1. AWS IoT allows devices to communicate with each other and applications using MQTT protocol. It acts as a broker between devices and applications.
2. The Rules Engine in AWS IoT can transform and route incoming data from devices to other endpoints like Lambda functions, databases or SNS.
3. Device Shadows in AWS IoT create virtual representations of devices that can receive messages even when devices are offline, and sync the latest state to devices when they reconnect.
Introduce how to setting AWS IoT CLI package in Ubuntu 14.04, and describes the characteristics of the platform, such as device gateway. thing shadow, etc.
This session will introduce best practices for IoT security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. As a result, you are able to scale and innovate, while maintaining a secure environment.
AWS DevDay San Francisco, June 21, 2016.
Presenter: Rameez Loladia
Join us for a broad overview of IoT at AWS and learn about how the AWS IoT service acts as the gateway to a number of AWS services to provide a complete IoT solution. By using AWS IoT with AWS Lambda, Amazon Kinesis, Amazon S3, and Amazon DynamoDB, you can develop powerful and flexible IoT solutions with drastically reduced overhead.
AWS DevDay San Francisco, June 21, 2016.
Presenter: John Burry, Senior Manager, Solutions Architecture
This webinar based on this presentation dives deep into the AWS IoT service that was announced at AWS re:Invent in October 2015. Will cover the components of the AWS IoT platform, demonstrate the AWS IoT Console and command line experience and outline the client-side SDKs that AWS provides to help developers build rich applications for their devices, whilst removing the heavy lifting associated with creating a scalable, secure and reliable set of cloud services to support these applications.
You can find a recording of this webinar on YouTube here: https://youtu.be/0X54z4fzN9g
The document provides an overview of AWS IoT including:
- What AWS IoT is and how it securely connects devices to AWS and applications
- Key components like the device SDK, gateway, rules engine, shadow, and registry
- Examples of how AWS IoT can be used for device management, rules processing, and integrating devices with AWS services and applications.
In this session, you will learn how to build real-time mobile and web applications that interact over WebSockets. We will dig into how AWS IoT supports MQTT over the WebSocket protocol to enable browser-based and remote applications to send and receive data from AWS IoT connected devices using AWS credentials. Furthermore, we will show you how to use AWS IoT Device SDKs to connect your device to AWS IoT when making a WebSocket connection.
AWS DevDay San Francisco, June 21, 2016
Presenter: David Yanacek, Principal Engineer, AWS IoT
This document provides an overview of AWS IoT Foundations. It begins with an introduction to IoT and why cloud computing is important for handling large amounts of IoT data. It then covers the key concepts of AWS IoT including the MQTT protocol, device SDK, device gateway, rules engine, device shadow, and pricing. Demo sessions are included to illustrate how various AWS IoT components work. Upcoming webinars and events on advanced AWS IoT topics are also advertised.
Introduce how to setting AWS IoT CLI package in Ubuntu 14.04, and describes the characteristics of the platform, such as device gateway. thing shadow, etc.
This session will introduce best practices for IoT security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. As a result, you are able to scale and innovate, while maintaining a secure environment.
AWS DevDay San Francisco, June 21, 2016.
Presenter: Rameez Loladia
Join us for a broad overview of IoT at AWS and learn about how the AWS IoT service acts as the gateway to a number of AWS services to provide a complete IoT solution. By using AWS IoT with AWS Lambda, Amazon Kinesis, Amazon S3, and Amazon DynamoDB, you can develop powerful and flexible IoT solutions with drastically reduced overhead.
AWS DevDay San Francisco, June 21, 2016.
Presenter: John Burry, Senior Manager, Solutions Architecture
This webinar based on this presentation dives deep into the AWS IoT service that was announced at AWS re:Invent in October 2015. Will cover the components of the AWS IoT platform, demonstrate the AWS IoT Console and command line experience and outline the client-side SDKs that AWS provides to help developers build rich applications for their devices, whilst removing the heavy lifting associated with creating a scalable, secure and reliable set of cloud services to support these applications.
You can find a recording of this webinar on YouTube here: https://youtu.be/0X54z4fzN9g
The document provides an overview of AWS IoT including:
- What AWS IoT is and how it securely connects devices to AWS and applications
- Key components like the device SDK, gateway, rules engine, shadow, and registry
- Examples of how AWS IoT can be used for device management, rules processing, and integrating devices with AWS services and applications.
In this session, you will learn how to build real-time mobile and web applications that interact over WebSockets. We will dig into how AWS IoT supports MQTT over the WebSocket protocol to enable browser-based and remote applications to send and receive data from AWS IoT connected devices using AWS credentials. Furthermore, we will show you how to use AWS IoT Device SDKs to connect your device to AWS IoT when making a WebSocket connection.
