Build the future of communications.
Start Building for Free

IoT posts

  • By Tobias Goebel
    What is Open Charge Point Protocol (OCPP)? OCPP Blog Header

    Climate-conscious spending trends and the soaring costs of gasoline mean consumers are increasingly turning to electric vehicles (EV) for their transportation needs. With more EV drivers on the roads, more EV charging stations are being installed all around the world. This has created an interesting new landscape in which EV charging stations, networks, and software interact with one another and, of course, with the EV drivers themselves.

    These various devices and programs need to communicate seamlessly, which is where Open Charge Point Protocol (OCPP) comes in to create a truly streamlined charging experience.

    How does OCPP Work?

    OCPP is the open-source language used by charging stations and network management systems to communicate with one another, no matter how different they may be. The OCPP communication protocol was written and published by the Open Charge Alliance (OCA), based in the Netherlands, to promote open standards for EV charging networks globally.

    Essentially, …

    Read More
  • By Twilio
    Introducing the First Truly Customizable Physical Asset Tracking Device: Twilio Programmable Asset Tracker Programmable Asset Tracker

    Shippers, haulers, and owners of valuable assets use Internet-connected asset tracking technology to improve operational efficiency, optimize the supply chain, and reduce losses, damage, or theft. On top of that, their customers benefit from a better experience, as the location and condition of goods can now be followed conveniently around the world.

    Current asset tracking solutions miss the mark

    The cost of the technology behind these devices has been declining, but today’s solutions all lack a critical capability. At the surface the various available devices on the market seem similar: they all contain a battery, connectivity (a cellular modem and perhaps a Wi-Fi or Bluetooth Low Energy radio), some sensors such as accelerometers, and an embedded processor. The differentiation lies in the software, and that’s where things quickly fall short.

    Read More
  • By Jonathan Williams
    Twilio Microvisor in Public Beta – Unbrickable Firmware OTA and Secure Remote Debugging at Scale, Available Now Microvisor Public Beta Announcement

    When it comes to building IoT products, especially in the industrial sector, there are several key items that need to be taken into consideration:

    1. Reliable connectivity
      How do I make sure my devices remain connected and accessible from the cloud?
    2. Trustworthy security
      How do I make sure my devices don’t get compromised ever, on hardware or at application level?
    3. Predictability of cost
      How do I make sure the cost for keeping things running and secure for 10+ years won’t destroy my business case?

    Now, solving these problems is something that we at Twilio know what it takes to do – as we have already been doing so for over 10 years with the Electric Imp Platform as a Service that Twilio acquired in 2019.

    All the platform learnings, customer needs, and our experience from being responsible for millions of production devices resulted in a brand new approach to enabling …

    Read More
  • By Terrence Barr
    3 Takeaways from the 2022 IoT Tech Expo in Amsterdam IoT Tech Expo Amsterdam Hero

    Twilio participated in the IoT Tech Expo in Amsterdam last week under the motto “connecting hardware and humans”. Being co-located with other events (AI & Big Data, Cyber Security, Blockchain, Edge Computing, and Digital Transformation) the IoT Expo was well attended – with a diverse audience across multiple industries – which drove many people to our booth and presentation. It was good to be back at a show again after 2+ years of pandemic absence! In case you weren’t able to attend the show live, here are my top 3 takeaways from Twilio’s presence at the show.

    My learnings from IoT Tech Expo Europe

    1) IoT builders don’t need “just another SIM card.” They need a more complete technology stack that enables them to securely connect and update IoT devices, and communicate the significance of their data.

    One thing I heard over and over again at this event was that …

    Read More
  • By Jonathan Williams
    Secure Remote Debugging for IoT Connected Devices Secure Remote Debugging

    Interested in an STM32U585 Microvisor Dev Board? Sign up now to apply for receiving a free board to explore Twilio Microvisor!

    One of the challenges confronted by embedded device developers is what happens when something goes wrong with an IoT device – meaning you can no longer connect to it. Bad news if this happens to a single device in the field, but commercially disastrous if the same issue affects even a small proportion of your fleet of IoT devices.

    Imagine that a software bug escapes your otherwise comprehensive device test plan resulting in an interruption to the connectivity of 10% of your deployed devices; even in this case the cost of recovery would be huge.

