The Internet of Things on AWS – Official Blog
Connect your devices to AWS IoT using LoRaWAN
4/15/21 AWS IoT Editorial Team Update: Since the time of this blog post, we have announced AWS IoT Core for LoRaWAN. AWS IoT Core for LoRaWAN is a fully-managed feature that allows you to connect and manage wireless devices that use LoRaWAN connectivity with the AWS Cloud. Using AWS IoT Core for LoRaWAN, enterprises can setup […]
Integrating AWS IoT and AWS Greengrass into the Automotive Grade Linux Software Stack
Post by Hitendra Nishar, AWS Solutions Builder Automotive Grade Linux (AGL) is an open source project to accelerate the development and adoption of a fully open software stack for connected vehicles. AGL is building a Linux-based, open software platform that can serve as the de facto industry standard and enable rapid development of new features […]
Configuring Cognito User Pools to Communicate with AWS IoT Core
AWS IoT Core supports certificate-based mutual authentication, custom authorizers, and Amazon Cognito Identity as way to authenticate requests to the AWS IoT device gateway. Amazon Cognito User Pools was made generally available last year. It allows customers to easily add user sign up and sign in to mobile and web apps. You can use Cognito […]
Detect anomalies on connected devices using AWS IoT Device Defender
We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]
How AWS IoT Core is Helping Customers Navigate the Upcoming Distrust of Symantec Certificate Authorities
NOTE: This blog post describes important public key infrastructure (PKI) issues related to browser and mobile application connectivity to AWS IoT Core. For information about public key certificates and TLS, see Chain of Trust and Certificate Authorities in High Performance Browser Networking. Overview Google, Apple, and Mozilla have announced that, starting October, 2018, they will […]
Using AWS IoT for Predictive Maintenance
The blog post references AWS IoT Analytics, which is no longer available to new customers and will end support on December 15, 2025. For implementation guidance and alternatives, see the service migration support section at the end of this article. The interest in machine learning for industrial and manufacturing use cases on the edge is […]
Using Continuous Jobs with AWS IoT Device Management
In an earlier Using Over-the-Air Updates with AWS IoT Device Management blog post, we showed you how to create a simple AWS IoT snapshot job and track its progress. In this post, we will show you step-by-step how to configure and create an AWS IoT continuous job. A continuous job is a long running job […]
Using Chainer Neural Network Framework with AWS Greengrass ML Inference
Starting today, Greengrass ML inference includes a pre-built Chainer package for all devices powered by Intel Atom, NVIDIA Jetson TX2, and Raspberry Pi. So, you don’t have to build and configure the ML framework for your devices from scratch. With this launch, we now provide pre-built packages for three popular machine learning frameworks including TensorFlow, […]
How to Implement MQTT with TLS Client Authentication on Port 443 from Client Devices (Python)
Update: AWS IoT Core has simplified the connection process—devices no longer need to implement the Transport Layer Security (TLS) Application Layer Protocol Negotiation (ALPN) extension to determine authentication type and protocol. This means that client devices can connect to AWS IoT Core with MQTT over port 443 without implementing ALPN. For additional details, please refer […]
Using Device Jobs for Over-the-Air Updates
Whether it’s a firmware update or security patch, an update to a config file on a device, or a factory reset, all products need maintenance after they are in your customers’ hands. And to manage your fleet, you need to know which devices in your fleet have received and processed, either successfully or unsuccessfully, any […]