AWS DevDay San Francisco, June 21, 2016
Presenter: David Yanacek, Principal Engineer, AWS IoT
This document provides an overview of AWS IoT Foundations. It begins with an introduction to IoT and why cloud computing is important for handling large amounts of IoT data. It then covers the key concepts of AWS IoT including the MQTT protocol, device SDK, device gateway, rules engine, device shadow, and pricing. Demo sessions are included to illustrate how various AWS IoT components work. Upcoming webinars and events on advanced AWS IoT topics are also advertised.
This document describes setting up a system to capture IoT data streams using both AWS IoT and Kinesis. Rules are configured to activate a Direct-To-Kinesis stream during certain events to capture real-time data. Lambda functions are created to handle logging, process Kinesis stream data, and publish updates to device shadows to control the streaming state. The code sample connects a device, sends test messages, and demonstrates switching between AWS IoT and Kinesis streaming based on the device shadow state.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, as well as integrate devices with other AWS services to create secure solutions.
Learning Objectives:
• Common IoT Thing Management Issues
• Learn about AWS IoT Security and Access Control Mechanisms
• Build Secure interactions with the AWS Cloud
Who Should Attend:
• Technical Decision Makers, Developers, Makers
Webinar - AWS 201 IoT with AWS - Smart devices powered by the cloudAmazon Web Services
Connected devices are all around us. From tiny sensors with Arduinos and Raspberry Pi's, to TV's, thermostats and turbines. Join this session to see how you can harness the low cost, scalable and automated utility cloud computing services to ingest, store and compute the data streams sent by these devices. Learn how you can add value with an analytics, insights and feedback control loop, through real life customer examples.
This document provides an overview of an advanced AWS IoT training session. The agenda includes recaps of AWS IoT foundations, a discussion of the device registry, security features, SDKs, and AWS IoT Button and GreenGrass. It describes components like rules engines, device shadows and gateways. Demo sessions are planned on the registry, security, SDKs and IoT Button. Pricing details are given for AWS IoT GreenGrass cores. The training aims to help attendees master advanced AWS IoT topics.
AWS IoT is a new managed service that enables Internet-connected things (sensors, actuators, devices, and applications) to easily and securely interact with each other and the cloud. In this session, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using protocol of their choice. We will discuss how devices can connect securely connect using MQTT, HTTP protocols and how can developers and businesses leverage several features of AWS IoT Rules Engine, Thing Shadow to build a real connected product. You don't want to miss this session if you are a maker or manufacturer of a connected device. We have a cool giveaway for you at the end of the session!
The document discusses setting up a Lambda function and AWS IoT rule to handle disconnection events from an IoT device using MQTT's Last Will and Testament (LWT) feature. When the device connection terminates unexpectedly, LWT will publish a disconnect message to a topic that triggers the Lambda function. The function logs the disconnect event. The code example modifies the device client to define an LWT message payload and topic so it can notify of disconnections.
AWS Re:Invent - Securing HIPAA Compliant Apps in AWSControl Group
Control Group's David Rocamora and Pronia's Brian Besterman presented a case study on migrating HIPAA compliant applications in AWS at the AWS Re:Invent Conference on Nov. 29, 2012
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible
This document discusses Aptible and Telepharm's use of AWS services to build HIPAA-compliant applications. It provides an overview of AWS compliance certifications and HIPAA-eligible AWS services. It then discusses how Aptible implements technical, physical and administrative safeguards required by HIPAA, including delegating responsibilities and standardizing/automating security practices like SSH access control and encryption. Telepharm's requirements around access control, auditing and scalable ePHI storage/processing are also outlined.
Building IAM for OpenStack, presented at CIS (Cloud Identity Summit) 2015.
Discuss Identity Sources, Authentication, Managing Access and Federating Identities
Intro to the FIWARE Lab: Setting Up Your Virtual Infrastructure Using FIWARE Lab Cloud, by Fernando López.
1st FIWARE Summit, Málaga, Dec. 13-15, 2016.
Chef and Apache CloudStack (ChefConf 2014)Jeff Moody
This document discusses using Chef with Apache CloudStack and Citrix CloudPlatform for automation and configuration management. It provides an overview of CloudStack and CloudPlatform, and explains two Chef knife plugins - knife-cloudstack and knife-cloudstack-fog. knife-cloudstack-fog provides comprehensive API coverage for provisioning CloudStack servers using Chef. The document also covers options for getting started with CloudStack and discusses future plans, like testing and merging the plugins.
An introduction to the current state of cloud computing- microservices, containers, and serverless- and an exploration of how to use Identity and Access Management to secure cloud resources and Software as a Service (SaaS)
Reply Webinar Online - Mastering AWS - DB as a ServiceAndrea Mercanti
This document provides an agenda for a webinar on database as a service on Amazon Web Services (AWS). The webinar will cover Amazon Relational Database Service (RDS), Amazon DynamoDB, Amazon Elasticache, Amazon Redshift, and the AWS Database Migration Service. It will discuss the benefits of using AWS database services, including ease of administration, high performance, scalability, availability and cost effectiveness. It will also address questions on each of the database services.
