Microsoft Developer is currently live streaming this session on Azure Digital Twins.

In this session we will demonstrate an application that combines 3D models, 2D maps, and reality mesh into a single environment for visualization. Within that environment we will demonstrate a live, real time, seamless visualization of IoT data streams. Next we will walk through the architecture that enables the application. We will show how we have mapped the IoT data to the assets within the digital twin. And we will show how to keep the digital twin in step with engineering changes. This is done by automating the generation of the Digital Twin Description Language (DTDL) .JSON.

Here’s a great session on Azure RTOS

Azure RTOS is a small, fast, reliable, and easy-to-use real-time operating system. In this video introduction, we’ll discuss the major components that make up the Azure RTOS ecosystem: the ThreadX RTOS, NetX TCP/IP stack, FileX embedded file system, GUIX embedded GUI, and USBX embedded USB stack. We’ll also cover some tools to make development easier, such as GUIX Studio (a WYSIWYG GUI designer that auto-generates C code to run on embedded devices) and TraceX (an event trace tool that feels like a software logic analyzer).

Guest Speaker: Scott Larson – Azure IoT Senior Engineer
Deep Dive Host: Pamela Cortez – Azure IoT

In this video, walk through the steps for creating and visualizing indoor maps, querying map data and integrating it with IoT.

The Azure Maps Creator service enables customers to upload their private maps, floorplans, spaces and asset information to manage, monitor, and track their IoT assets within spaces like offices, malls, and airports, with extensibility to support other private map scenarios considered private in nature all within a customer’s control. 

Are you a developer implementing, coding or maintaining cloud or edge components of IoT solutions?

Is part of your job to manage devices life cycle – set up, configuration, and maintenance – using cloud services?

Do you design IoT solutions including device topology, connectivity, debugging, and security?

Do you implement solutions to manage, monitor, and transform data related to IoT?

If these job responsibilities sound familiar, I have a great opportunity for you to showcase your skills and be recognized for them: Take AZ-220 exam: Microsoft Azure IoT Developer.

Hear more about the new Microsoft Certified: Azure IoT Developer Specialty and resources to learn how to build IoT solutions with Azure IoT. Visit http://aka.ms/azureiotdeveloper to learn more about the Azure IoT Developer Specialty.

Resources

Azure IoT Central, Microsoft’s IoT app platform, reduces the burden and costs associated with developing, managing and maintaining enterprise-grade IoT solutions.

With IoT Central you can provision an IoT application in 15 seconds, customize it in an hour and go to production the same day. Azure IoT recently announced a set of breakthrough features to help solution builders accelerate time-to-value. In this deep dive, Pamela Cortez and Ranga Vadlamudi will go into how to build with IoT Central with these latest features:

  • IoT Edge support, including management for edge devices and IoT Edge module deployments

Future deep dives will go through these areas in-depth:

  • 11 new industry-focused application templates to accelerate solution builders across retail, health care, government and energy
  • API support for extending IoT Central or integrating it with other solutions, including API support for device modeling, provisioning, lifecycle management, operations and data querying

Speakers

Deep Dives are hosted by Pamela Cortez from the Azure IoT Team.

Special guest

  • Ranga Vadlamudi

Resources

Confidential computing is difficult and Microsoft, together with partners, has embarked on simplifying confidential computing in IoT using enclaves on Open Enclave SDK.

From the description:

The enormity of data and the evolution of intelligence in IoT is inspiring new computational models that distribute compute from cloud to edge and synthesize data to improve business outcomes. The result is rapid growth in patterns such as deploying proprietary algorithms and data including AI, generating valuable insights including monetization avenues in, and creating direct actions including those controlling downstream critical infrastructure from IoT devices. But such patterns are potentially susceptible to exposure of algorithms, data, valuable insights, and tampering of actions unless the computational environment is protected by confidential computing.