Welcome!

Microservices Expo Authors: Liz McMillan, Derek Weeks, Lori MacVittie, Roger Strukhoff, AppDynamics Blog

Related Topics: Mobile IoT, Industrial IoT, Microservices Expo

Mobile IoT: Article

Effectively Manage Embedded Solutions Remotely

Wherever there are embedded devices – embed management capabilities

To get through a long day at the office you grab a snack from the vending machine, which never seems to be out of your favorite item thanks to a network connection that sends inventory information and replenishment requests to the vending management company. After work, you call home and ask what to pick up for dinner, making the call using a Bluetooth connection between your cell phone and the communications system in your car. On the way home you stop at the grocery store to grab dinner and rent a DVD from a rental machine.

Transactions like these occur every day by people around the world thanks to embedded systems that run inside vending machines, gas pumps, kiosks, price checkers, retail point-of-sale stations and other devices within the retail, hospitality and financial sectors of the market. Embedded Systems can also be found in many household items including utility meters, appliances, security systems, set-top boxes like DVRs, and home electronics. There are even embedded systems in medical devices in hospitals and doctors' offices and in factories or industrial sectors as part of machine-to-machine (M2M) interfaces such as processing equipment, controllers, sensors and robotics/automation equipment.

Although embedded and remote devices are not always obvious, due to their behind-the-scenes role, they are becoming pervasive. There will be upwards of 400 million embedded devices and M2M connections by 2014. Last year, there were approximately 75 million embedded devices with cellular communication capability, but that's expected to triple to more than 2.2 billion by 2014. Along with this exponential growth, the number of M2M devices capable of 4G wireless communications is expected to grow from just 40,000 this year to 12.6 million in 2015.

Embedded Management Challenges
As the importance of embedded devices grows, so will the market, and along with it the need for effective remote device management solutions. Embedded devices need to be managed just like other IT assets, however, traditional enterprise IT management solutions are frequently not equipped to handle the challenges posed by embedded devices. This is because software residing on embedded devices must not only protect data, safeguard customer information and meet enterprise standards for network, device and data security, but it must also work to reduce, or eliminate, the occurrence of downtime.

Uptime is essential for embedded devices; this makes shutting them down for routine maintenance out of the question. Embedded systems are designed to run unattended, and are installed in equipment or locations that are far from the physical reach of those responsible for support and service.

Because of these challenges and characteristics, whenever and wherever embedded devices are used, remote management systems should be used along with them.

Implementation and Features
Since uptime is so important for embedded devices, and the devices may be hundreds of miles apart, monitoring and management features that help maintain uptime are extremely valuable. Below are the essential features and capabilities on how to remotely manage embedded devices.

Ability to Access the Device Remotely
Since it is not enough to just see what's happening within an embedded device, support staff also needs the ability to fix a problem. With remote access, administrators can perform troubleshooting without having to actually touch the device. Remote access minimizes downtime because it provides the centralized tools for faster problem resolution.

Two-Way Communication That Is Secure and Automated
Remote device management solutions with two-way communication are able to receive status reports, allowing them to utilize data and diagnostic information from embedded systems and then administer security updates, software patches and other changes. Two-way communication is a quintessential feature for proactive management because it alerts administrators to performance issues before actual problems occur.

Top-Level Security
Remote device management solutions are not only substitutes for building security safeguards into embedded devices, but should also augment and strengthen security. Embedded devices should have native protection to prevent hacking, secure data, and provide authentication for communication and data transfer. Device management solutions can enhance these protections by giving administrators the ability to remotely lock down devices, selectively or completely wipe data, block communications and data transfer, and otherwise disable the device.

Health Information from the Device
With device health updates, organizations can lengthen uptime by reducing the lag time between when a problem occurs and when it is discovered. Remote device management solutions automatically alert administrators when error messages are detected or when devices go offline, enabling issues to be identified and resolved quickly. The management system should also be able to collect, store, and report information about utilization and uptime, unauthorized access attempts and other historical data that can be used to help configure, manage, and secure the device.

Support for Multiple Platforms
Remote management solutions can add even more value by supporting various types of devices and being able to integrate with and complement existing enterprise management solutions. The management solution needn't be device specific; the same solution used to support embedded devices could also be used to manage other assets, such as smart phones, PDAs and handheld computers, kiosks, POS terminals, industrial controls. Device management solutions that support network standards; leading operating systems such Microsoft Windows Mobile, Microsoft Windows and Embedded CE; and multiple smart phone and device platforms provide value by enabling the organization to leverage its investment in management capabilities across multiple assets. The value of leveraging will increase, as organizations have to manage increasingly large and diverse populations of embedded, mobile and wireless devices. To further leverage legacy investments, the management solution for embedded devices should support and integrate with enterprise management solutions that may already be in place, such as Microsoft Configuration Manager 2007. Administrators do not want a separate management solution for each different type of device they need to support, so they should plan for the future by specifying management solutions that can support a heterogeneous environment.

Embedded devices are all around us, their capabilities are growing exponentially, and the installed base is projected to grow into tens of billions. The possibilities are exciting, but organizations need to be careful to ensure that as their population of embedded devices grows, they have the ability to manage them. Vending machines, kiosks, industrial controllers, and other embedded systems don't look like laptops or PDAs, but the principles and best practices for managing IT assets need to be applied to them. Wherever devices are embedded, remote management capabilities should be embedded with them so systems can be maintained reliably, efficiently, and securely.

More Stories By Mark Gentile

Mark Gentile is founder, president and CEO of Odyssey Software Inc, a pioneer in the mobile enterprise software market. He has led the design, development, and implementation of mobile enterprise solutions for many Fortune 500 companies across North America. Odyssey Software is the creator of Athena, the industry's premier enterprise-class mobile and embedded device management product for today’s most popular device platforms including the Windows Embedded CE operating system.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
With emerging ideas, innovation, and talents, the lines between DevOps, release engineering, and even security are rapidly blurring. I invite you to sit down for a moment with Principle Consultant, J. Paul Reed, and listen to his take on what the intersection between these once individualized fields entails, and may even foreshadow.
In case you haven’t heard, the new hotness in app architectures is serverless. Mainly restricted to cloud environments (Amazon Lambda, Google Cloud Functions, Microsoft Azure Functions) the general concept is that you don’t have to worry about anything but the small snippets of code (functions) you write to do something when something happens. That’s an event-driven model, by the way, that should be very familiar to anyone who has taken advantage of a programmable proxy to do app or API routing ...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
Cloud Expo 2016 New York at the Javits Center New York was characterized by increased attendance and a new focus on operations. These were both encouraging signs for all involved in Cloud Computing and all that it touches. As Conference Chair, I work with the Cloud Expo team to structure three keynotes, numerous general sessions, and more than 150 breakout sessions along 10 tracks. Our job is to balance the state of enterprise IT today with the trends that will be commonplace tomorrow. Mobile...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Large enterprises today are juggling an enormous variety of network equipment. Business users are asking for specific network throughput guarantees when it comes to their critical applications, legal departments require compliance with mandated regulatory frameworks, and operations are asked to do more with shrinking budgets. All these requirements do not easily align with existing network architectures; hence, network operators are continuously faced with a slew of granular parameter change req...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
As applications are promoted from the development environment to the CI or the QA environment and then into the production environment, it is very common for the configuration settings to be changed as the code is promoted. For example, the settings for the database connection pools are typically lower in development environment than the QA/Load Testing environment. The primary reason for the existence of the configuration setting differences is to enhance application performance. However, occas...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...