DevSecOps: Integrating Security into DevOps – Part 2

Continuing from my previous blog, let’s dive deeper into the implementation of DevSecOps. Integrating Security into DevOps To implement DevSecOps, it is essential to integrate security into every phase of the DevOps lifecycle. The following are the key phases in DevOps and how to integrate security into each phase: DevSecOps Best Practices Here are some…

Read More

Introduction to NDepend : Static Code Analysis Tool

As a developer, you always have to take the pain of getting adapted to the best practices and coding guidelines to be followed as per the organizational or industrial standards.  Easy way to ensure your coding style follows certain standard is to manually analyze your code or use a static code analyzer like FxCop, StyleCop…

Read More

IoT Security–Essentials–Part 01

Security(Cyber Security) is an essential requirement for any IoT platform or devices or end users and the communication infrastructure.  In order to achieve or design best possible security solutions,  to avoid some external entity or hacker gaining access to your IoT device or infrastructure, every architect or system designer should do Threat Modeling exercise.  As…

Read More

Microsoft Azure IoT Suite–Provisioned solutions for Faster Time to Market IoT enabled solutions

Microsoft Azure IoT Suite Provisioned solutions will help you create your own fully integrated solutions tailored for your specific needs in the following 3 sections. Using these ready to consume solutions will accelerate your time to market IoT(Internet of Things) requirements. Remote Monitoring  – Connect and monitor your devices to analyze untapped data and improve…

Read More

IoT Jargons – Identity of Things (IDoT)

The Identity of Things (IDoT) is an area involves assigning universal unique identifiers (UUID) with associated metadata to devices and objects (things), to identify, connect and communicate effectively with other machines over the internet or within constrained local network. The metadata included with the UUID characterizes the identity of an endpoint. Identity is an essential…

Read More

IoT Protocols–Quick Comparison

The table below contains a quick summary of the IoT protocols: Protocol CoAP XMPP RESTful HTTP MQTT AMQP Transport UDP TCP TCP TCP TCP Messaging Request/Response Publish/Subscribe Request/Response Request/Response Publish/Subscribe Request/Response Topic based Publish/Subscribe 2G, 3G, 4G Suitability (1000s nodes) Excellent Excellent Excellent Excellent Excellent LLN Suitability (1000s nodes) Excellent Fair Fair Fair Excellent Compute…

Read More