Tech-Trends

DevSecOps: Integrating Security into DevOps – Part 2

Continuing from my previous blog, let’s dive deeper into the implementation of DevSecOps. Integrating Security into DevOps To implement DevSecOps, it is essential to integrate security into every phase of the DevOps lifecycle. The following are the key phases in…
Read more

Introduction to NDepend : Static Code Analysis Tool

As a developer, you always have to take the pain of getting adapted to the best practices and coding guidelines to be followed as per the organizational or industrial standards.  Easy way to ensure your coding style follows certain standard…
Read more

IoT Security–Essentials–Part 01

Security(Cyber Security) is an essential requirement for any IoT platform or devices or end users and the communication infrastructure.  In order to achieve or design best possible security solutions,  to avoid some external entity or hacker gaining access to your…
Read more

Microsoft Azure IoT Suite–Provisioned solutions for Faster Time to Market IoT enabled solutions

Microsoft Azure IoT Suite Provisioned solutions will help you create your own fully integrated solutions tailored for your specific needs in the following 3 sections. Using these ready to consume solutions will accelerate your time to market IoT(Internet of Things)…
Read more

IoT Jargons – Identity of Things (IDoT)

The Identity of Things (IDoT) is an area involves assigning universal unique identifiers (UUID) with associated metadata to devices and objects (things), to identify, connect and communicate effectively with other machines over the internet or within constrained local network. The…
Read more

IoT Protocols–Quick Comparison

The table below contains a quick summary of the IoT protocols: Protocol CoAP XMPP RESTful HTTP MQTT AMQP Transport UDP TCP TCP TCP TCP Messaging Request/Response Publish/Subscribe Request/Response Request/Response Publish/Subscribe Request/Response Topic based Publish/Subscribe 2G, 3G, 4G Suitability (1000s nodes)…
Read more