If you are an embedded programmer and have found many of the online IoT tutorials too abstract or providing too little practical value, then the following set of tutorials may be just for you. The following hands on articles include source code and working examples.
Real Time Logic's expertise is in (remote) device management and our IoT articles mainly focus on how to control and supervise devices/equipment in the field via cloud services. For example, a light bulb that switches on by using a Smartphone app fits into this category.
Have you considered which IoT service provider to use? Many developers may initially consider big providers such as Amazon and Azure. These providers are great if you plan on scaling to the millions, but in most cases, these providers are overkill. In addition, these providers tend to be very expensive to use. You may not have thought about setting up your own IoT solution on say a Virtual Private Server (VPS) or you may have thought that it is too complicated and difficult to maintain your own IoT cloud solution. In fact, setting up a cost effective IoT solution is very easy as long as you are OK with learning a few Linux commands. See the article Setting Up a Low Cost IoT Solution if you are interested in exploring this option. You may also set up an IoT learning environment on your own computer as an initial test.
IoT and Embedded Web Server technologies both have their plusses and minuses. Reaping the benefits of both solutions and eliminating the negatives is possible. The article Device Management via IoT or Embedded Web Server explains how this is possible.
At some point, you may have to scale the IoT solution or provide redundancy. A super simple and extremely cost effective way to scale an IoT solution is to use an IoT protocol that supports scaling by using round robin DNS. We provide an online IoT cluster demo including tutorials on how to set this up.
Security is super important in IoT solutions and all of the above tutorials incorporate the use of TLS. However, TLS is far from sufficient when it comes to securing a complete IoT solution. The DZone article Have We Forgotten the Ancient Lessons About Building Defense Systems goes into the IoT security in detail. Did you know that it is shockingly easy to intercept local network data?
IoT devices typically operate as network clients. Check out how we rapidly design an RTOS powered IoT client in the following video by using an onboard web server for the development of the IoT client. The web server is used for powering an onboard Lua IDE. The IDE and the web server are used for the initial development and are later disabled in the final product, where only the IoT network client is needed.