This session will introduce best practices for IoT security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. As a result, you are able to scale and innovate, while maintaining a secure environment.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into:
Understanding token formats
Pros and Cons of each format in Production
Performance across multiple data centers
Token revocation workflow for each of the formats
Horizon usage of the different token types
We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.
Hands-on Lab to compare and contrast relational queries (using RDS for MySQL) with non-relational queries (using ElastiCache for Redis). You’ll need a laptop with a Firefox or Chrome browser.
by Jeff Duffy, Database Specialist Solution Architect, AWS
Database Week at the AWS Loft is an opportunity to learn about Amazon’s broad and deep family of managed database services. These services provide easy, scalable, reliable, and cost-effective ways to manage your data in the cloud. We explain the fundamentals and take a technical deep dive into Amazon RDS and Amazon Aurora relational databases, Amazon DynamoDB non-relational databases, Amazon Neptune graph databases, and Amazon ElastiCache managed Redis, along with options for database migration, caching, search and more. You'll will learn how to get started, how to support applications, and how to scale.
We believe that security *IS* a shared responsibility, - when we give developers the power to create infrastructure, security became their responsibility, too.
During this meetup, we'd like to share our experience with implementing security best practices, to be implemented directly by development teams to build more robust and secure cloud environments. Make cloud security your team's sport!
AWS October Webinar Series - Getting Started with AWS IoTAmazon Web Services
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
In this webinar, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using protocol of their choice. We will discuss how devices can securely connect using MQTT and HTTP protocols, and how developers and businesses can leverage features of AWS IoT like Thing Shadows and Rules Engine to build a real connected product.
This document describes setting up a system to capture IoT data streams using both AWS IoT and Kinesis. Rules are configured to activate a Direct-To-Kinesis stream during certain events to capture real-time data. Lambda functions are created to handle logging, process Kinesis stream data, and publish updates to device shadows to control the streaming state. The code sample connects a device, sends test messages, and demonstrates switching between AWS IoT and Kinesis streaming based on the device shadow state.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, as well as integrate devices with other AWS services to create secure solutions.
Learning Objectives:
• Common IoT Thing Management Issues
• Learn about AWS IoT Security and Access Control Mechanisms
• Build Secure interactions with the AWS Cloud
Who Should Attend:
• Technical Decision Makers, Developers, Makers
Webinar - AWS 201 IoT with AWS - Smart devices powered by the cloudAmazon Web Services
Connected devices are all around us. From tiny sensors with Arduinos and Raspberry Pi's, to TV's, thermostats and turbines. Join this session to see how you can harness the low cost, scalable and automated utility cloud computing services to ingest, store and compute the data streams sent by these devices. Learn how you can add value with an analytics, insights and feedback control loop, through real life customer examples.
This document provides an overview of an advanced AWS IoT training session. The agenda includes recaps of AWS IoT foundations, a discussion of the device registry, security features, SDKs, and AWS IoT Button and GreenGrass. It describes components like rules engines, device shadows and gateways. Demo sessions are planned on the registry, security, SDKs and IoT Button. Pricing details are given for AWS IoT GreenGrass cores. The training aims to help attendees master advanced AWS IoT topics.
AWS IoT is a new managed service that enables Internet-connected things (sensors, actuators, devices, and applications) to easily and securely interact with each other and the cloud. In this session, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using protocol of their choice. We will discuss how devices can connect securely connect using MQTT, HTTP protocols and how can developers and businesses leverage several features of AWS IoT Rules Engine, Thing Shadow to build a real connected product. You don't want to miss this session if you are a maker or manufacturer of a connected device. We have a cool giveaway for you at the end of the session!
The document discusses setting up a Lambda function and AWS IoT rule to handle disconnection events from an IoT device using MQTT's Last Will and Testament (LWT) feature. When the device connection terminates unexpectedly, LWT will publish a disconnect message to a topic that triggers the Lambda function. The function logs the disconnect event. The code example modifies the device client to define an LWT message payload and topic so it can notify of disconnections.
AWS Re:Invent - Securing HIPAA Compliant Apps in AWSControl Group
Control Group's David Rocamora and Pronia's Brian Besterman presented a case study on migrating HIPAA compliant applications in AWS at the AWS Re:Invent Conference on Nov. 29, 2012
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible
This document discusses Aptible and Telepharm's use of AWS services to build HIPAA-compliant applications. It provides an overview of AWS compliance certifications and HIPAA-eligible AWS services. It then discusses how Aptible implements technical, physical and administrative safeguards required by HIPAA, including delegating responsibilities and standardizing/automating security practices like SSH access control and encryption. Telepharm's requirements around access control, auditing and scalable ePHI storage/processing are also outlined.
Building IAM for OpenStack, presented at CIS (Cloud Identity Summit) 2015.
Discuss Identity Sources, Authentication, Managing Access and Federating Identities
Intro to the FIWARE Lab: Setting Up Your Virtual Infrastructure Using FIWARE Lab Cloud, by Fernando López.