    Issues like this do unfortunately happen, and while you know that software bugs occur, and no doubt can be fixed, the risk-impact of issues like this is significant.

    Separating the connectivity stack from …

    Read More
  • By Vijay Devarapalli
    VPN connectivity for your IoT devices VPN - Social Banner

    I am excited to announce that Super SIM now has VPN (Virtual Private Network) support, enabling you to set up secure private networks between Twilio and your application data centers and have your Super SIM connected devices use these private networks. With regular Internet breakout, the traffic from devices using Super SIM will go over the Internet and get routed to your application data center. When VPN is used, the same traffic is sent over a secure and private tunnel as shown below:

    IoT devices connected via Super SIM VPN
    IoT devices connected via Super SIM VPN

    The benefits of using VPN for IoT devices

    With a VPN that tunnels your device connectivity, you get the following benefits:

    • Secure channel - A secure data channel is created between Twilio and your data center. All traffic to/from the devices going through this data channel is encrypted and does not go over the public Internet unprotected.
    • Private end-to-end network …
    Read More
  • By Linda Le
    Build an IoT Doggy Alarm so Your Furry Friend Can Tell You They Want To Go Outside IoT Doggy Alarm Header

    Sometimes dogs like to mistake furniture for a toilet. Out of fear for my new shoe cupboards, I decided to make a doorbell for my dog, Bobby, to push to alert me when he needed to go outside. It took a little while (and cost me a lot of treat-based incentives) to get him to push it, but soon enough, Bobby would stand by the door... and wait until I could see him to push the button. This got me wondering: could I build something where I would be notified when he stands close to the door?

    In this guide, I will show you how to build a sensor capable of detecting your fluffy friend’s proximity to your door then send you a text message alert, using an Arduino and Twilio’s Programmable SMS.

    Workflow

    It’s that time of day. Your dog wants to go outside and stands by the …

    Read More
  • By Jonathan Williams
    Overcoming IoT security threats from the start IoT Security

    Here’s the sobering reality: across the Internet of Things (IoT), security has been overlooked. An amazing 1.51 billion IoT devices were breached in the first six months of 2021, an increase from 639 million in the same time period in 2020. With the anticipated number of connected devices worldwide predicted to reach ~29 billion by 2030, there is still a lot that needs to be done to ensure that these devices are protected from attacks.

    IoT security is hard to predict

    Consumers and device builders are increasingly aware of the importance of device security, but it can be challenging to know which devices are secure by design and which just haven’t been targeted yet. And for many device builders, security is an afterthought as they prioritize the features of the product or service itself when working towards a minimum viable product. Equally, security can sometimes be …

    Read More
  • By Tobias Goebel
    What are IoT Devices? What is an IoT Device

    The IoT, or Internet of Things, is one of the most promising areas of technology to help solve today’s real world problems of the physical world, be it related to our changing climate, public health, public safety, transportation, or even our convenience with living in a modern home. If you are new to IoT, you can read up our definition of What is IoT. Use cases are found in every major industry, from healthcare to agriculture to retail to government. We have put together a list of the top IoT use cases across industries for your perusal as well.

    In this article, we want to dive deeper into the devices, the “things”, that make up the Internet of Things.

    What is an IoT device?

    An IoT device is a special-purpose, Internet-connected electronic device that uses sensors – such as temperature, light, or accelerometers – to inform the user or …

    Read More
  • By Miko Bautista
    Shutting Down Rogue IoT SIMs Fast Shutting down Rogue SIMs Fast

    This is Part 2 of our series on Efficient SIM Management. Missed Part 1? Read up on it here: IoT Fleet Management: Simplify SIM Updates

    In the world of large-scale IoT deployments, it is critical to be able to quickly identify and shut down a single device that may have been compromised.

    Let’s imagine that you are a fleet operator working for an environmental research company. Your business manufactures hundreds of sensors and deploys these around the Mississippi River. Collectively, these sensors monitor the river level, informing a team of researchers whether the level is high or low. Every hour, your sensors wake up, record how high the river is, send this data to your cloud, and then go back to sleep to conserve battery power.

    One unfortunate day, a thief steals a SIM card located in one of your sensors. They have plugged this SIM card into their iPad …

    Read More
  • Newer
    Older
    Sign up and start building
    Not ready yet? Talk to an expert.