The Internet of Things on AWS – Official Blog

Mark Relph, Head of BD & Strategy for AWS IoT, presenting a keynote session at IoT World 2019

AWS Insights from IoT World 2019

  At IoT World Santa Clara, over 12,000 IoT leaders and innovators gathered to make connections and gain insights about how to digitally transform their businesses with IoT. The AWS IoT team spent the week meeting with customers and partners, sharing insights onstage, and showcasing a variety of AWS IoT use cases in AWS’s own and […]

Using AWS IoT to Create a Smart Home Water-Monitoring Solution

Using AWS IoT to Create a Smart Home Water-Monitoring Solution

2018 saw the fourth year of drought and the worst in recorded history for the city of Cape Town, South Africa. “Day zero” was a term coined by the city for the day when they would have to turn the water off for citizens. Fortunately, “day zero” was never realized, and Cape Town didn’t go […]

AWS Makes It Easier for Embedded Developers to Build IoT Applications with Additional Preconfigured Examples for FreeRTOS on Armv8-M Architectures

FreeRTOS is a real-time operating system for small, low-power devices. AWS maintains stewardship of the FreeRTOS kernel, a free and open operating system for microcontrollers that embedded developers have trusted and evolved for more than fifteen years. In the eighteen months that AWS has maintained the FreeRTOS project, we’ve updated it to use an MIT […]

Connecting Disparate Industrial Devices and Applications from the Plant Floor to AWS Using KEPServerEX

Connecting Disparate Industrial Devices and Applications from the Plant Floor to AWS Using KEPServerEX

When managing Industrial Internet of Things (IIoT) data, it can be challenging to collect and send this data to the cloud for processing and advanced analytics (for example, to predict quality or equipment failure). There might be many different devices on a manufacturing floor, each with its own protocol. In this blog post, we discuss […]

Deploy AWS IoT Greengrass as a Snap to Your Edge Devices

Note: AWS IoT Greengrass is no longer providing maintenance for the AWS IoT Greengrass core software version 1.11.x Snap, that is published on snapcraft.io. We maintain this post for historical reference. For the most up-to-date information, including any recent developments or optimizations related to AWS IoT Greengrass, we recommend consulting the latest AWS IoT Greengrass […]

Automating Security Remediation Using AWS IoT Device Defender

Note: The runtime parameter of Python 2.7 is no longer supported for creating or updating the AWS Lambda functions. We recommend you use a supported runtime while creating or updating functions. An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large […]

Use AWS IoT Device Management fleet indexing to identify and visualize fleet state

Note: This article references Node.js 8.10 (now deprecated) and Amazon CloudWatch Events (now Amazon EventBridge) – please use Node.js 20.x+ runtime and Amazon EventBridge console for current implementations. In this blog post, we’ll show you how to use new capabilities of AWS IoT Device Management fleet indexing. Starting now, you can use aggregation queries in […]

Using AWS IoT Services for Asset Condition Monitoring

Note: For latest guidance on asset monitoring, please refer to this blog instead. The Industrial Internet of Things (IIoT) presents an unparalleled opportunity for every industry to address core business challenges, such as reducing downtime, improving safety, increasing system output, reducing operating costs, and creating innovative services and business models. In this blog post, I […]

Use AWS IoT Device Defender to detect statistical anomalies and to visualize your device security metrics

AWS IoT Device Defender supports your efforts to secure your IoT device fleet. AWS IoT Device Defender Detect establishes a baseline behavior for IoT devices and then identifies devices that do not conform as anomalous. AWS IoT Device Defender Detect operates on security profiles, which are applied to the entire device fleet, or to a […]