1st FIWARE Summit, Málaga, Dec. 13-15, 2016.
Chef and Apache CloudStack (ChefConf 2014)Jeff Moody
This document discusses using Chef with Apache CloudStack and Citrix CloudPlatform for automation and configuration management. It provides an overview of CloudStack and CloudPlatform, and explains two Chef knife plugins - knife-cloudstack and knife-cloudstack-fog. knife-cloudstack-fog provides comprehensive API coverage for provisioning CloudStack servers using Chef. The document also covers options for getting started with CloudStack and discusses future plans, like testing and merging the plugins.
An introduction to the current state of cloud computing- microservices, containers, and serverless- and an exploration of how to use Identity and Access Management to secure cloud resources and Software as a Service (SaaS)
Reply Webinar Online - Mastering AWS - DB as a ServiceAndrea Mercanti
This document provides an agenda for a webinar on database as a service on Amazon Web Services (AWS). The webinar will cover Amazon Relational Database Service (RDS), Amazon DynamoDB, Amazon Elasticache, Amazon Redshift, and the AWS Database Migration Service. It will discuss the benefits of using AWS database services, including ease of administration, high performance, scalability, availability and cost effectiveness. It will also address questions on each of the database services.
This session will introduce best practices for IoT security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. As a result, you are able to scale and innovate, while maintaining a secure environment.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into:
Understanding token formats
Pros and Cons of each format in Production
Performance across multiple data centers
Token revocation workflow for each of the formats
Horizon usage of the different token types
We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.
Hands-on Lab to compare and contrast relational queries (using RDS for MySQL) with non-relational queries (using ElastiCache for Redis). You’ll need a laptop with a Firefox or Chrome browser.
by Jeff Duffy, Database Specialist Solution Architect, AWS
Database Week at the AWS Loft is an opportunity to learn about Amazon’s broad and deep family of managed database services. These services provide easy, scalable, reliable, and cost-effective ways to manage your data in the cloud. We explain the fundamentals and take a technical deep dive into Amazon RDS and Amazon Aurora relational databases, Amazon DynamoDB non-relational databases, Amazon Neptune graph databases, and Amazon ElastiCache managed Redis, along with options for database migration, caching, search and more. You'll will learn how to get started, how to support applications, and how to scale.
We believe that security *IS* a shared responsibility, - when we give developers the power to create infrastructure, security became their responsibility, too.
During this meetup, we'd like to share our experience with implementing security best practices, to be implemented directly by development teams to build more robust and secure cloud environments. Make cloud security your team's sport!
AWS October Webinar Series - Getting Started with AWS IoTAmazon Web Services
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
In this webinar, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using protocol of their choice. We will discuss how devices can securely connect using MQTT and HTTP protocols, and how developers and businesses can leverage features of AWS IoT like Thing Shadows and Rules Engine to build a real connected product.
The document provides an overview of AWS IoT and Greengrass. It discusses key features like IoT rules for processing device data, device shadows for command and control when devices are offline, lifecycle events for device connectivity, and using Greengrass to run AWS Lambda functions and device shadows locally on edge devices for offline operation and low-latency processing. Greengrass extends AWS IoT by allowing devices to communicate securely on the local network and with the cloud.
Python in the serverless era (PyCon 2017)Benny Bauer
Overview of Serverless and frameworks for developing Serverless Python applications.
Video: https://www.youtube.com/watch?v=G17E4Muylis&index=4&list=PLoPozIuXIZp7PERmO3CqVDUgYUMhUk5ml
1) The document provides an overview of AWS IoT including devices and SDKs, the MQTT protocol, creating and securing things, routing messages to AWS services, and debugging applications.
2) It discusses SDKs for connecting devices, the MQTT protocol for communication, and how to create things, assign certificates and policies, and connect devices like an Arduino.
3) The document also covers how to define rules to route messages between IoT and AWS services like DynamoDB, and how to enable CloudWatch Logs for debugging IoT applications.
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn what core capabilities are necessary for a successful IoT cloud platform
- Understand how the core capabilities work together
- Learn what and how standards are beginning to take shape
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...Amazon Web Services
Learning Objectives:
• Learn what core capabilities are necessary for a successful IoT cloud platform
• Understand how the core capabilities work together
• Learn what and how standards are beginning to take shape
As with any other trend in the history of computer software, IoT is being powered by a new generation of cloud platforms. In this tech talk, we will identify and explain what to look for when evaluating an IoT cloud platform to ensure a successful deployment of IoT strategies. Learn what core capabilities are necessary to look for when choosing an IoT cloud platform.
