IoT Blog Written By Experts For Experts

Insights from Foundries.io on IoT device management, security, partners & more

Photo of Raul Muñoz

Posted on Dec 9, 2025 by Raul Muñoz

7 min read

In Part 1 of this Arduino UNO Q Elf Detector Series, we mastered the simple dual-core architecture by blinking a single LED. But let’s be honest: a single blinking light isn't going to scare off a determined elf. They make toys; they know how LEDs work. To truly secure the workshop, we need "shock and awe." We are moving to a more sophisticated use case: controlling the Arduino UNO Q’s built-in 13x8 LED matrix display. That is 104 individually controllable LEDs; enough to turn my workbench into a blinding disco of deterrence.

Photo of Raul Muñoz

Posted on Dec 8, 2025 by Raul Muñoz

9 min read

Welcome back to the Arduino UNO Q Elf Detector Series. I’m happy to report that the Arduino UNO Q survived the first night! I left a decoy microcontroller on the workbench, an old 8-bit board with bent pins, and sure enough, it was gone this morning. But the Arduino UNO Q remained safe in my hidden drawer.

Photo of Raul Muñoz

Posted on Dec 5, 2025 by Raul Muñoz

8 min read

Arduino UNO Q Elf Detector Series - Part 0: Introduction The holiday season is here, and like any good engineer, this means pre-gifting myself a project!

Photo of Brendan Wood

Posted on Nov 26, 2025 by Brendan Wood

19 min read

A container enables an application to be packaged and isolated with its runtime environment.

Photo of Raul Muñoz

Posted on Nov 5, 2025 by Raul Muñoz

11 min read

The 1960s was the decade in which the car industry, first in the US and eventually across the whole world, found itself at the center of concerns about safety and the high numbers of deaths and injuries caused by collisions on the road

Photo of Andy Doan

Posted on Sep 30, 2025 by Andy Doan

14 min read

The practice of containerization developed first in server-side and enterprise computing environments, providing a way to isolate applications in highly complex systems, and allow flexible, fast modification or updating without disrupting the entire system.

Photo of Caio Pereira

Posted on Sep 2, 2025 by Caio Pereira

8 min read

Doesn’t it make sense to learn from the security mistakes that others have made, and avoid the pain which they had to go through in putting their mistake right?

Photo of Brendan Wood

Posted on Aug 26, 2025 by Brendan Wood

17 min read

Why identity is the foundation of IoT security The basic elements of security protection for IoT devices are familiar to most developers: A device must be safe from the risk of tampering, side-channel attacks, and other forms of physical attack A device must run authentic firmware which is protected against unauthorized changes The data on the device must be protected from unauthorized access, both at rest and in transit The device’s firmware must be capable of being updated remotely to maintain its protection against emerging cyber threats For a deeper dive into the fundamentals of securing connected devices, check out our guide on IoT security.

Photo of Brendan Wood

Posted on Jul 23, 2025 by Brendan Wood

15 min read

The challenge of scaling embedded Linux product development Developers of connected embedded and IoT products face a set of challenges which developers of enterprise computing systems or mobile phone apps do not experience

Photo of Brendan Wood

Posted on May 23, 2025 by Brendan Wood

18 min read

Foundations first: putting the basics of IoT security in place As Embedded and Internet of Things (IoT) devices grow in capability, making them more secure has become a critical priority for product manufacturers to master