The Internet of Things on AWS – Official Blog

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Post by Angela Wang and Tanner McRae, Senior Engineers on the AWS Solutions Architecture R&D and Innovation team This post is the third in a series on how to build and deploy a custom object detection model to the edge using Amazon SageMaker and AWS IoT Greengrass. In the previous 2 parts of the series, we walked […]

Enable compliance and mitigate IoT risks with automated incident response

Introduction Internet of Things (IoT) devices can present unique security challenges ranging from malware, DDoS attacks, and logical or physical compromise. You can prepare for such events by having a process in place to mitigate these risks when they occur. The IoT Lens of the Well-Architected Framework provides high-level guidance on how to be prepared for […]

How to reduce latency with Amazon Kinesis Video Streams – Part 2

In this, part 2 on how to reduce latency in media managed by Amazon Kinesis Video Streams (KVS) I describe the techniques in which to configure KVS, the media producer and the media player for optimal latency settings. Then, I introduce the Amazon Kinesis Video Stream Web Viewer and perform a number of experiments on […]

How to reduce latency with Amazon Kinesis Video Streams – Part 1

In this two part series I describe how to reduce latency of streaming media managed by Amazon Kinesis Video Streams and how less than 2-second latency can be delivered with robust video quality across a variety of network conditions. Then, I provide a practical demonstration showing that with the Amazon Kinesis Video Stream Web Viewer, […]

Managing Docker container lifecycle with AWS IoT Greengrass

Introduction In this post, we will be discussing how to manage Docker container lifecycle using an AWS IoT Greengrass custom component. There are five phases in a Docker container lifecycle: create, run, pause/unpause, stop, and kill. The custom component interacts with the Docker Engine via the Docker SDK for Python to manage processes based on […]

Introducing the new AWS IoT Core Device Location feature to support Asset Tracking solutions

Introduction AWS IoT Core Device Location is a new managed feature of AWS IoT Core that enables customers to choose the appropriate location technology that works within their business and engineering constraints, without relying on Global Positioning System (GPS) hardware. With location data, customers can optimize business processes, simplify and automate maintenance efforts, and unlock […]

Introducing new MQTTv5 features for AWS IoT Core to help build flexible architecture patterns

Introduction We are excited to announce that AWS IoT Core now supports MQTTv5 features that help enhance communications of large-scale device deployments and innovate device messaging patterns. Customers who already have MQTTv3.1.1 deployments can make use of the new MQTTv5 features as AWS IoT Core provides seamless integration between both versions and supports heterogeneous deployments […]

Reduce building maintenance costs with AWS IoT TwinMaker Knowledge Graph

Introduction The shift from in office work to hybrid and fully remote work is causing revenue and valuation pressure on commercial building owners. As a result, building managers are exploring ways to optimize their expenses by reducing maintenance costs while still providing a premier tenant experience. Building managers are responsible for maintenance and providing a […]

Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub

Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]