(MBL312) NEW! AWS IoT: Programming a Physical World w/ Shadows & RulesAmazon Web Services
AWS IoT is a new managed service that enables Internet-connected things (sensors, actuators, devices, and applications) to easily and securely interact with each other and the cloud. As an IoT developer, you would like to interact with the devices and information from these devices using applications. With AWS IoT topic-based rules and built-in integrations, you can route data from any device to AWS service like DynamoDB, Lambda etc and interact with the devices using topics. With AWS IoT Thing shadows, you can interact with the device using applications. Let's dive deep on how we can define the rules and also retrieve the last known and desired state of device using a device shadow in the cloud and leverage the true power of AWS IoT.
This document discusses using Ansible for automation across various IT use cases. It provides examples of how Ansible can be used for infrastructure orchestration, patch management, network automation, and managing various network devices and platforms including Cisco, Palo Alto, and Fortinet devices. It also provides examples of playbooks for tasks like provisioning servers, configuring firewall rules, and checking for configuration drift. Overall it promotes Ansible as a simple, agentless, and extensible automation tool that can automate technologies across IT operations, DevOps, security and more.
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using ThingsAmazon Web Services
AWS IoT is a new managed service that enables Internet-connected things (sensors, actuators, devices, and applications) to easily and securely interact with each other and the cloud. This talk will introduce the security and access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.
This document provides best practices for security in IoT applications using AWS services. It discusses using mutual TLS for secure communication between devices and AWS IoT, generating and provisioning device certificates, revoking certificates, and implementing fine-grained authorization policies for devices, applications, and users. It also describes using Cognito for authenticating mobile users and associating them with IoT devices and policies.
The document provides an overview of AWS IoT including:
- Connecting devices through SDKs and managing things in the device registry.
- Using the MQTT protocol for device communication and publishing/subscribing to topics.
- Defining rules to route messages between IoT and other AWS services like DynamoDB.
- Enabling CloudWatch Logs to debug IoT applications.
AWS re:Invent 2016: IoT Visualizations and Analytics (IOT306)Amazon Web Services
In this workshop, we focus on visualizations of IoT data using ELK, Amazon Elasticsearch, Logstash, and Kibana or Amazon Kinesis. We will dive into how these visualizations can give you new capabilites and understanding when interacting with your device data from the context they provide on the world around them.
This document outlines the agenda for a meetup on cloud computing hosted by StartupDecode. The meetup includes sessions on what cloud computing is, cloud computing on AWS, hands-on tutorials for Heroku and AWS, and a networking apéro. The hands-on portions will guide attendees on deploying a sample Rails app to Heroku with AWS S3 integration for file storage.
AWS CodeDeploy is the new service announced at AWS re:Invent in Las Vegas!!!
AWS CodeDeploy is a fully managed, scalable deployment service that lets AWS certified developers and engineers quickly and simply automate the process of deploying and updating applications on Amazon EC2.
The presentation includes an introduction to Code Deploy, benefits of using Code Deploy, understanding various components and workflows of Code Deploy, ways to deploy an application, commands to create and push application using Code Deploy, steps to deploying code on instances, troubleshooting and limitations of Code Deploy. It begins with a section which gives a brief introduction to Code Deploy. The next section is about the benefits of using Code Deploy. It explains the benefits of using Code Deploy like automated deployments, centralized control etc. Specific to the benefits section comes components and workflows of Code Deploy. It briefly describes the components of Code Deploy like content, appsec file and also includes the steps to the workflow of Code Deploying. Then deploying an application which explains not just the steps to deploy an application but also answers what to deploy, how to deploy and where to deploy at the same time.
Then, comes a section about commands used to create and push application. It tells about the commands which are not just used to create an application to s3 but also push applications to s3. Then it covers the steps for deploying code on instances. It becomes really interesting as it explains the steps a user can use to deploy codes on instances by just creating an application and following the other steps.
The last section of this presentation is about the limitations and troubleshooting of Code Deploy. It tells about the troubleshooting which occurs while using Code Deploy and the troubleshooting which appears but also mentions the regions where Code Deploy is currently supported too.
February 2016 Webinar Series - Best Practices for IoT Security in the CloudAmazon Web Services
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.
This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.
Learning Objectives:
Common Internet of Things security issues
AWS IoT Security and Access Control Mechanisms
Build secure interactions with the AWS Cloud
Who Should Attend:
Developers, makers
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Amazon Web Services
The document provides best practices for managing security operations in AWS. It discusses key aspects of the AWS shared responsibility model including that AWS manages security of the cloud while customers are responsible for security in the cloud. It also covers identity and access management best practices such as creating individual users, granting least privilege, using groups to manage permissions, restricting privileged access with conditions, enabling auditing with CloudTrail, configuring strong password policies and rotating credentials regularly. The document provides an overview of key certification programs and compliance offerings from AWS.
AWS는 다양한 서비스 빌딩 블록을 이용하여, 고객의 요구에 따른 다양한 사물 인터넷(IoT) 서비스를 구축할 수 있습니다. 본 온라인 세미나에서는 AWS IoT 서비스의 주요 개념과 함께 일반적인 인터넷 기기 및 스마트 홈을 위한 IoT 서비스 구현 패턴을 알아봅니다. 이를 위해 데이터 상태 관리, 데이터 분석 및 자원 관리 등의 패턴을 통해 비용 효율적이고 확장 가능한 아키텍처를 살펴봅니다.
