This document provides instructions for connecting a Raspberry Pi to AWS IoT. It includes steps to sign up for an AWS account, create an IoT thing in the AWS IoT console to represent the Raspberry Pi device, configure and run sample AWS IoT SDK applications on the Raspberry Pi, and send sensor data from a DHT11 temperature and humidity sensor connected to the Raspberry Pi to an AWS IoT topic. The document also provides contact information for tutorials related to connecting AWS services to Raspberry Pi projects.
This document provides instructions for connecting a Raspberry Pi device to an Azure IoT hub. It describes how to create an IoT hub in Azure, register the Raspberry Pi device, set up the device with sensors, run a sample Azure IoT client app on the Pi, and configure the app. It also explains how to monitor device-to-cloud messages and save IoT hub messages to Azure blob storage. Contact information is provided to follow the author on YouTube and LinkedIn for more tutorials.
This blog is about utilizing IBM Bluemix’s readily available environment capabilities for the development of IoT application by integrating it with IBMWatson, Raspberry Pi and virtual device.
Setting up your virtual infrastructure using fi lab cloudHenar Muñoz Frutos
This document provides instructions for setting up a virtual infrastructure using FI-LAB Cloud. It describes how to create an account, deploy virtual machines (VMs), deploy application components, use the object storage API, and includes reference information. The steps include creating a keypair to access servers, launching a VM, allocating an IP address, opening ports, deploying applications using blueprint templates across multiple VMs, and authenticating with the object storage service. Demo screenshots illustrate the process of defining tiers, servers, and installing software using blueprint templates to deploy an application infrastructure.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
This document provides instructions for connecting a Raspberry Pi to AWS IoT. It includes steps to sign up for an AWS account, create an IoT thing in the AWS IoT console to represent the Raspberry Pi device, configure and run sample AWS IoT SDK applications on the Raspberry Pi, and send sensor data from a DHT11 temperature and humidity sensor connected to the Raspberry Pi to an AWS IoT topic. The document also provides contact information for tutorials related to connecting AWS services to Raspberry Pi projects.
This document provides instructions for connecting a Raspberry Pi device to an Azure IoT hub. It describes how to create an IoT hub in Azure, register the Raspberry Pi device, set up the device with sensors, run a sample Azure IoT client app on the Pi, and configure the app. It also explains how to monitor device-to-cloud messages and save IoT hub messages to Azure blob storage. Contact information is provided to follow the author on YouTube and LinkedIn for more tutorials.
This blog is about utilizing IBM Bluemix’s readily available environment capabilities for the development of IoT application by integrating it with IBMWatson, Raspberry Pi and virtual device.
Setting up your virtual infrastructure using fi lab cloudHenar Muñoz Frutos
This document provides instructions for setting up a virtual infrastructure using FI-LAB Cloud. It describes how to create an account, deploy virtual machines (VMs), deploy application components, use the object storage API, and includes reference information. The steps include creating a keypair to access servers, launching a VM, allocating an IP address, opening ports, deploying applications using blueprint templates across multiple VMs, and authenticating with the object storage service. Demo screenshots illustrate the process of defining tiers, servers, and installing software using blueprint templates to deploy an application infrastructure.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Assigning a static IP address involves specifying the IP address, subnet mask, default gateway, and DNS server addresses for a device on a home network. This is done to avoid address conflicts and ease troubleshooting by identifying each device's unique address. The process involves opening network connection properties on Windows, selecting TCP/IP, and manually entering the IP address, subnet mask, default gateway, and DNS server addresses provided by the internet service provider.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
The document provides steps for configuring Microsoft Intune and System Center Configuration Manager for mobile device management. It outlines the process for setting up Intune subscriptions, configuring directory synchronization and federated services, enrolling users, and verifying mobile device management functionality. It also provides details on platform-specific management tasks, inventory collection, device retirement, and common troubleshooting issues.
The document provides information about an exam for the Microsoft Azure Administrator AZ-104 certification. It includes 10 total questions covering topics related to Azure networking, Active Directory, virtual machines, and storage. The document provides sample questions, explanations of answers, and an overview of the exam format and policies regarding feedback, support, and copyright.
