across environments

Introduction As you scale your AWS IoT SiteWise applications and move them into production, you may consider adopting common CI/CD methodologies that separate development and QA environments from production environments. This separation allows you to automate the deployment of these applications through deployment pipelines. You also may have multiple business units and/or industrial sites with […]

Enabling device maintenance across multiple time zones using AWS IoT Jobs

Introduction A benefit of Internet of things (IoT) technology is the ability to connect your devices to the cloud and easily access them from around the world. While this benefit has unlocked many opportunities, it has also has created a major challenge of keeping devices updated. Managing and maintaining a fleet of IoT devices spread […]

Convert Messages from IoT Devices to Voice Commands Using AWS IoT Core and Amazon Polly

AWS IoT Core is a fully managed service that lets you connect billions of IoT devices and route trillions of messages to AWS services without managing infrastructure. One of the key features of AWS IoT Core is Rules Engine. With Rules Engine, you can send data from your IoT devices to other services in AWS. […]

Route messages across multiple accounts with AWS IoT Core and Amazon SQS

Introduction In this blog, we explain how to route AWS IoT Core messages from one or more ingestion accounts to Amazon Simple Queue Service (Amazon SQS) in a data account. It is a common pattern to have IoT telemetry ingested into one account and then require it to be shipped to another account for further […]

Identify misconfigured IoT policies using AWS IoT Device Defender

Introduction We are excited to announce a new AWS IoT Device Defender audit feature to identify potential misconfigurations when using wild cards in Internet of Things (IoT) policies. AWS IoT Device Defender is a fully managed IoT security service that enables you to audit and monitor your IoT device fleet and secure your IoT configurations […]

Schedule remote operations using AWS IoT Device Management Jobs

Introduction Once Internet of Things (IoT) devices are deployed in the field, on-site intervention can be challenging, expensive, and may not be feasible due to technical and logistical constraints. The ability to perform remote updates on your IoT device software is an important factor that improves your IoT application’s lifespan and operational resilience, provisions the […]

Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender

Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]