Click here to close now.

Welcome!

Microservices Journal Authors: Lori MacVittie, Alena Prokharchyk, Carmen Gonzalez, Srinivasan Sundara Rajan, Elizabeth White

Related Topics: Wireless, XML, Microservices Journal

Wireless: Article

Effectively Manage Embedded Solutions Remotely

Wherever there are embedded devices – embed management capabilities

To get through a long day at the office you grab a snack from the vending machine, which never seems to be out of your favorite item thanks to a network connection that sends inventory information and replenishment requests to the vending management company. After work, you call home and ask what to pick up for dinner, making the call using a Bluetooth connection between your cell phone and the communications system in your car. On the way home you stop at the grocery store to grab dinner and rent a DVD from a rental machine.

Transactions like these occur every day by people around the world thanks to embedded systems that run inside vending machines, gas pumps, kiosks, price checkers, retail point-of-sale stations and other devices within the retail, hospitality and financial sectors of the market. Embedded Systems can also be found in many household items including utility meters, appliances, security systems, set-top boxes like DVRs, and home electronics. There are even embedded systems in medical devices in hospitals and doctors' offices and in factories or industrial sectors as part of machine-to-machine (M2M) interfaces such as processing equipment, controllers, sensors and robotics/automation equipment.

Although embedded and remote devices are not always obvious, due to their behind-the-scenes role, they are becoming pervasive. There will be upwards of 400 million embedded devices and M2M connections by 2014. Last year, there were approximately 75 million embedded devices with cellular communication capability, but that's expected to triple to more than 2.2 billion by 2014. Along with this exponential growth, the number of M2M devices capable of 4G wireless communications is expected to grow from just 40,000 this year to 12.6 million in 2015.

Embedded Management Challenges
As the importance of embedded devices grows, so will the market, and along with it the need for effective remote device management solutions. Embedded devices need to be managed just like other IT assets, however, traditional enterprise IT management solutions are frequently not equipped to handle the challenges posed by embedded devices. This is because software residing on embedded devices must not only protect data, safeguard customer information and meet enterprise standards for network, device and data security, but it must also work to reduce, or eliminate, the occurrence of downtime.

Uptime is essential for embedded devices; this makes shutting them down for routine maintenance out of the question. Embedded systems are designed to run unattended, and are installed in equipment or locations that are far from the physical reach of those responsible for support and service.

Because of these challenges and characteristics, whenever and wherever embedded devices are used, remote management systems should be used along with them.

Implementation and Features
Since uptime is so important for embedded devices, and the devices may be hundreds of miles apart, monitoring and management features that help maintain uptime are extremely valuable. Below are the essential features and capabilities on how to remotely manage embedded devices.

Ability to Access the Device Remotely
Since it is not enough to just see what's happening within an embedded device, support staff also needs the ability to fix a problem. With remote access, administrators can perform troubleshooting without having to actually touch the device. Remote access minimizes downtime because it provides the centralized tools for faster problem resolution.

Two-Way Communication That Is Secure and Automated
Remote device management solutions with two-way communication are able to receive status reports, allowing them to utilize data and diagnostic information from embedded systems and then administer security updates, software patches and other changes. Two-way communication is a quintessential feature for proactive management because it alerts administrators to performance issues before actual problems occur.

Top-Level Security
Remote device management solutions are not only substitutes for building security safeguards into embedded devices, but should also augment and strengthen security. Embedded devices should have native protection to prevent hacking, secure data, and provide authentication for communication and data transfer. Device management solutions can enhance these protections by giving administrators the ability to remotely lock down devices, selectively or completely wipe data, block communications and data transfer, and otherwise disable the device.

Health Information from the Device
With device health updates, organizations can lengthen uptime by reducing the lag time between when a problem occurs and when it is discovered. Remote device management solutions automatically alert administrators when error messages are detected or when devices go offline, enabling issues to be identified and resolved quickly. The management system should also be able to collect, store, and report information about utilization and uptime, unauthorized access attempts and other historical data that can be used to help configure, manage, and secure the device.

Support for Multiple Platforms
Remote management solutions can add even more value by supporting various types of devices and being able to integrate with and complement existing enterprise management solutions. The management solution needn't be device specific; the same solution used to support embedded devices could also be used to manage other assets, such as smart phones, PDAs and handheld computers, kiosks, POS terminals, industrial controls. Device management solutions that support network standards; leading operating systems such Microsoft Windows Mobile, Microsoft Windows and Embedded CE; and multiple smart phone and device platforms provide value by enabling the organization to leverage its investment in management capabilities across multiple assets. The value of leveraging will increase, as organizations have to manage increasingly large and diverse populations of embedded, mobile and wireless devices. To further leverage legacy investments, the management solution for embedded devices should support and integrate with enterprise management solutions that may already be in place, such as Microsoft Configuration Manager 2007. Administrators do not want a separate management solution for each different type of device they need to support, so they should plan for the future by specifying management solutions that can support a heterogeneous environment.

Embedded devices are all around us, their capabilities are growing exponentially, and the installed base is projected to grow into tens of billions. The possibilities are exciting, but organizations need to be careful to ensure that as their population of embedded devices grows, they have the ability to manage them. Vending machines, kiosks, industrial controllers, and other embedded systems don't look like laptops or PDAs, but the principles and best practices for managing IT assets need to be applied to them. Wherever devices are embedded, remote management capabilities should be embedded with them so systems can be maintained reliably, efficiently, and securely.