Ewug 1902 what is new in modern managementPer Larsen
Windows App (Win32) apps are no longer in preview in Microsoft Intune 1902 and additional information is available for troubleshooting. PowerShell scripts can now run on 64-bit devices. The Intune conditional access UI has been updated. Admins can now rename enrolled Windows devices and scope tags will auto-assign to admin-created resources. Windows 10 kiosk mode is generally available including for Microsoft Edge and multi-app kiosks. Outlook management on iOS and Android allows closer inspection. A security baseline is in public preview. Intune 1901 includes new logs, ability to send to Azure Monitor, and other updates.
This document provides information about a capstone networking project, including hardware, software, network configuration, installing Windows Server 2012, installing a VPN and firewall, network protocols, IP addressing, and hardware and software security and backup. The hardware includes domain controllers, client computers, routers, switches, and servers. The software includes programs like Microsoft Office, Exchange, PowerShell, and operating systems like Windows and Windows Server. Details are provided about setting up a domain network and workgroup network, and configuring DNS, DHCP, and active directory on the Windows Server 2012 domain controller. Steps for installing a VPN and configuring a firewall are also outlined. Networking protocols, IP addressing schemes, and concepts of public vs private IP classes and subnet
This document provides an overview of Secure Work Space, which allows for a secure container on mobile devices to separate work and personal data. It discusses how Secure Work Space provides secure connectivity, a secure browser, and document editing capabilities. It also compares Secure Work Space to BlackBerry Balance and outlines what is required from administrators and developers to deploy apps through the Secure Work Space, including wrapping apps, resigning them, and making them available through software configurations. A demo of the Secure Work Space is also mentioned.
Yaler is a simple, open, and scalable relay infrastructure that allows monitoring and remote control of thousands of embedded devices from any web browser. It works by publishing devices using HTTP/1.1 POST requests and accessing them with GET requests through a relay server. The relay server reverses and forwards the connection to allow communication between devices and browsers while addressing challenges around scalability, availability, and accessibility.
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure. • Understand how to use native technologies to secure all layers of a SharePoint environment, including Data, Transport, Infrastructure, Edge, and Rights Management. • Examine tools and technologies that can help secure SharePoint, including AD Rights Management Services, Forefront Unified Access Gateway, SQL Transparent Data Encryption, and more. • Understand a Role-Based Access Control (RBAC) permissions model and how it can be used to gain better control over authorization and access control to SharePoint files and data
Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers.
Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html
This document provides an overview of cloud computing and its role in IoT. It discusses key cloud computing concepts like SaaS, PaaS, and IaaS and how cloud services allow for cost savings, global access, and other benefits. The document also introduces IoT, describing how embedded devices connect things to the internet and how an IoT platform bridges devices and applications. Decision frameworks and architectures for IoT are outlined which involve areas like user experience, data, security and more. Finally, popular IoT platforms from Amazon, Microsoft, IBM and others are highlighted.
This document introduces the CitusTM IoT Ecosystem, which allows users to develop and integrate IoT products, visualize sensor data, and build sharing economy business models on a centralized platform. It can be deployed on dedicated or shared infrastructure using Docker Compose, Kubernetes, or AWS CloudFormation. The ecosystem provides services for device management, sensor analytics, recognition applications, and more through container-based microservices that can be easily deployed and shared across users. Setup instructions are included to deploy the ecosystem locally using Docker Compose or on AWS using a CloudFormation template.
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Codemotion Tel Aviv
This document summarizes how to build an Azure IoT controlled device in 40 minutes for less than $10. It describes using an ESP8266 development board connected to sensors and actuators to control a device. The cloud portion uses Azure IoT Hub to connect the device and send/receive commands. A Xamarin mobile app is also created to control the device. Overall it shows how inexpensive and quick it is to build an IoT prototype using affordable hardware and Azure cloud services.
The document describes building an Azure IoT controlled device using a WeMos D1 Mini and relay shield to create a flood detection device. It discusses connecting the device to Azure IoT Hub using the C SDK and setting up logic in Azure functions and Logic Apps to send alert emails and SMS messages when flooding is detected. It also provides an overview of Azure IoT Hub capabilities including device twins, direct methods, and protocols.
