mPrest & Netafim: Smarter Irrigation with AWS IoT Core

In this episode of This Is My Architecture - https://amzn.to/2Ayo9af, mPrest shows how they helped Netafim build a multi-tenant SaaS solution for irrigation systems that uses AWS IoT Core and other AWS services. We'll explore how they leverage the LoRA and MQTT protocols along with on-site hardware units to handle intermittent connectivity and offline data collection. We'll also see how they use AWS IoT Core, S3 and Kinesis to capture and store data, plus other services such as Amazon Redshift to provide analytics.

Spotlight

Optiv Inc

Created in 2015 from the merger of Accuvant and FishNet Security, Optiv is the largest holistic pure-play cyber security solutions provider in North America. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology.

OTHER VIDEOS

How To Enable IMEI lock on Your Soracom IoT SIM

video | July 12, 2023

How to set IMEI lock on your SIM in the User Console...

Watch Now

How To Change The Speed Class of Your IoT SIM in the Soracom User Console

video | July 12, 2023

Walk through of the ways to change speed class in the user console...

Watch Now

How to secure Your Soracom IoT SIM with CHAP authentication

video | July 12, 2023

walk through of setting up CHAP auth on the Soracom User Console...

Watch Now

How To Update Your SIM Status in the Soracom User Console

video | July 12, 2023

How to change status of SIMs in the Soracom User Console...

Watch Now

Spotlight

Optiv Inc

Created in 2015 from the merger of Accuvant and FishNet Security, Optiv is the largest holistic pure-play cyber security solutions provider in North America. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology.

Events