AWS Lambda, API Gateway, DynamoDB 등 서버리스 빌딩 블록과 AWS IoT를 연계한 iRobot의 아카텍처 사례를 함께 살펴봄으로서 IoT 기반 서비스 구현 및 이전에 통찰력을 얻으실 수 있습니다.
IPFS is a protocol designed to create a permanent and decentralized method of storing and sharing files faster, safer and more openly. It aims to replace HTTP and build a better web for all. IPFS uses a fully distributed network where each client acts as both client and server. It allows for distributing high volumes of data with high efficiency unlike HTTP which downloads from a single source. Any data structure can be represented as a directed acyclic graph (DAG) in IPFS.
Bitcoin is a cryptocurrency and digital payment system invented by Satoshi Nakamoto that allows for peer-to-peer transactions without an intermediary. Transactions are verified by network nodes and recorded on the blockchain, which is an ordered, back-linked list of transaction blocks. The blockchain uses a Merkle tree to efficiently summarize transactions in each block with a digital fingerprint. Bitcoin addresses are generated from a public key hash derived through elliptic curve cryptography from a private key. Hierarchical deterministic wallets allow private keys to be deterministically derived from a seed to back up and restore wallets. Transactions consist of inputs spending outputs from previous transactions and new outputs sending coins to addresses, with scripts defining spending conditions.
How to create ethereum token (A plan coin ico)承翰 蔡
This document provides instructions for creating an Ethereum token. It explains what an initial coin offering (ICO) is and the ERC-20 token standard. It then outlines the steps to create a token, including defining parameters like name and supply, setting exchange rates, adding modifiers, and implementing payment, withdrawal, and refund methods. The token contract can check block numbers and transition between different stages like in progress and ended.
The document discusses the Web of Things (WoT), which uses web technologies like URLs, HTTP, and REST to connect physical devices over the Internet of Things (IoT). WoT defines four layers - Access, Find, Share, and Compose - to standardize how IoT devices can be discovered, accessed, and integrated into applications. It also presents a WoT model and common constructs like properties and actions to represent IoT devices as web resources that can be manipulated using HTTP verbs. Examples show how a WoT device's root resource and actions can be retrieved and executed.
This document summarizes the results of benchmarks testing the performance of different versions of MongoDB for write, storage size, and read operations. The benchmarks show that MongoDB 3.0 with wiredTiger and compression enabled had the best performance for write operations, smallest storage size, and competitive read performance compared to earlier versions.
Turn websites into structured APIs from your browser in seconds without writing any code or installing any software. The Kimono API uses standard HTTP response codes and returns data in JSON format. It allows getting, listing, updating, and starting crawls of APIs and includes parameters for versions, CSV, RSS formatting, limiting, offsetting, paging, including URLs, indexing, hashing, time series, stats, and modifying data. Kimono can download data into Google Spreadsheets, embed APIs on sites, create mobile apps from APIs, set up email alerts, and scrape data behind logins.
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
UI5con 2024 - Bring Your Own Design SystemPeter Muessig
How do you combine the OpenUI5/SAPUI5 programming model with a design system that makes its controls available as Web Components? Since OpenUI5/SAPUI5 1.120, the framework supports the integration of any Web Components. This makes it possible, for example, to natively embed own Web Components of your design system which are created with Stencil. The integration embeds the Web Components in a way that they can be used naturally in XMLViews, like with standard UI5 controls, and can be bound with data binding. Learn how you can also make use of the Web Components base class in OpenUI5/SAPUI5 to also integrate your Web Components and get inspired by the solution to generate a custom UI5 library providing the Web Components control wrappers for the native ones.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Preparing Non - Technical Founders for Engaging a Tech AgencyISH Technologies
Preparing non-technical founders before engaging a tech agency is crucial for the success of their projects. It starts with clearly defining their vision and goals, conducting thorough market research, and gaining a basic understanding of relevant technologies. Setting realistic expectations and preparing a detailed project brief are essential steps. Founders should select a tech agency with a proven track record and establish clear communication channels. Additionally, addressing legal and contractual considerations and planning for post-launch support are vital to ensure a smooth and successful collaboration. This preparation empowers non-technical founders to effectively communicate their needs and work seamlessly with their chosen tech agency.Visit our site to get more details about this. Contact us today www.ishtechnologies.com.au
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...kalichargn70th171
In today's business landscape, digital integration is ubiquitous, demanding swift innovation as a necessity rather than a luxury. In a fiercely competitive market with heightened customer expectations, the timely launch of flawless digital products is crucial for both acquisition and retention—any delay risks ceding market share to competitors.