The document discusses Docker and Kubernetes tools for Visual Studio code. It provides an overview of Docker, how to build Docker images using Dockerfiles, and how to use the Docker extension in VS Code. It also covers developing applications inside Docker containers using the Remote - Containers extension. Finally, it gives a basic introduction to Kubernetes, including nodes, pods, deployments, and services. The presenter demonstrates creating a Dockerfile and deploying to Kubernetes.
This document provides an introduction to Pivotal Cloud Foundry (PCF), an open source application platform as a service. It discusses what PCF is, how it compares to Docker, its advantages over other platforms, its architecture, and how it works. Key points covered include that PCF provides portability for developers, allows applications to run on multiple clouds, and uses containerization similarly to Docker. The document also examines PCF's subsystems like Diego, which distributes application loads, and how components communicate using messages.
AirWatch provides mobile device management through a single admin console that allows businesses to enroll, secure, and manage diverse mobile devices. Key benefits include managing devices from a single console, enabling secure access to corporate resources, and gaining visibility across deployments. AirWatch supports employee, corporate and shared devices on platforms including Android, iOS, BlackBerry, Mac OS, and Windows.
MuleSoft Meetup Vancouver 5th Virtual EventVikalp Bhalia
The document discusses Anypoint VPC, VPN and Dedicated Load Balancer in MuleSoft. It provides an agenda for the meetup including a speaker introduction. It then presents a customer problem statement about implementing MuleSoft for connecting applications. The remainder of the document dives into technical details about VPC, VPN, DLB architecture and configuration, access methods, and includes references for additional information.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
Assigning a static IP address involves specifying the IP address, subnet mask, default gateway, and DNS server addresses for a device on a home network. This is done to avoid address conflicts and ease troubleshooting by identifying each device's unique address. The process involves opening network connection properties on Windows, selecting TCP/IP, and manually entering the IP address, subnet mask, default gateway, and DNS server addresses provided by the internet service provider.
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
The document provides steps for configuring Microsoft Intune and System Center Configuration Manager for mobile device management. It outlines the process for setting up Intune subscriptions, configuring directory synchronization and federated services, enrolling users, and verifying mobile device management functionality. It also provides details on platform-specific management tasks, inventory collection, device retirement, and common troubleshooting issues.
The document provides information about an exam for the Microsoft Azure Administrator AZ-104 certification. It includes 10 total questions covering topics related to Azure networking, Active Directory, virtual machines, and storage. The document provides sample questions, explanations of answers, and an overview of the exam format and policies regarding feedback, support, and copyright.
Ewug 1902 what is new in modern managementPer Larsen
Windows App (Win32) apps are no longer in preview in Microsoft Intune 1902 and additional information is available for troubleshooting. PowerShell scripts can now run on 64-bit devices. The Intune conditional access UI has been updated. Admins can now rename enrolled Windows devices and scope tags will auto-assign to admin-created resources. Windows 10 kiosk mode is generally available including for Microsoft Edge and multi-app kiosks. Outlook management on iOS and Android allows closer inspection. A security baseline is in public preview. Intune 1901 includes new logs, ability to send to Azure Monitor, and other updates.
This document provides information about a capstone networking project, including hardware, software, network configuration, installing Windows Server 2012, installing a VPN and firewall, network protocols, IP addressing, and hardware and software security and backup. The hardware includes domain controllers, client computers, routers, switches, and servers. The software includes programs like Microsoft Office, Exchange, PowerShell, and operating systems like Windows and Windows Server. Details are provided about setting up a domain network and workgroup network, and configuring DNS, DHCP, and active directory on the Windows Server 2012 domain controller. Steps for installing a VPN and configuring a firewall are also outlined. Networking protocols, IP addressing schemes, and concepts of public vs private IP classes and subnet
This document provides an overview of Secure Work Space, which allows for a secure container on mobile devices to separate work and personal data. It discusses how Secure Work Space provides secure connectivity, a secure browser, and document editing capabilities. It also compares Secure Work Space to BlackBerry Balance and outlines what is required from administrators and developers to deploy apps through the Secure Work Space, including wrapping apps, resigning them, and making them available through software configurations. A demo of the Secure Work Space is also mentioned.
