DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Building Scalable Real-Time Apps with AstraDB and Vaadin
Register Now

The Latest IoT Topics

article thumbnail
Managed MQTT Broker Comparison — Product Packages and Pricing
In this article, we will compare the differences between several managed MQTT Brokers in aspects of product packages and pricing.
October 25, 2022
by David Li
· 5,040 Views · 1 Like
article thumbnail
Managed MQTT Broker Comparison — Console/Dashboard Features
I will compare the differences between several managed MQTT Brokers in aspects of console/dashboard features.
November 9, 2022
by David Li
· 5,224 Views · 1 Like
article thumbnail
Making Enterprise Developers Lives Easier With Cloud Tools: An Interview With Andi Grabner
This interview with Dynatrace DevOps activist Andi Grabner talks about some of the ways using Dynatrace helps developers spend more time coding.
February 12, 2020
by Blake Ethridge
· 8,923 Views · 6 Likes
article thumbnail
Low-Risk Monolith to Microservice Evolution: Part III
This microservices series continues to guide us through the steps of a low-risk shift away from the monolith and towards a distributed system.
October 27, 2017
by Christian Posta
· 4,868 Views · 4 Likes
article thumbnail
Low Latency Edge Data Streaming With Kafka and Cloud-Native 5G Infrastructure
This blog post explores architectures for low latency deployments leveraging a combination of cloud-native infrastructure at the edge.
July 22, 2021
by Kai Wähner CORE
· 3,440 Views · 3 Likes
article thumbnail
Life Beyond Kafka With Apache Pulsar
Moving on — finding love after Kafka.
October 4, 2019
by Avaro Santos Andres
· 80,014 Views · 52 Likes
article thumbnail
Learn All About Reappt Topics [Video Tutorial]
In this video, you'll learn about what topics are, how to subscribe to topics and the different types of topics.
September 10, 2016
by Lee Spacagna
· 2,911 Views · 2 Likes
article thumbnail
Key Design Elements for IoT Sensors
Here are some vital things to remember as a sensor designer or someone trying to select the most appropriate products to buy.
June 15, 2022
by Emily Newton
· 8,323 Views · 1 Like
article thumbnail
Kafka Streams: Catching Data in the Act (Part 3)
Here, we go over the implementation of Kafka Streams and look at a few relevant code snippets before wrapping up this series of posts.
May 6, 2018
by Ashok Chilakapati
· 9,964 Views · 12 Likes
article thumbnail
Java Records: Making Bad Designs More Convenient
While "records" seem to be universally welcome, developers, especially fans of the object-oriented paradigm, should be careful when considering this new feature.
September 24, 2019
by Robert Brautigam
· 15,306 Views · 7 Likes
article thumbnail
January in IoT: Building and Succeeding With IoT
Check out this month's compilation of IoT news and tutorials, including advice for getting started with IoT, building with Arduinos and RPis, and monetizing IoT data.
January 22, 2018
by Mike Gates
· 7,479 Views · 2 Likes
article thumbnail
Tutorial — Relational Data Browsing
In this article, navigate bidirectionally through the database by following foreign-key-based or user-defined relationships with Jailer.
November 14, 2019
by Ralf Wisser
· 11,974 Views · 3 Likes
article thumbnail
It’s the Great PumpGAN, Charlie Brown
A pumpkin-themed tutorial!
October 31, 2019
by Kevin Vu
· 3,699 Views · 5 Likes
article thumbnail
Is My IoT Device Secure? 7 Questions You Should Be Asking Yourself Today
A few questions that you should be asking yourself as you’re building your connected product to keep your IoT device secure.
January 22, 2020
by Benjamin Cabé
· 18,923 Views · 9 Likes
article thumbnail
Is DevOps A Good Career?
If you're looking to develop a new career in the IT field, consider seeking a career in the still-growing field of DevOps.