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
6. resource identifier,依照各服務而有差異;可能是 *, aaaa, aaa/bbb, aaa:bbb 等格
式,在AWS IOT為Policy
AWS Identity and Access Management (IAM)
管理 IAM 使用者及其存取權 – 您可以在 IAM 中建立使用者,為他們指派個別的安全登入資料 (換
句話說,就是存取金鑰、密碼和多重驗證裝置),或請求臨時的安全登入資料,為使用者提供 AWS
服務和資源的存取權。您可以管理許可以控制使用者可執行的操作。
管理 IAM 角色及其許可 – 您可以在 IAM 中建立角色和管理許可,以控制擔任該角色的實體或
AWS 服務可執行的操作。您也可以定義允許擔任該角色的實體。
管理聯合身分使用者及其許可 – 您可以啟用聯合身分功能,以允許企業中的現有身分 (使用者、群
組和角色) 存取 AWS 管理主控台、呼叫 AWS API 以及存取資源,而不必為每個身分建立 IAM 使
用者。
===============================
1. thingShadow class必須先register後才能進行操作,如get, update等
等。
2.
state
desired
The desired state of the thing. Applications can write to this portion of the document
to update the state of a thing without having to directly connect to a thing.
reported
The reported state of the thing. Things write to this portion of the document to report
their new state. Applications read this portion of the document to determine the state
7. of a thing.
metadata
Information about the data stored in the state section of the document. This includes
timestamps, in Epoch time, for eac
3. 7688必須先安裝AWS CLI: pip install awscli
4. 建立Certificate相關檔案: aws iot create-keys-and-certificate
--set-as-active --certificate-pem-outfile cert.pem
--public-key-outfile publicKey.pem --private-key-outfile
privateKey.pem
便會產出3個相關的檔案
5. 補充資料
15. 【MQTT Pub/Sub Messages】
/update
publish到該topic,用來更新 thing shadow
$aws/things/thingName/shadow/update
AWS IoT responds by publishing to either /update/accepted or /update/rejected
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Publish"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/update"]
}]
}
/update/accepted
當AWS IoT接收到 thing shadow有更新時會response state document到該topic
$aws/things/thingName/shadow/update/accepted
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/update/accepted"]
}]
}
/update/rejected
當 AWS IoT拒絕 thing shadow 更新時會 response error document 到該 topic
$aws/things/thingName/shadow/update/rejected
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/update/rejected"]
}]
}
16. /update/delta
當AWS IoT接收到 thing shadow有更新時,且 desired state 與 reported state 不一致時會response
state document到該topic
$aws/things/thingName/shadow/update/delta
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/update/delta"]
}]
}
/get
publish到該topic,用來取得 thing shadow
$aws/things/thingName/shadow/get
AWS IoT responds by publishing to either /get/accepted or /get/rejected.
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Publish"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/get"]
}]
}
/get/accepted
當 AWS IoT接收到 thing shadow /get 時會 response state document 到該topic
$aws/things/thingName/shadow/get/accepted
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/get/accepted"]
17. }]
}
/get/rejected
當 AWS IoT 無法 return thing shadow 時會 response error document 到該 topic
$aws/things/thingName/shadow/get/rejected
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/get/rejected"]
}]
}
/delete
publish到該topic,用來刪除 thing shadow,訊息內容( Request state document )可忽略
$aws/things/thingName/shadow/delete
AWS IoT responds by publishing to either /delete/accepted or /delete/rejected.
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
"Resource": ["arn:aws:iot:region:account:topic/$aws/things/thingName/shadow/delete"]
}]
}
/delete/accepted
當 AWS IoT 接收到 thing shadow /delete 時會 response state document 到該topic
$aws/things/thingName/shadow/delete/accepted
Example Policy
The following is an example policy:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["iot:Subscribe"],
21. Get endpoint
$ aws iot describe-endpoint
Examples
【Device class】
awsIot.device(option),option也可以是mqtt.js支援的參數
https://github.com/mqttjs/MQTT.js/blob/master/README.md#client
var awsIot = require('aws-iot-device-sdk');
var device = awsIot.device({
keyPath: '~/awsCerts/private.pem.key',
certPath: '~/awsCerts/certificate.pem.crt',
caPath: '~/awsCerts/root-CA.crt',
clientId: 'myAwsClientId',
region: 'us-east-1'
});
//
// Device is an instance returned by mqtt.Client(), see mqtt.js for full
// documentation.
//
device
.on('connect', function() {
console.log('connect');
device.subscribe('topic_1');
device.publish('topic_2', JSON.stringify({ test_data: 1}));
});
device
.on('message', function(topic, payload) {
console.log('message', topic, payload.toString());
});
10. AWS IoT Troubleshooting
AWS IoT Troubleshooting
22. 1. The thing shadow supports 8 KB of data only.