Yaler is a simple, open, and scalable relay infrastructure that allows monitoring and remote control of thousands of embedded devices from any web browser. It works by publishing devices using HTTP/1.1 POST requests and accessing them with GET requests through a relay server. The relay server reverses and forwards the connection to allow communication between devices and browsers while addressing challenges around scalability, availability, and accessibility.
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself. Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified. Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint Security stack, and more often than not don’t properly build them into a deployment. This includes such diverse categories including Edge, Transport, Infrastructure, Data, and Rights Management Security, all areas that are often neglected but are nonetheless extremely important. This session discusses the entire stack of Security within SharePoint, from best practices around managing permissions and ACLs to comply with Role Based Access Control, to techniques to secure inbound access to externally-facing SharePoint sites. The session is designed to be comprehensive, and includes all major security topics in SharePoint and a discussion of various real-world designs that are built to be secure. • Understand how to use native technologies to secure all layers of a SharePoint environment, including Data, Transport, Infrastructure, Edge, and Rights Management. • Examine tools and technologies that can help secure SharePoint, including AD Rights Management Services, Forefront Unified Access Gateway, SQL Transparent Data Encryption, and more. • Understand a Role-Based Access Control (RBAC) permissions model and how it can be used to gain better control over authorization and access control to SharePoint files and data
Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers.
Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html
This document provides an overview of cloud computing and its role in IoT. It discusses key cloud computing concepts like SaaS, PaaS, and IaaS and how cloud services allow for cost savings, global access, and other benefits. The document also introduces IoT, describing how embedded devices connect things to the internet and how an IoT platform bridges devices and applications. Decision frameworks and architectures for IoT are outlined which involve areas like user experience, data, security and more. Finally, popular IoT platforms from Amazon, Microsoft, IBM and others are highlighted.
This document introduces the CitusTM IoT Ecosystem, which allows users to develop and integrate IoT products, visualize sensor data, and build sharing economy business models on a centralized platform. It can be deployed on dedicated or shared infrastructure using Docker Compose, Kubernetes, or AWS CloudFormation. The ecosystem provides services for device management, sensor analytics, recognition applications, and more through container-based microservices that can be easily deployed and shared across users. Setup instructions are included to deploy the ecosystem locally using Docker Compose or on AWS using a CloudFormation template.
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Codemotion Tel Aviv
This document summarizes how to build an Azure IoT controlled device in 40 minutes for less than $10. It describes using an ESP8266 development board connected to sensors and actuators to control a device. The cloud portion uses Azure IoT Hub to connect the device and send/receive commands. A Xamarin mobile app is also created to control the device. Overall it shows how inexpensive and quick it is to build an IoT prototype using affordable hardware and Azure cloud services.
The document describes building an Azure IoT controlled device using a WeMos D1 Mini and relay shield to create a flood detection device. It discusses connecting the device to Azure IoT Hub using the C SDK and setting up logic in Azure functions and Logic Apps to send alert emails and SMS messages when flooding is detected. It also provides an overview of Azure IoT Hub capabilities including device twins, direct methods, and protocols.
The document discusses Docker and Kubernetes tools for Visual Studio code. It provides an overview of Docker, how to build Docker images using Dockerfiles, and how to use the Docker extension in VS Code. It also covers developing applications inside Docker containers using the Remote - Containers extension. Finally, it gives a basic introduction to Kubernetes, including nodes, pods, deployments, and services. The presenter demonstrates creating a Dockerfile and deploying to Kubernetes.
This document provides an introduction to Pivotal Cloud Foundry (PCF), an open source application platform as a service. It discusses what PCF is, how it compares to Docker, its advantages over other platforms, its architecture, and how it works. Key points covered include that PCF provides portability for developers, allows applications to run on multiple clouds, and uses containerization similarly to Docker. The document also examines PCF's subsystems like Diego, which distributes application loads, and how components communicate using messages.
AirWatch provides mobile device management through a single admin console that allows businesses to enroll, secure, and manage diverse mobile devices. Key benefits include managing devices from a single console, enabling secure access to corporate resources, and gaining visibility across deployments. AirWatch supports employee, corporate and shared devices on platforms including Android, iOS, BlackBerry, Mac OS, and Windows.
