IoT Blog Written By Experts For Experts

The Foundries.io Blog

Fleet Management

How to wave

In a production environment it is convenient to plan updates, and have control on when and which device(s) are updated. FoundriesFactory Waves is the feature for this. This post gathers a suggested sequence of commands to configure the first wave, and to guide for next waves.

Read more →

IoT Security

NXP EdgeLock® SE05x: Accessing a Secure Element from a Trusted Execution Environment

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more →

Blog category image
nvidia

Foundries.io adds NVIDIA to rapidly growing list of semiconductor SoC vendor partners

Foundries.​io cloud platform will support Linux-based IoT and AI development.

Read more
Blog category image
FoundriesFactory

Artifacts for debugging a FoundriesFactory build

The debug messages from the Yocto Project are important when the build does not complete, or when a package does not behave as expected. Logs can help to verify if files are well placed, variables have the expected value, and the set of packages being built is enough.

Read more
Blog category image
FoundriesFactory

Arduino and Foundries.io: Making Secure, Embedded Enterprise Linux IoT Solutions Easy

Years in the future, the electronics industry may look back on March 24, 2022 as a pivotal moment in the history of embedded Linux-based IoT device development, the day that suddenly it became much easier to build, test, deploy and maintain secure and updatable edge products.

Read more
Blog category image
FoundriesFactory

Changes from Honister that impact a FoundriesFactory

The Yocto Project has made critical changes in the Honister release (3.4). This post details two changes that impact a FoundriesFactory: Override syntax Directory structure for tune files. A future LmP version will be released based on Honister. These changes do not impact the current version (v85). By knowing what to expect in future LmP versions, plans can be made to ease the transition.

Read more
Blog category image
Docker Containers

Bringing Docker containers to IoT & Edge devices: Part 1, Restorable Compose Apps

Container technologies have been playing a significant role in the software development world since their inception with chroot. Thanks to Docker, containers have become the de facto standard for packaging, distribution, deployment, and running of cloud applications. You know they say "Build, Ship, and Run Any App, Anywhere". The question is, though, is this Anywhere really anywhere? In particular, can we "Build, Ship and Run Any App, on Any IoT & Edge Devices" or at least Some Apps on Some IoT & Edge Devices? Let's think about whether Containers can be applied to IoT & Edge software development too, whether it's feasible at all, and if yes, what benefits it brings. And last but not least, what challenges in adaptation of Containers to the Edge use-case there are.

Read more
Blog category image
IoT Security

NXP EdgeLock® SE05x execution on TEE: enabling the GP Secure Channel Protocol 03

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more
Blog category image
FoundriesFactory

Integrating with AWS IoT using Just-in-Time Provisioning

Integrating with AWS IoT Core sounds easy at first. However, making it work for a fleet of devices turns out to be a complicated task of navigating many sources of information... this week I found clarity.

Read more
Blog category image
IoT Security

NXP EdgeLock® SE05x: Accessing a Secure Element from a Trusted Execution Environment

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more
Blog category image
IoT Security

How to read the boot logs to check the used keys

Introduction The secure platform, provided by Foundries.io is leveraged by several layers of signed binaries which are verified during boot time. Some layers use proprietary source code (such as the secure boot on some architectures) and other layers are part of well known open source projects (such as U-Boot and Linux Kernel). This article details how to read the available log and artifacts from a booting machine, in order to detect the verification mechanism executed during a normal boot.

Read more
Blog category image
FoundriesFactory

Testing software at Foundries.io (part 1)

Testing a customizable operating system is a tricky business. It is even harder when the features are determined by the hardware the OS is running on. Foundries.io delivers a product that needs to work on every platform we support.

Read more

Keep up to date with Foundries.io