More Stories By Mark Gentile

Mark Gentile is founder, president and CEO of Odyssey Software Inc, a pioneer in the mobile enterprise software market. He has led the design, development, and implementation of mobile enterprise solutions for many Fortune 500 companies across North America. Odyssey Software is the creator of Athena, the industry's premier enterprise-class mobile and embedded device management product for today’s most popular device platforms including the Windows Embedded CE operating system.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
Security is one the more prominent of the application service categories, likely due to its high profile impact. After all, if security fails, we all hear about it. The entire Internet. Forever. So when one conducts a survey on the state of application delivery (which is implemented using application services) you kinda have to include security. Which of course, we did.
One of the most frequently requested Rancher features, load balancers are used to distribute traffic between docker containers. Now Rancher users can configure, update and scale up an integrated load balancing service to meet their application needs, using either Rancher's UI or API. To implement our load balancing functionality we decided to use HAproxy, which is deployed as a contianer, and managed by the Rancher orchestration functionality. With Rancher's Load Balancing capability, users ...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
The concept and subsequent adoption of 'Containerization'' is growing at a rapid speed with the support of almost every other major player in the industry. This concept is much more efficient than the Virtualization which has been a major option for Infrastructure optimization in the past decade. The following factors distinguish a Container from a Virtual Machine. Containers contain Only the Application Specific libraries and binaries. They do not include a guest operating system. Rather ...
Chef and Canonical announced a partnership to integrate and distribute Chef with Ubuntu. Canonical is integrating the Chef automation platform with Canonical's Machine-As-A-Service (MAAS), enabling users to automate the provisioning, configuration and deployment of bare metal compute resources in the data center. Canonical is packaging Chef 12 server in upcoming distributions of its Ubuntu open source operating system and will provide commercial support for Chef within its user base.
In 2015, 4.9 billion connected "things" will be in use. By 2020, Gartner forecasts this amount to be 25 billion, a 410 percent increase in just five years. How will businesses handle this rapid growth of data? Hadoop will continue to improve its technology to meet business demands, by enabling businesses to access/analyze data in real time, when and where they need it. Cloudera's Chief Technologist, Eli Collins, will discuss how Big Data is keeping up with today's data demands and how in t...
Choosing between BIG-IP and LineRate isn't as difficult as it seems.... Our recent announcement of the availability of LineRate Point raised the same question over and over: isn't this just a software-version of BIG-IP? How do I know when to choose LineRate Point instead of BIG-IP VE (Virtual Edition)? Aren't they the same?? No, no they aren't. LineRate Point (and really Line Rate Precision, too) is more akin to an app proxy while BIG-IP VE remains, of course, an ADC (Application Delivery ...
SYS-CON Media announced today that @ThingsExpo Blog launched with 7,788 original stories. @ThingsExpo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @ThingsExpo Blog can be bookmarked. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.
No, not the head-banging, gritty, heavy metal Metallica song (though that's certainly awesome too.. excuse me for a moment while I turn it up to 11) but the Puppet as in automation kind of master. The importance placed on APIs - which are key to automation - in our State of Application Delivery 2015 survey was high, with 40% of respondents saying it was important to them that their infrastructure be API-enabled. Automation using those APIs is generally being accomplished through a variety of m...
So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, ...
SYS-CON Events announced today that Vicom Computer Services, Inc., a provider of technology and service solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. They are located at booth #427. Vicom Computer Services, Inc. is a progressive leader in the technology industry for over 30 years. Headquartered in the NY Metropolitan area. Vicom provides products and services based on today’s requirements...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at 16th Cloud Expo, Haseeb Budhani, CEO and Co-founder of Soha, will share five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the frict...
Modern Systems announced completion of a successful project with its new Rapid Program Modernization (eavRPMa"c) software. The eavRPMa"c technology architecturally transforms legacy applications, enabling faster feature development and reducing time-to-market for critical software updates. Working with Modern Systems, the University of California at Santa Barbara (UCSB) leveraged eavRPMa"c to transform its Student Information System from Software AG's Natural syntax to a modern application lev...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
As we recently previewed (read more about our London PoP in Jesse's post), Blue Box is opening a new Data Center in London, but hadn't announced the provider. Today we're excited to partner with TelecityGroup, whom we've selected as our data center partner in London. We chose their Powergate location, which is one of the U.K.'s most advanced, flexible and energy efficient carrier-neutral data centres. Why does that matter to you? Well, when customers choose Blue Box, they're trusting us with ...

As a company making software for Continuous Delivery and Devops at scale, at XebiaLabs we’re pretty much always in discussions with users about the benefits and challenges of new development styles, application architectures, and runtime platforms. Unsurprisingly, many of these discussions right now focus on microservices on the application side and containers and related frameworks […]

The post Apr. 26, 2015 10:00 AM EDT  Reads: 1,134

Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
A few weeks ago, SmartBear hosted API Craft Boston with the folks from Akana, Ian Goldsmith and Laura Heritage, to talk about microservices. It was an extremely informative presentation of where microservices came from, what it solves, and considerations around how it might fit into an organizational API strategy. It’s one thing to read everyone else’s opinions on blogs, twitter, etc. It’s great to go to workshops and conferences, but this was so intelligently presented (and for a meetup too)...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? Join this panel of experts as they peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you’ll have no problem filling in your buzzword bingo cards.
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...