MuleSoft Meetup Vancouver 5th Virtual EventVikalp Bhalia
The document discusses Anypoint VPC, VPN and Dedicated Load Balancer in MuleSoft. It provides an agenda for the meetup including a speaker introduction. It then presents a customer problem statement about implementing MuleSoft for connecting applications. The remainder of the document dives into technical details about VPC, VPN, DLB architecture and configuration, access methods, and includes references for additional information.
Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech
Windows Azure is a cloud-based operating system that allows applications to run in a virtual environment providing hardware components and services. It was created by Microsoft and provides infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS). Azure supports many programming languages, tools and frameworks. It can be used to build, test, deploy and manage applications without worrying about infrastructure details.
Internet of things at the Edge with Azure IoT Edge by sonujoseSonu Jose
This document provides an overview of Microsoft's Azure IoT platform and services for connecting, managing and gaining insights from IoT devices at the edge and in the cloud. It discusses Microsoft's vision for empowering devices, the opportunities for developers, their investments in IoT, and the core Azure IoT services like IoT Hub, IoT Edge and IoT Central. It also provides examples of how IoT solutions can be built using these services by collecting data from devices at the edge, processing it locally or in the cloud, and taking automated actions.
Presentation of Connectorio's building's technical systems integrations expertise, services, and the ConnectorIO multi-protocol gateway with Industrial IoT and Building Management & Automation System Cloud platform.
More information:
🔹 Our website: https://connectorio.com
Social:
◼️ Linkedin: https://www.linkedin.com/company/12662346/
◼️ Facebook: https://www.facebook.com/connectorio
◼️ Twitter: https://twitter.com/connectorio
Contact us:
🔹 https://connectorio.com/contact/
This document discusses cloud computing. It defines cloud computing as using computer resources that are delivered as a service over the Internet. These resources include hardware, software, storage and databases. Users can access these resources from anywhere as needed rather than having the resources provided locally. The document then discusses key characteristics of cloud computing like multi-tenancy, scalability, on-demand resources and reliability. It also discusses different types of cloud models including public, private and hybrid clouds. Finally, it provides examples of cloud computing platforms like Amazon Web Services and Google Application Engine.
This document provides an overview of cloud computing, including its history, definitions, models, and pros and cons. It discusses how cloud computing relies on sharing computing resources over the internet rather than local servers. The document also outlines the main cloud service models of SaaS, PaaS, and IaaS and describes key cloud computing concepts like storage, platforms, and browsers. Both the advantages of cost savings and flexibility as well as the disadvantages of security and technical issues are summarized.
CloudHub is MuleSoft's integration platform that provides a multi-tenant, secure, and elastic environment for running integrations. It has two major components - platform services which coordinate deployment and monitoring, and worker clouds which run integration applications in isolated containers across regions. Applications are deployed via the Runtime Manager console and run on workers that can be scaled based on processing needs. Workers and platform services work together to provide high availability and security in a multi-tenant environment.
The document discusses cloud automation and the Internet of Things (IoT). It begins with definitions of cloud computing and cloud automation. It then covers the historical background and benefits of cloud automation. Applications of cloud automation like Node MCU, Raspberry Pi, and PLC are discussed along with using various cloud platforms like Blynk, Microsoft Azure, AWS, and more with IoT devices. The document concludes with explaining Node-RED and a live demonstration of cloud automation and IoT.
This document discusses cloud services and security. It begins by defining cloud computing and its key characteristics such as broad network access, rapid elasticity, and resource pooling. It then covers the different cloud service models including SaaS, PaaS, and IaaS. The document also discusses the various cloud deployment models like public, private, community, and hybrid clouds. It identifies security as the top challenge for cloud adoption and outlines threats like abuse of cloud computing, insecure interfaces, data loss or leakage, and malevolence. Finally, it summarizes the security offerings and controls of Google Apps, Google Engine, Amazon Web Services, and the services they provide.
Microsoft azure services dedicated for IoT solutionsPredica Group
If you want to get to know more about Azure IoT Hub, Azure IoT Edge, Azure IoT Central or Azure IoT Suite this presentation is for you!
