H5: Recommendations
I look at art as a container. You can’t get inside it, so you have to ask all of these questions.
Mark Bradford
The previous blog is at: “H4: Second half of the 12-factor app”
The Internet of Things (IoT) has brought with it a slew of advantages. However, it has increased and altered risks in business and IT. Reports of hijacked cameras hacked medical equipment and infiltrated industrial control systems have appeared in recent years. This situation is expected to worsen when 5G takes hold and gadgets with embedded IoT capabilities arrive. What makes IoT so challenging is that it puts an extra layer of security on top of current safeguards. IoT is included in almost all aspects of a business, partners and supply chains — it encompasses firmware, operating systems, TCP/IP stacks, network design, data security technologies, and much more.
Davos
Davos is an FTP automation programme that searches specified host sites for fresh files regularly. It may be set up to do a variety of things, such as listening for particular files to exist at the host location, then downloading and moving them if necessary. It also includes completion alerts and downstream API calls to help move the workflow along.
We can use Davos to push the binary files where we will use to send the Over The Air (OTA) updates to the individual IoT devices.