The Internet of Things on AWS – Official Blog

Provisioning with a bootstrap certificate in AWS IoT Core

Provisioning with a bootstrap certificate in AWS IoT Core

One of the core tenets of managing IoT devices is provisioning, which is the process of registering a device on a particular platform or a system. When bootstrapping your devices, it’s important to establish mutual authentication between the device and an Internet of Things (IoT) endpoint to prevent threats like man-in-the-middle attacks. Device certificates are by […]

Read More

Injecting data into AWS IoT Analytics from Amazon Kinesis Data Streams

It is easy to ingest device data directly from connected IoT devices as they are integrated with AWS IoT Core. However, AWS IoT Analytics also provides a public BatchPutMessage API action to allow you to inject data from other data resources. In this post, I show how to inject data into AWS IoT Analytics from […]

Read More
Mark Relph, Head of BD & Strategy for AWS IoT, presenting a keynote session at IoT World 2019

AWS Insights from IoT World 2019

  At IoT World Santa Clara, over 12,000 IoT leaders and innovators gathered to make connections and gain insights about how to digitally transform their businesses with IoT. The AWS IoT team spent the week meeting with customers and partners, sharing insights onstage, and showcasing a variety of AWS IoT use cases in AWS’s own and […]

Read More
Using AWS IoT to Create a Smart Home Water-Monitoring Solution

Using AWS IoT to Create a Smart Home Water-Monitoring Solution

2018 saw the fourth year of drought and the worst in recorded history for the city of Cape Town, South Africa. “Day zero” was a term coined by the city for the day when they would have to turn the water off for citizens. Fortunately, “day zero” was never realized, and Cape Town didn’t go […]

Read More

AWS Makes It Easier for Embedded Developers to Build IoT Applications with Additional Preconfigured Examples for FreeRTOS on Armv8-M Architectures

FreeRTOS is a real-time operating system for small, low-power devices. AWS maintains stewardship of the FreeRTOS kernel, a free and open operating system for microcontrollers that embedded developers have trusted and evolved for more than fifteen years. In the eighteen months that AWS has maintained the FreeRTOS project, we’ve updated it to use an MIT […]

Read More
How to Install a Face Recognition Model at the Edge with AWS IoT Greengrass

How to Install a Face Recognition Model at the Edge with AWS IoT Greengrass

Editor Note: This post is co-authored by Gong Xinyue, one of Global Accounts Solution Architects. You might already know how to use AWS IoT Core and AWS IoT Greengrass for remote device communication and control. With AWS IoT Greengrass Machine Learning (ML) Inference, you can run machine learning models on your local devices without any […]

Read More
Connecting Disparate Industrial Devices and Applications from the Plant Floor to AWS Using KEPServerEX

Connecting Disparate Industrial Devices and Applications from the Plant Floor to AWS Using KEPServerEX

When managing Industrial Internet of Things (IIoT) data, it can be challenging to collect and send this data to the cloud for processing and advanced analytics (for example, to predict quality or equipment failure). There might be many different devices on a manufacturing floor, each with its own protocol. In this blog post, we discuss […]

Read More

Deploy AWS IoT Greengrass as a Snap to Your Edge Devices

Canonical and AWS have collaborated to offer AWS IoT Greengrass as snap, a containerized software package that can run on a variety of Linux distributions. The combination of AWS IoT Greengrass and Ubuntu Core provides IoT developers with a fast path from development to production for their secure device. The AWS IoT Greengrass snap, available […]

Read More

Automating Security Remediation Using AWS IoT Device Defender

An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large scale, you need to keep your fleet protected by continuously checking if it is following security best practices. It can be challenging for organizations to audit all devices and automatically remediate […]

Read More