If you want to watch the replay you can do it here: https://predicalearningcenter.com/en/webinars/azure-iot-solutions/
Similar to Open Source for You: Etherios Cloud Connector (20)
Google Calendar is a versatile tool that allows users to manage their schedules and events effectively. With Google Calendar, you can create and organize calendars, set reminders for important events, and share your calendars with others. It also provides features like creating events, inviting attendees, and accessing your calendar from mobile devices. Additionally, Google Calendar allows you to embed calendars in websites or platforms like SlideShare, making it easier for others to view and interact with your schedules.
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRPeter Gallagher
In this session delivered at NDC Oslo 2024, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub
1. Open Gurus Let's Try
D
evice Cloud is a device management platform and
data service that allows you to connect any device to
any application, anywhere. As a public cloud service,
it is designed to provide easy integration between devices and
the Device Cloud by Etherios to facilitate real-time network
management and rapid M2M application development. It
is simple to integrate client software, Web applications or
mobile applications to Device Cloud, using Etherios Cloud
Connector and open source APIs.
Device Cloud security
service. With over 175 different security controls in place that
take into account security frameworks including ISO27002’s
ISMS, NERC’s critical infrastructure protection (CIP)
Etherios Cloud Connector allows you to seamlessly connect any M2M device to Device
Cloud by Etherios.
Get to Know the Etherios Cloud Connector
guidance, the payment card industry’s PCI-DSS v2, the Cloud
Security Alliance’s (CSA) Cloud Controls Matrix, as well as
relevant HIPAA and NIST standards, Device Cloud customers
are assured that there is no safer place for their data.
Etherios Cloud Connector
Etherios Cloud Connector is a software development
package that is ANSI X3.159-1989 (ANSI C89) and ISO/
IEC 9899:1999 (ANSI C99) compliant and enables devices
to exchange information with Device Cloud over the
Internet, securely.
The devices could range from Arduino boards and
Freescale or Intel chips, to PIC or STM microcontrollers, a
Raspberry Pi microcomputer or a smartphone.
Etherios Cloud Connector enables application-to-
device data interaction (messaging), application and
88 | May 2014 | OPEN SOURCE FOR yOU | www.OpenSourceForU.com
2. Open GurusLet's Try
device data storage and remote management of devices.
Using Etherios Cloud Connector, you can easily develop
cloud-based applications for connected devices that
quickly scale from dozens, to hundreds or even millions
of endpoints.
Prerequisites for Etherios Cloud Connector
Etherios Cloud Connector can run on any device
that has a minimum of 2.5 kB of RAM and 32 kB of
Flash memory. A unique feature of the Etherios Cloud
Connector is that it is OS independent, which means you
don’t need an OS running on your device to connect to
Device Cloud by Etherios.
Features
By integrating Etherios Cloud Connector into your device,
you instantly enable the power of Device Cloud device
management capabilities and application enablement
features for your device:
Send data to Device Cloud
Receive data from Device Cloud
Enable remote control of devices via the Device Cloud
platform, including:
Firmware updates
Software downloads
Reboot devices
Communicating with your device
To manage your device remotely, log in to your Device
Cloud account and navigate to the Device Management
tab. Alternatively, you can communicate with your device
programmatically by using Device Cloud Web Services.
Device Cloud Web Services requests are used to
send data from a remote application (written in Java,
Python, Ruby, Perl and C#) to Device Cloud, which
then communicates with the device. This allows for bi-
directional M2M communication.
Source code structure
The Etherios Cloud Connector source code is divided into
two partitions.
Private partition: The private partition includes the
sources that implement the Etherios Cloud Connector
public API.
Public Application Framework: The Public Application
Framework includes a set of sample applications used
for demonstration purposes.
It also has a HTML help system plus pre-written
onto devices running any Linux OS, i.e., even a Linux PC.
You can download Etherios Cloud Connector for free from
http://www.etherios. com/products/devicecloud/connector/
embedded. Extract it and you will see the following contents:
connector/docs > API reference manual
connector/private ->The protocol core
connector/public -> Application framework
The threading model
Etherios Cloud Connector can be deployed in a multi-
threaded or round robin control loop environment.
In multi-threaded environments that include pre-emptive
threading, Etherios Cloud Connector can be implemented as a
separate standalone thread by calling connector_run(). This is
a blocking call that only returns due to a major system failure.
