|By Mark Gentile||
|December 1, 2010 10:12 AM EST||
To get through a long day at the office you grab a snack from the vending machine, which never seems to be out of your favorite item thanks to a network connection that sends inventory information and replenishment requests to the vending management company. After work, you call home and ask what to pick up for dinner, making the call using a Bluetooth connection between your cell phone and the communications system in your car. On the way home you stop at the grocery store to grab dinner and rent a DVD from a rental machine.
Transactions like these occur every day by people around the world thanks to embedded systems that run inside vending machines, gas pumps, kiosks, price checkers, retail point-of-sale stations and other devices within the retail, hospitality and financial sectors of the market. Embedded Systems can also be found in many household items including utility meters, appliances, security systems, set-top boxes like DVRs, and home electronics. There are even embedded systems in medical devices in hospitals and doctors' offices and in factories or industrial sectors as part of machine-to-machine (M2M) interfaces such as processing equipment, controllers, sensors and robotics/automation equipment.
Although embedded and remote devices are not always obvious, due to their behind-the-scenes role, they are becoming pervasive. There will be upwards of 400 million embedded devices and M2M connections by 2014. Last year, there were approximately 75 million embedded devices with cellular communication capability, but that's expected to triple to more than 2.2 billion by 2014. Along with this exponential growth, the number of M2M devices capable of 4G wireless communications is expected to grow from just 40,000 this year to 12.6 million in 2015.
Embedded Management Challenges
As the importance of embedded devices grows, so will the market, and along with it the need for effective remote device management solutions. Embedded devices need to be managed just like other IT assets, however, traditional enterprise IT management solutions are frequently not equipped to handle the challenges posed by embedded devices. This is because software residing on embedded devices must not only protect data, safeguard customer information and meet enterprise standards for network, device and data security, but it must also work to reduce, or eliminate, the occurrence of downtime.
Uptime is essential for embedded devices; this makes shutting them down for routine maintenance out of the question. Embedded systems are designed to run unattended, and are installed in equipment or locations that are far from the physical reach of those responsible for support and service.
Because of these challenges and characteristics, whenever and wherever embedded devices are used, remote management systems should be used along with them.
Implementation and Features
Since uptime is so important for embedded devices, and the devices may be hundreds of miles apart, monitoring and management features that help maintain uptime are extremely valuable. Below are the essential features and capabilities on how to remotely manage embedded devices.
Ability to Access the Device Remotely
Since it is not enough to just see what's happening within an embedded device, support staff also needs the ability to fix a problem. With remote access, administrators can perform troubleshooting without having to actually touch the device. Remote access minimizes downtime because it provides the centralized tools for faster problem resolution.
Two-Way Communication That Is Secure and Automated
Remote device management solutions with two-way communication are able to receive status reports, allowing them to utilize data and diagnostic information from embedded systems and then administer security updates, software patches and other changes. Two-way communication is a quintessential feature for proactive management because it alerts administrators to performance issues before actual problems occur.
Remote device management solutions are not only substitutes for building security safeguards into embedded devices, but should also augment and strengthen security. Embedded devices should have native protection to prevent hacking, secure data, and provide authentication for communication and data transfer. Device management solutions can enhance these protections by giving administrators the ability to remotely lock down devices, selectively or completely wipe data, block communications and data transfer, and otherwise disable the device.
Health Information from the Device
With device health updates, organizations can lengthen uptime by reducing the lag time between when a problem occurs and when it is discovered. Remote device management solutions automatically alert administrators when error messages are detected or when devices go offline, enabling issues to be identified and resolved quickly. The management system should also be able to collect, store, and report information about utilization and uptime, unauthorized access attempts and other historical data that can be used to help configure, manage, and secure the device.
Support for Multiple Platforms
Remote management solutions can add even more value by supporting various types of devices and being able to integrate with and complement existing enterprise management solutions. The management solution needn't be device specific; the same solution used to support embedded devices could also be used to manage other assets, such as smart phones, PDAs and handheld computers, kiosks, POS terminals, industrial controls. Device management solutions that support network standards; leading operating systems such Microsoft Windows Mobile, Microsoft Windows and Embedded CE; and multiple smart phone and device platforms provide value by enabling the organization to leverage its investment in management capabilities across multiple assets. The value of leveraging will increase, as organizations have to manage increasingly large and diverse populations of embedded, mobile and wireless devices. To further leverage legacy investments, the management solution for embedded devices should support and integrate with enterprise management solutions that may already be in place, such as Microsoft Configuration Manager 2007. Administrators do not want a separate management solution for each different type of device they need to support, so they should plan for the future by specifying management solutions that can support a heterogeneous environment.
Embedded devices are all around us, their capabilities are growing exponentially, and the installed base is projected to grow into tens of billions. The possibilities are exciting, but organizations need to be careful to ensure that as their population of embedded devices grows, they have the ability to manage them. Vending machines, kiosks, industrial controllers, and other embedded systems don't look like laptops or PDAs, but the principles and best practices for managing IT assets need to be applied to them. Wherever devices are embedded, remote management capabilities should be embedded with them so systems can be maintained reliably, efficiently, and securely.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Apr. 27, 2017 09:15 PM EDT Reads: 7,289
In large enterprises, environment provisioning and server provisioning account for a significant portion of the operations team's time. This often leaves users frustrated while they wait for these services. For instance, server provisioning can take several days and sometimes even weeks. At the same time, digital transformation means the need for server and environment provisioning is constantly growing. Organizations are adopting agile methodologies and software teams are increasing the speed ...
