The Internet of Things on AWS – Official Blog
Configuring Cognito User Pools to Communicate with AWS IoT Core
AWS IoT Core supports certificate-based mutual authentication, custom authorizers, and Amazon Cognito Identity as way to authenticate requests to the AWS IoT device gateway. Amazon Cognito User Pools was made generally available last year. It allows customers to easily add user sign up and sign in to mobile and web apps. You can use Cognito […]
Detect anomalies on connected devices using AWS IoT Device Defender
We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]
How AWS IoT Core is Helping Customers Navigate the Upcoming Distrust of Symantec Certificate Authorities
NOTE: This blog post describes important public key infrastructure (PKI) issues related to browser and mobile application connectivity to AWS IoT Core. For information about public key certificates and TLS, see Chain of Trust and Certificate Authorities in High Performance Browser Networking. Overview Google, Apple, and Mozilla have announced that, starting October, 2018, they will […]
Ensure Secure Communication with AWS IoT Core Using the Certificate Vending Machine Reference Application
X.509 certificates are used to ensure secure communication between IoT devices and AWS IoT Core. Devices use these certificates to connect to AWS IoT Core using TLS mutual authentication. AWS IoT Core uses TLS mutual authentication to encrypt data as it moves between AWS IoT Core and other devices or other AWS services. A X.509 certificate […]
Using AWS IoT for Predictive Maintenance
The interest in machine learning for industrial and manufacturing use cases on the edge is growing. Manufacturers need to know when a machine is about to fail so they can better plan for maintenance. For example, as a manufacturer, you might have a machine that is sensitive to various temperature, velocity, or pressure changes. When […]
Using Continuous Jobs with AWS IoT Device Management
In an earlier Using Over-the-Air Updates with AWS IoT Device Management blog post, we showed you how to create a simple AWS IoT snapshot job and track its progress. In this post, we will show you step-by-step how to configure and create an AWS IoT continuous job. A continuous job is a long running job […]
Using Chainer Neural Network Framework with AWS Greengrass ML Inference
Starting today, Greengrass ML inference includes a pre-built Chainer package for all devices powered by Intel Atom, NVIDIA Jetson TX2, and Raspberry Pi. So, you don’t have to build and configure the ML framework for your devices from scratch. With this launch, we now provide pre-built packages for three popular machine learning frameworks including TensorFlow, […]
How M3 Health Used AWS IoT 1-Click to Improve Healthcare Delivery
M3 Health is a strategic technology partner serving the healthcare and life sciences industries. With almost 20 years of experience developing and delivering innovative technology solutions, they enable their clients to better engage their audience, and solve the challenges they face to improve communications, drive sales, and ensure customer loyalty. When they decided to create […]
How to Implement MQTT with TLS Client Authentication on Port 443 from Client Devices (Python)
Application Layer Protocol Negotiation (ALPN) is an extension to TLS that enables clients connecting to a TLS server to pass an extra parameter, known as a ProtocolNameList. The ProtocolNameList is a preference-ordered list of the application protocols that the client would like to use to communicate. AWS IoT Core now allows you to connect devices […]
Using Device Jobs for Over-the-Air Updates
Whether it’s a firmware update or security patch, an update to a config file on a device, or a factory reset, all products need maintenance after they are in your customers’ hands. And to manage your fleet, you need to know which devices in your fleet have received and processed, either successfully or unsuccessfully, any […]