Alternatively, when threading is unavailable, e.g., in
devices without an OS, typically in a round robin control
be implemented using the non-blocking connector_step() call
within the round robin control loop.
Etherios Cloud Connector execution guidelines
Here we will try to run Etherios Cloud Connector on a PC
running Linux. Similarly, you can port to any device with or
without an OS.
Go to /connector/public/step/platforms
You need to create a folder for your custom platform here.
If you have a Linux platform, then go to /connector/public/
step/platforms/linux
os.c -> OS routines like app_os_malloc(), app_os_free(), app_
malloc and get system time on your platform.
and
go to
{0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
static connector_callback_status_t app_get_mac_
{
return connector_callback_continue;
}
This callback
device, and for testing you may hardcode MAC and rewrite it
as follows:
www.OpenSourceForU.com | OPEN SOURCE FOR yOU | May 2014 | 89
3. Open Gurus Let's Try
90 | May 2014 | OPEN SOURCE FOR yOU | www.OpenSourceForU.com
static connector_callback_status_t app_get_mac_
{
return connector_callback_continue;
}
Now go to /connector/public/step/samples/connect_
to_device_cloud /.
Device Cloud.
To connect, you need to create a free Device Cloud
Developer account. Go to http://www.etherios.com/
products/devicecloud/ developerzone. You can connect up
to five devices with a Developer Edition account. When
registering, choose the cloud instance appropriate for you,
either Device Cloud US (login.etherios.com) or Device
Europe (login.etherios.co.uk). When you log in you’ll see
a dashboard (Figure 1) with a single window for managing
all your devices.
a Device ID, which is a globally unique 16-octet
MAC addresses.
To access a device from Device Cloud, we
need to add the device using MAC/IMEI to
Device Cloud. Once added, Device Cloud will
generate a Device ID.
Cloud Connector to connect to Device Cloud,
e.g., a VendorID, which can be found in My
Account (Figure 3).
Vendor ID won’t be available by default. You
need to click Generate/Provision Vendor ID to get
a unique Vendor ID for the account.
Now go to /connector/public/step/samples/
and
make the following changes:
or
Save and build the application as follows:
athomas@ubuntu:~/connector/public/step/samples/
connect_to_ device_cloud$ make clean all
executed now:
athomas@ubuntu:~/connector/public/step/samples/connect_to_
device_cloud$ ./connector
app_network_tcp_open: connected to login.etherios.co.uk
Send keepalive params
Send protocol version
Figure 1: Device management
Figure 2: Adding devices to Device Cloud
Figure 3: My Account
4. Open GurusLet's Try
www.OpenSourceForU.com | OPEN SOURCE FOR yOU | May 2014 | 91
address: found
Address
Send complete
connector_tcp_communication_started
keepalive
You can see Etherios Cloud Connector
reporting the MAC/VendorID/IP address of the
device to the cloud instance.
Now if you check Device Cloud, you can see
that the device is connected (Figure 4).
If you right-click on the device, you can see
its properties and execute management tasks, such
as rebooting the device (Figure 5). If you want to
reboot the Linux machine, then re-run Etherios
Cloud Connector with root privileges.
#sudo ./connector
Now if you try to reboot from Device Cloud,
your Linux PC will be rebooted. We have now
successfully connected a Linux PC to Device Cloud.
Next you can add features to Etherios Cloud
Connector one at a time, as follows:
Data points: This is used to upload device
statistics periodically, like temperature, CPU
speed, etc.
Device requests: You can send messages to the device
from Device Cloud or from an end application.
Device Cloud.
the device.
a remote location via Device Cloud.
Device Cloud; from there your application can download
them at any time.
Once your device is connected to Device Cloud using
Figure 4: Device connection status
Figure 5: Device properties
Figure 6: API explorer
By: Bob Thomas
The author is an embedded open source enthusiast who works
at Digi International, with expertise in Etherios Cloud Connector
integration. You can reach him at Bob.thomas@digi.com
Etherios Cloud Connector, you can talk to your device from
any application around the world using the Web Services
APIs provided in Device Cloud.
Device Cloud allows you to generate source code
for the type of execution you want to do, which makes a
developer’s job easy.