In this deep dive, learn how to visualize telemetry and manage settings and commands exposed IoT Plug and Play device capability models, and how to build customized views and dashboards in IoT Central using simulated devices from the Azure Certified for IoT device catalog.
IoT Plug and Play is now in public preview (https://aka.ms/IoTShow/IoTpnp).
In this episode of the IoT Show, you will see the new Azure IoT Central experience with native support for IoT Plug and Play.
Azure IoT Central has drastically simplified the task of building IoT solutions by eliminating the need for any cloud side development.
With IoT Plug and Play solution builders can explore a range of Azure IoT Certified Plug and Play devices; pick the devices that best fit their solution needs and build a production grade solution within days without having to write a single line of embedded code, drastically cutting down the time to market and costs.
After watching this short episode of the IoT Show and if you want to learn more, tune in (or watch on demand) the IoT Show Deep Dive episode: https://aka.ms/iotshow/deepdive/006
Introducing Azure Data Explorer (aka.ms/IoTShow/ADXdocs) capabilities and how customers can build custom IoT analytics platforms using Big Data and AI taking advantage of Azure Data Explorer’s built-in advanced Time Series and Machine Learning capabilities.
Azure Security Center for IoT can help you monitor and manage your IoT security posture.
Organizations can now easily protect their IoT deployments using hundreds of built-in security assessments drawn from the industry best practices, or create custom rules in a central dashboard. With newly added IoT security capabilities, you can now reduce attack surface for your Azure IoT solution and remediate issues before they can be exploited.
In this episode of the IoT Show, IoT Security experts show how to onboard to Azure Security Center for IoT and demo some of the many security values you will get.
For more details, visit Azure Security Center for IoT documentation at:
Time Series Model enables customers author and manage metadata and computations and associate it with the telemetry ingested from IoT devices. This helps convey semantics about time series, allowing them to search and understand time series in a way that relates to the physical world.
In this episode of the IoT Show, Olivier discusses the IoT data flow within Azure Time Series Insights as well as demonstrate how TSI Model and Query work and can be used.
You can now derive rich insights from your IoT data in Azure Time Series Insights using advanced visualization options.
The team has introduced several new capabilities into TSI Explorer since we launched last December. These include significant Performance improvements, new Explorations like Scatter Plots & Heatmaps, as well as an enhanced JS SDK and more. Rahul Kayal, PM in the TSI team walks us through the latest additions and enhancements in TSI.
Check this video out to learn more.
Edureka has a great Azure IoT Tutorial For Beginners. Check it out!
In this video, learn what Azure Blob Storage on IoT Edge is, and how you can use it. You'll also learn how to configure, deploy, and use Azure Blob Storage on IoT Edge module with deviceToCloudUpload and deviceAutoDelete functionalities.
In this video, Olivier Bloch interviews Azure IoT partner L&T TS that unlocks Digital Transformation with Azure IoT for O.T. (Operations Technology) applications across Manufacturing & Industrial applications with unique Co-Sell Solutions.
Confidential computing is difficult and Microsoft, together with partners, has embarked on simplifying confidential computing in IoT using enclaves on Open Enclave SDK.
From the description:
The enormity of data and the evolution of intelligence in IoT is inspiring new computational models that distribute compute from cloud to edge and synthesize data to improve business outcomes. The result is rapid growth in patterns such as deploying proprietary algorithms and data including AI, generating valuable insights including monetization avenues in, and creating direct actions including those controlling downstream critical infrastructure from IoT devices. But such patterns are potentially susceptible to exposure of algorithms, data, valuable insights, and tampering of actions unless the computational environment is protected by confidential computing.