March 10, 2020
by monica hesham
· 10,991 Views · 1 Like
article thumbnail
IoT's Security Nightmare: Unpatched Devices that Never Die
As the Internet of Things becomes a ubiquitous idea and a fact of life, what happens to all the aging and increasingly insecure Things? According to Wired's Robert Mcmillan, responding to a recent question on the security of IoT from Dan Geer, this may be a serious problem [1][2]. The solution, Mcmillan suggests, is to design these devices with an expiration date. In other words: they need to be programmed to die. The problem may not be too severe now, but the future of the Internet of Things will look different than it does now. Security will likely loosen, because software will be a part of everything, and it tends to be the case that things mass produced to that degree experience a bit of a drop in quality. That, Mcmillan argues, presents a problem: ...all code has bugs, and in the course of time, these bugs are going to be found and then exploited by a determined attacker. As we build more and more devices like thermostats and lightbulbs and smart trashcans that are expected to last much longer than a PC or a phone, maybe we need to design them to sign off at the point where they’re no longer supported with software patches. Otherwise, we’re in for a security nightmare. A similar argument came from Bruce Schneier's interview with Scott Berinato about how future bugs like Heartbleed could impact IoT [3]. Schneier's conclusion is that processes must be built into IoT devices and development to allow for regular patching and securing of embedded systems. How practical is that, though? Mcmillan points to some recent scenarios where these fears have already come true: the lack of support for Linksys routers infected with Moon Worm, for example. Long-term patching would solve these issues, but will the increasing number of organizations developing IoT products be forward-thinking enough to care? It's also not as if the problem will fade as the products become less popular, Mcmillan says: Researchers have studied the way that security vulnerabilities are discovered, and what they’ve found is that security bugs will keep cropping up, long after most software is released... in fact, they’ll only get worse. Open sourcing technology as it ages may also be a solution, Mcmillan says. However, even that is imperfect and requires a lot of cooperation from companies who may not be enthusiastic about such cooperation, as well as a base of developers interested enough in the technology to maintain it. So, creating devices with an expiration date may be one of the most practical solutions. Otherwise, what happens when IoT is everywhere? What happens when we stop taking care of the things that we build? [1] http://www.wired.com/2014/05/iot-death/ [2] http://geer.tinho.net/geer.secot.7v14.txt [3] https://dzone.com/articles/heartbleed-iot-how-much-worse
May 23, 2023
by Alec Noller
· 7,924 Views · 1 Like
article thumbnail
IoT & Terrorism: How Connected Devices Lead to Murder
Okay, so maybe an apocalyptic uprising of connected machines is not going to happen. Don't worry, though - there's still plenty of reason to believe that the Internet of Things will somehow lead to your death! According to Stuart Lauchlan at diginomica, the next great risk is almost here, and it's not even the Things themselves. It is, of course, the terrorists. To be specific, Lauchlan points (tongue firmly in cheek) to the 2014 iOCTA (Internet Organised Crime Threat Assessment) from Europol’s European Cybercrime Centre (EC3), which has predicted that the world will witness its first IoT murder within the next few months, and that it will be the work of criminals and terrorists: That . . . lurid prediction is actually parroting a report by US security firm IID, but Europol is warning that criminals and terrorists will use the IoT – or the Internet of Everything (IoE) as Europol calls it – and all its connected smart devices as weapons against the innocent. There is certainly something familiar about the image of IoT-hacking ne'er-do-wells: But Europol's prediction is not so tongue-in-cheek. A big part of their reasoning is that IoT is insecure. That seems to be a fairly valid concern. After all, we've heard quite a bit about how a possible (if not likely) future for IoT includes a security hellscape in which clueless companies fail to patch products as they stop supporting them, and everybody ends up with Doom installed on their toaster (or something along those lines). According to Europol, the problem is that an insecure IoT is big playground for crime: With the Internet of Everything expanding and becoming more widely adopted, new forms of critical infrastructure will appear and dependencies on existing ones will become more critical. As public and private sector organisations are outsourcing data, applications, platforms and entire infrastructures to large cloud service providers, cloud computing itself will become a critical infrastructure. Which is a problem because: . . . Big and Fast Data, the Internet of Everything, wearable devices, augmented reality, cloud computing, artificial intelligence and the transition to IPv6 will provide additional attack vectors and an increased attack surface for criminals. This will be exacerbated by how emerging and new technologies will be used and how they will influence people’s online behaviour. Europol has a few recommendations for curbing these dangers, but they aren't particularly innovative ideas - make sure policy-makers understand IoT, and make sure companies consider security, and things like that. Take comfort, though: according to Europol, you've still got a few months left to live.
May 23, 2023
by Alec Noller
· 9,001 Views · 2 Likes
article thumbnail
IoT Slam Day 1 Recap
IoT Slam is ongoing! Learn all about the latest developments in this summary and how you can position yourself for success as IoT grows and evolves.
June 21, 2017
by Mike Gates
· 5,219 Views · 2 Likes
article thumbnail
Ingesting GPS Data From Raspberry PI Zero Wireless With a USB GPS Device
This guide delves into using Python and Apache NiFi to ingest GPS data from IoT devices. In this case, we'll use a Raspberry Pi Zero.
May 11, 2017
by Tim Spann CORE
· 7,447 Views · 3 Likes
article thumbnail
IoT Around the House: Sensors, MongoDB, and REST API on the Onesait Platform (Part 1)
In this article, see part one of a project on how to measure the temperature at home with IoT sensors.
November 4, 2020
by Francisco Javier Lopez
· 14,442 Views · 7 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: