The Internet of Things on AWS – Official Blog

Category: Technical How-to

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Post by Angela Wang and Tanner McRae, Senior Engineers on the AWS Solutions Architecture R&D and Innovation team This post is the third in a series on how to build and deploy a custom object detection model to the edge using Amazon SageMaker and AWS IoT Greengrass. In the previous 2 parts of the series, we walked […]

Managing Docker container lifecycle with AWS IoT Greengrass

Introduction In this post, we will be discussing how to manage Docker container lifecycle using an AWS IoT Greengrass custom component. There are five phases in a Docker container lifecycle: create, run, pause/unpause, stop, and kill. The custom component interacts with the Docker Engine via the Docker SDK for Python to manage processes based on […]

Introducing new MQTTv5 features for AWS IoT Core to help build flexible architecture patterns

Introduction We are excited to announce that AWS IoT Core now supports MQTTv5 features that help enhance communications of large-scale device deployments and innovate device messaging patterns. Customers who already have MQTTv3.1.1 deployments can make use of the new MQTTv5 features as AWS IoT Core provides seamless integration between both versions and supports heterogeneous deployments […]

Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub

Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]

Connect to remote devices using AWS IoT Secure Tunneling

Introduction When devices are deployed behind restricted firewalls at remote sites, you need a way to gain access to those devices for troubleshooting, configuration updates, and other operational tasks. This is where, secure tunneling, a feature of AWS IoT Device Management has been helping customers to do remote tasks. To help elevate customers even further, AWS has […]

Impacting Food Waste & Foodborne Illness with AWS IoT Core for LoRaWAN Cold-Chain Sensors

Introduction Impacting Food Waste & Food-borne Illness with AWS IoT Core for LoRaWAN Cold-Chain Sensors Innovative ideas and technologies allow us to improve the efficiency and safety of the food industry. In that sense, ConnectedFresh’s IoT solutions provide the ability to continuously monitor food temperatures throughout production, processing, transportation, and retailing. This blog will highlight […]

Importing AWS IoT Device Defender audit and detect findings into Security Hub

Introduction In this post, you’ll learn how the integration of IoT security findings into AWS Security Hub works, and you can download AWS CloudFormation templates to implement the solution. After you deploy the solution, every AWS IoT Device Defender audit and detect finding will be recorded as a Security Hub finding. The findings within Security […]

Designing a Single Pane of Glass for Securing your Globally Deployed IoT-Workload

Introduction Companies are investing in large-scale Internet of Things (IoT) projects and deploying global scale IoT platform such as Deutsche Bahn or Carrier. Enterprises are looking for a solution that offers a multi-tenant Single Pane of Glass Device Lifecycle Management (DLM) which caters to both IT and OT operations. In this blog we will focus […]

Integrating AWS IoT SiteWise and Fleet Hub with IAM Identity Center and Okta

Introduction Many organizations are using an external identity provider to manage user identities. With an identity provider (IdP), you can manage your user identities outside of AWS and give these external user identities permissions to use AWS resources in your AWS accounts. External identity providers (IdP), such as Okta Universal Directory, can integrate with AWS […]

Detect Cryptocurrency Mining Threats on Edge Devices using AWS IoT

Introduction Machine learning (ML) at the edge requires powerful edge requires powerful edge devices with a unique set of requirements. The availability, safety, and security requirements for the edge differ from cloud since they are located at the customer site, outside the data center, and interface directly with operational technology (OT) and the internet. Since […]