The Internet of Things on AWS – Official Blog

Category: AWS IoT Platform

Route data directly from IoT Core to your web services

In this blog post, we will explain how you can use AWS IoT Core Rules Engine’s HTTP action to send data directly to your existing HTTPS endpoint without writing additional code or making changes to published code. With this feature, you can integrate AWS IoT with your own web services without additional latency and complexity […]

Read More
Chain of trust in a device starting from Applications and flowing down through Operating System, Hypervisor, Firmware and finally ending at the Hardware which forms the root of trust.

Using a Trusted Platform Module for endpoint device security in AWS IoT Greengrass

Co-authored by Aniruddh Chitre, AWS Solutions Architect This post demonstrates how AWS IoT Greengrass can be integrated with a Trusted Platform Module (TPM) to provide hardware-based endpoint device security. This integration ensures the private key used to establish device identity can be securely stored in tamper-proof hardware devices to prevent it from being taken out […]

Read More

Building a virtual fob with Amazon Key for Business and AWS IoT

For many people, getting a package delivered from Amazon is painless. However, problems can arise in access-controlled properties such as apartment complexes, condominiums, and businesses. This post tells how an Amazon team developed Amazon Key for Business to address this issue. Overview Amazon strives to make its package delivery process quick and easy for customers. […]

Read More
AWS re:Inforce June 25-26 2019

Your guide to AWS IoT at re:Inforce 2019

The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and […]

Read More

Provisioning with a bootstrap certificate in AWS IoT Core

One of the core tenets of managing IoT devices is provisioning, which is the process of registering a device on a particular platform or a system. When bootstrapping your devices, it’s important to establish mutual authentication between the device and an Internet of Things (IoT) endpoint to prevent threats like man-in-the-middle attacks. Device certificates are by […]

Read More

How to Install a Face Recognition Model at the Edge with AWS IoT Greengrass

Editor Note: This post is co-authored by Gong Xinyue, one of Global Accounts Solution Architects. You might already know how to use AWS IoT Core and AWS IoT Greengrass for remote device communication and control. With AWS IoT Greengrass Machine Learning (ML) Inference, you can run machine learning models on your local devices without any […]

Read More

Automating Security Remediation Using AWS IoT Device Defender

An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large scale, you need to keep your fleet protected by continuously checking if it is following security best practices. It can be challenging for organizations to audit all devices and automatically remediate […]

Read More

Using AWS IoT Services for Asset Condition Monitoring

The Industrial Internet of Things (IIoT) presents an unparalleled opportunity for every industry to address core business challenges, such as reducing downtime, improving safety, increasing system output, reducing operating costs, and creating innovative services and business models. In this blog post, I will show how you can use AWS IoT services to build an asset […]

Read More

Before Developing Real Devices: Exploring a Business Outcome with Simulated Devices

Realize business outcomes with the IoT Device Simulator, AWS IoT Analytics, Amazon QuickSight, Microsoft Power BI, and Tableau Customers often get wrapped up in slower hardware development cycles before they have real, potential business outcomes identified and agreed upon for their business. This post highlights how customers should consider using simulated devices to explore business […]

Read More