For our first project of this book, we will be creating a mini weather station that will be based on… Read more
Category: Defining a problem
A high-level design flow for AWS – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
Now, we will look at a sample of a design flow based on AWS; a zoom-into-the-cloud icon from the previous… Read more
Data processing and storage – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
Data processing and storage is a crucial part of working with data as part of the IoT. Once we have… Read more
Red LED Lighting Hello World exercise – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
To test the functionality of the ESP32 and to give you a taste of working with your new development kit,… Read more
Setting up your Arduino IDE environment – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
Your Arduino IDE environment is where you will be working with your code and uploading that code onto your ESP32…. Read more
Connectivity – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
The third pillar of IoT is connectivity, which is about the transmission of data and ensuring that all the pillars… Read more
IoT versus machine-to-machine – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
Machine-to-machine (M2M) is based on the communication between two machines without the need for human intervention, which can be achieved… Read more
The evolution of the IoT – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
The concept of the IoT started with a lesser-known story based at Carnegie Mellon University in the 1980s, where a… Read more
Technical requirements – An Introduction to IoT Architecture, Hardware, and Real-Life Applications
If you are a practitioner within the tech industry, the term Internet of Things (IoT) should not sound foreign to… Read more
User awareness and training – Future Trends and Challenges
User awareness and training are crucial components of a comprehensive strategy for securing cloud environments through CSPM. Educating users about… Read more