/lm.png
IoT Advisor and Developer helping SMB companies create enterprise-grade solutions.
I connect Physical and Digital Assets to deliver Business Outcomes.
I provide AGREED VALUE in a DEFINED TIMEFRAME for the FIXED PRICE under CLEAR CONDITIONS.

IoT Provisioning Module

The initial connectivity of IoT devices to the AWS Cloud can be a major hurdle, impacting user experience and project success. Every device is unique, and ensuring secure, seamless onboarding for thousands of units presents significant manufacturing and operational challenges. I’ve seen my customers struggle with these issues for years. Finally, I decided to encode my experience and develop a device provisioning module that simplifies this process. It allows you to securely connect any device to your AWS account without requiring expertise in AWS or a large IT department.

There is no Technical Debt

There is no technical debt, only an investment opportunity in education or future business returns. The effort of fixing the consequences of bad decisions is part of the price you have to pay. The only loss happens when you fail to acknowledge the “debt” and choose to pretend it is not there. I designed and built numerous IoT systems, and I made countless mistakes in the process. The truth is that when you start creating something innovative, you have no clue if your design decisions are correct or not; there is no way to predict the long-term impact of the way you structure the early version of your system.

🚨 BREAKING CHANGES - Amazon Timestream availability change! 🚨

Amazon Timestream for LiveAnalytics will no longer be open to new customers starting June 20, 2025. That is very bad news for numerous AWS IoT deployments. I deployed Amazon Timestream for various customers using this time series database to store telemetry data. I liked Timestream because it was an AWS-managed service, so there was no need to worry about the scalability and availability of the underlying infrastructure. Unfortunately, AWS decided to disable this service for new customers.

A Customer who becomes your Friend is one of the most satisfying outcomes in business.

It all started typically - that person contacted me on LinkedIn asking for assistance in designing and building an IoT-powered product. We met, discussed the business idea, found a common ground, and agreed to start in a month. Time has passed, and I haven’t heard from that person. Ok, I thought, yet another lead that went south. I decided to give it one last try and sent an email asking for confirmation that the initial agreement was no longer valid.

Are there benefits to using hardware security tokens for AWS Account access?

I’ve got access to numerous AWS accounts and typically use my phone as the MFA (Multi-Factor Authentication) device. That is a handy, secure, and cost-effective solution. There is a specific case in which I do recommend using a hardware security token as the secondary MFA. I use it to protect access to the Root User of the AWS Management Account. Let’s break this down: ✅ The Root User has unlimited permissions, can create and destroy any AWS infrastructure, and manage other users in that account.

How can you leverage the potential of MQTT when designing your IoT solution?

Unlock IoT Flexibility: The Decoupled Power of MQTT MQTT enables the decoupling Publishers from Subscribers. This might sound technical, but it has implications for flexibility and scalability in IoT solutions. Let’s explore why this feature is one of MQTT’s greatest strengths. Your browser does not support the video tag. The Magic of Decoupling: Publishers & Subscribers in MQTT At its core, MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol ideal for constrained devices and low-bandwidth, high-latency, or unreliable networks – common scenarios in IoT.