2. 建立 AWS CloudWatch 來查看 AWS IoT Logging
https://ap-northeast-1.console.aws.amazon.com/cloudwatch/home?region=ap-northeast-1
#logs:
【Create an IAM Role for AWS IoT】
$ aws iam create-role --role-name <value>
--assume-role-policy-document <file://path-to-your-policy-document>
Assume Logging Role policy document.json example
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Service": "iot.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
【Grant Permissions to the Role】
【Create IAM policy】
該步驟可省略,IAM已經有內建的 CloudWatch 相關的 Policy 可直接使用,透過指令來查
詢有哪些可用的Policy
$ aws iam list-policies | grep CloudWatch
$ aws iam create-policy --policy-name <value> --policy-document
<file://IAM-policy-document-file-path>
*把Arn記下來! 或是輸入 aws iam list-roles來查詢
IAM policy document.json example Action部份依照需求調整
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [ "dynamodb:*", "lambda:InvokeFunction", "iot:Publish"],
"Resource": ["*"]
}]
}
【Attach IAM policy】
$ aws iam attach-role-policy --role-name <value> --policy-arn
arn:aws:iam::964391593426:role/iot-actions-role
*可輸入 aws iam list-roles來查詢各個Role的Arn
【Register the Logging Role with AWS IoT】
$ aws iot set-logging-options --logging-options-payload
roleArn="arn:aws:iam::<your-aws-account-num>:role/IoTLoggingRole",log
Level="INFO"
更多關於 AWS CloudWatch 的設定請參閱以下連結:
23. http://docs.aws.amazon.com/zh_cn/iot/latest/developerguide/cloud-watc
h-logs.html
11. AWS IoT Limits
AWS IoT Limits
Topic length limit 256 bytes encoded in UTF-8.
Restricted topic prefix Topics開頭’$’是保留字,除了 Thing
Shadows 外都不可使用
Maximum number of slashes in topic and
topic filter
最多8個 slashes (/)
Client ID size limit 128 bytes encoded in UTF-8.
Restricted client ID prefix ’$’ 是 client IDs 保留字
Message size limit payload 最多 128 KB,若超過大小會被
AWS IoT Service reject
Throughput per connection AWS IoT limits the ingress and egress rate
on each client connection to 512 KB/s. Data
sent or received at a higher rate will be
throttled to this throughput.
Maximum subscriptions per subscribe call A single subscribe call is limited to request
a maximum of eight subscriptions.
Subscriptions per session The message broker limits each client
session to subscribe to up to 50
subscriptions. A subscribe request that
pushes the total number of subscriptions
past 50 will result in the connection being
disconnected.
Connection inactivity (keep-alive) limits 預設30秒沒有任何動作則斷開連結,也可設
定更短的keep-alive,範圍5~1200秒,設定
<5秒則以5秒為預設;設定0秒則以預設值執
行
Maximum inbound unacknowledged
messages
The message broker allows 100 in-flight
unacknowledged messages (limit is across
all messages requiring ACK). When this
limit is reached, no new messages will be
accepted until an ACK is returned by the
server.
Maximum outbound unacknowledged
messages
The message broker only allows 100
in-flight unacknowledged messages (limit is
across all messages requiring ACK). When
24. this limit is reached, no new messages will
be sent to the client until the client
acknowledges the in-flight messages.
Maximum retry interval for delivering QoS 1
messages
If a connected client is unable to receive an
ACK on a QoS 1 message for one hour, the
message broker will drop the message. The
client may be unable to receive the
message if it has 100 in-flight messages, it
is being throttled due to large payloads, or
other errors.
WebSocket connection duration WebSocket連線限制為5分鐘,超過則會斷
線,若要連線超過5分鐘,則在 client 端關閉
連線並重開即可
26. Demo1: 展示直接連結Device
node /root/project/aws/device.js
MQTTfx: subscribe “test2”
MQTTfx: publish “test1”
Demo2: 用Demo1展示Rule engine
Rule Engine設置republish to "rep/test”
Demo3: 展示透過shadow thing來溝通而不是直接連結裝置
接收端(led燈): node /root/project/aws/shadowThing.js
發送端:node /root/project/aws2/thing-passthrough-example.js --test-mode=1
用MQTTfx來觀看實際註冊情形,先subscribe以下幾組:
http://docs.aws.amazon.com/zh_cn/iot/latest/developerguide/thing-shadow-data-flow.html
$aws/things/myLightBulb/shadow/update/accepted
The Thing Shadows service sends messages to this topic when an update is
successfully made to a thing shadow.
$aws/things/myLightBulb/shadow/update/rejected
The Thing Shadows service sends messages to this topic when an update to a
thing shadow is rejected.
$aws/things/myLightBulb/shadow/update/delta
The Thing Shadows service sends messages to this topic when a difference is
detected between the reported and desired sections of a thing shadow.
$aws/things/myLightBulb/shadow/get/accepted
The Thing Shadows service sends messages to this topic when a request for a
thing shadow is made successfully.
$aws/things/myLightBulb/shadow/get/rejected
The Thing Shadows service sends messages to this topic when a request for a
thing shadow is rejected.