Apr. 27, 2017 08:30 PM EDT Reads: 3,404
Is your application too difficult to manage? Do changes take dozens of developers hundreds of hours to execute, and frequently result in downtime across all your site’s functions? It sounds like you have a monolith! A monolith is one of the three main software architectures that define most applications. Whether you’ve intentionally set out to create a monolith or not, it’s worth at least weighing the pros and cons of the different architectural approaches and deciding which one makes the most s...
Apr. 27, 2017 08:15 PM EDT Reads: 2,832
When you decide to launch a startup company, business advisors, counselors, bankers and armchair know-it-alls will tell you that the first thing you need to do is get funding. While there is some validity to that boilerplate piece of wisdom, the availability of and need for startup funding has gone through a dramatic transformation over the past decade, and the next few years will see even more of a shift. A perfect storm of events is causing this seismic shift. On the macroeconomic side this ...
Apr. 27, 2017 04:15 PM EDT Reads: 379
Developers want to create better apps faster. Static clouds are giving way to scalable systems, with dynamic resource allocation and application monitoring. You won't hear that chant from users on any picket line, but helping developers to create better apps faster is the mission of Lee Atchison, principal cloud architect and advocate at New Relic Inc., based in San Francisco. His singular job is to understand and drive the industry in the areas of cloud architecture, microservices, scalability ...
Apr. 27, 2017 03:00 PM EDT Reads: 3,584
A Man in the Middle attack, or MITM, is a situation wherein a malicious entity can read/write data that is being transmitted between two or more systems (in most cases, between you and the website that you are surfing). MITMs are common in China, thanks to the “Great Cannon.” The “Great Cannon” is slightly different from the “The Great Firewall.” The firewall monitors web traffic moving in and out of China and blocks prohibited content. The Great Cannon, on the other hand, acts as a man in the...
Apr. 27, 2017 01:30 PM EDT Reads: 261
This recent research on cloud computing from the Register delves a little deeper than many of the "We're all adopting cloud!" surveys we've seen. They found that meaningful cloud adoption and the idea of the cloud-first enterprise are still not reality for many businesses. The Register's stats also show a more gradual cloud deployment trend over the past five years, not any sort of explosion. One important takeaway is that coherence across internal and external clouds is essential for IT right n...
Apr. 27, 2017 01:15 PM EDT Reads: 1,756
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing be...
Apr. 27, 2017 10:00 AM EDT Reads: 707
Back in February of 2017, Andrew Clay Schafer of Pivotal tweeted the following: “seriously tho, the whole software industry is stuck on deployment when we desperately need architecture and telemetry.” Intrigue in a 140 characters. For me, I hear Andrew saying, “we’re jumping to step 5 before we’ve successfully completed steps 1-4.”
Apr. 27, 2017 09:45 AM EDT Reads: 1,852
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
Apr. 27, 2017 08:15 AM EDT Reads: 3,356
To more closely examine the variety of ways in which IT departments around the world are integrating cloud services, and the effect hybrid IT has had on their organizations and IT job roles, SolarWinds recently released the SolarWinds IT Trends Report 2017: Portrait of a Hybrid Organization. This annual study consists of survey-based research that explores significant trends, developments, and movements related to and directly affecting IT and IT professionals.
Apr. 27, 2017 04:45 AM EDT Reads: 1,741
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Apr. 27, 2017 03:15 AM EDT Reads: 6,087
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
Apr. 27, 2017 12:00 AM EDT Reads: 9,241
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Apr. 26, 2017 09:45 PM EDT Reads: 2,635
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, will discuss how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He will discuss how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Apr. 25, 2017 06:00 AM EDT Reads: 4,352
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Apr. 25, 2017 03:15 AM EDT Reads: 8,939
Software as a service (SaaS), one of the earliest and most successful cloud services, has reached mainstream status. According to Cisco, by 2019 more than four-fifths (83 percent) of all data center traffic will be based in the cloud, up from 65 percent today. The majority of this traffic will be applications. Businesses of all sizes are adopting a variety of SaaS-based services – everything from collaboration tools to mission-critical commerce-oriented applications. The rise in SaaS usage has m...
Apr. 22, 2017 06:15 PM EDT Reads: 4,905
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, drew upon his own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He also discussed the implementation of microservices in data and application integrat...
Apr. 22, 2017 05:45 AM EDT Reads: 6,286
We'd all like to fulfill that "find a job you love and you'll never work a day in your life" cliché. But in reality, every job (even if it's our dream job) comes with its downsides. For you, the constant fight against shadow IT might get on your last nerves. For your developer coworkers, infrastructure management is the roadblock that stands in the way of focusing on coding. As you watch more and more applications and processes move to the cloud, technology is coming to developers' rescue-most r...
Apr. 22, 2017 04:00 AM EDT Reads: 4,145
2016 has been an amazing year for Docker and the container industry. We had 3 major releases of Docker engine this year , and tremendous increase in usage. The community has been following along and contributing amazing Docker resources to help you learn and get hands-on experience. Here’s some of the top read and viewed content for the year. Of course releases are always really popular, particularly when they fit requests we had from the community.
Apr. 22, 2017 03:45 AM EDT Reads: 3,643