The Internet of Things on AWS – Official Blog

Category: Technical How-to

How to Bridge Mosquitto MQTT Broker to AWS IoT

UPDATE: The original blog post written on August 18th 2016 has been updated to this current version with the help of the author Michael Garcia (Principal Solutions Architect at AWS) and Anish Yadav (Cloud Support Associate at AWS). Whether it is in the context of industrial IoT or in connected homes, gateways are present in […]

Read More
This image showcases the Provisioning by Claim workflow described in this blog post.

How to automate onboarding of IoT devices to AWS IoT Core at scale with Fleet Provisioning

Customers use AWS IoT to analyze the data generated by their IoT devices to quickly gain meaningful insights about their business. This helps them solve a variety of problems, such as identifying required improvements to their manufacturing processes, predicting device failures, or quickly diagnosing and troubleshooting device issues for their customers.  However, before IoT devices […]

Read More
Connecting disparate industrial systems to AWS using Ignition Edge

Connecting disparate industrial systems to AWS using Ignition Edge

Enabling operational data connectivity to AWS IoT Greengrass seamlessly extends AWS to the edge to provide tools to act locally on the OT data, while still using the cloud for management, analytics, and durable storage. With AWS IoT Greengrass and the Cirrus Link MQTT Transmission module on the Ignition platform from Inductive Automation, industrial data […]

Read More
asset monitoring solution

Monitor IoT device geolocation with AWS IoT Events

Organizations with large numbers of IoT devices need efficient solutions to track events occurring across multiple devices, in order to identify operational issues and act upon them. This post covers the use case of a fictitious organization AcmeTracker that offers services to track the geolocation of a wide suite of assets (such as vehicles), by […]

Read More
scaling-authorization-policies-with-aws-iot-core

Scaling authorization policies with AWS IoT Core

Introduction Solutions architects, developers, and system designers building IoT solutions need ways to properly secure data and functions that operate on data across the entire solution landscape. In this post, we describe a few design options for scaling authorization policies focused on multi-user and multi-device use cases with AWS IoT Core. We cover several scenarios, […]

Read More
Improving the management and security of your AWS IoT resources with tagging

Improving the management and security of your AWS IoT resources with tagging

Solution providers operating environments such as smart building, utilities, manufacturing systems, and connected products offer business-to-business services often based on IoT platforms deployed in multitenant deployments. Securely managing those resources by use case, types, locations and by tenants can sometime be hard. Creating hierarchical grouping of things is a common pattern, but it does not […]

Read More