Whitepapershttp://realtimelogic.comTutorials related to the Barracuda Application ServerTue, 06 May 2014 13:51:00 GMTTue, 06 May 2014 13:51:00 GMTWhitepapersFuguHub240Real Time LogicWhitepapershttp://realtimelogic.com/images/lsp.gifhttp://realtimelogic.com<![CDATA[How to act as a Certificate Authority (the Easy Way)]]>http://realtimelogic.com/blog/2014/05/How-to-act-as-a-Certificate-Authority-the-Easy-Way

Certificate Management Tool

Are you concerned with recurring digital certificates fees or are you looking for a simple way to mass produce certificates for your embedded or IoT devices? This tutorial explains how to easily setup your own certificate authority by using a free tool we have developed!

The free certificate utility is an indispensable tool for administrators and a must-have for anyone that uses SSL Certificates f]]>WhitepapersTue, 06 May 2014 13:51:00 GMT<![CDATA[The scalability problem with using HTTPS for M2M]]>http://realtimelogic.com/blog/2013/12/The-scalability-problem-with-using-HTTPS-for-M2M

(The scalability problem with using REST for IoT)


In the grand scale of Internet of Things (IoT) and Machine-to-Machine (M2M) communication, it is tempting to use HTTP and specifically HTTPS as a communication protocol between devices and servers. The most prominent reasons for choosing to use the HTTPS protocol are:

  • It is common to use web/application servers for the backend IoT infrastructure and such servers are designed to speak ]]>WhitepapersWed, 11 Dec 2013 12:44:00 GMT<![CDATA[Certificate Management for Embedded Systems]]>http://realtimelogic.com/blog/2013/10/Certificate-Management-for-Embedded-Systems(A Gentle Introduction to Asymmetric Encryption and SSL Certificates)

    An important feature in digital certificates is the use of asymmetric algorithms to ensure key establishment. In order to understand certificates, we need to understand the fundamentals of asymmetric key establishment.

    Introduction to asymmetric algorithms

    Asymmetric key algorithms use two different keys at once -- a combination of a private key and a public key. The private key is known only to y]]>WhitepapersThu, 24 Oct 2013 21:38:57 GMT<![CDATA[What is an Embedded Application Server?]]>http://realtimelogic.com/blog/2012/09/What-is-an-Embedded-Application-ServerEmbedded Web Servers vs. Application Servers: What's the Difference?
    (A Primer for Embedded Developers)

    Embedded systems, such as devices, have traditionally been isolated, self-contained systems; at most, they might have communicated with other systems within a limited range on a local network. This is no longer the case: embedded systems - especially small, very deeply-embedded devices - increasingly use the Internet as a way to communicat]]>WhitepapersTue, 11 Sep 2012 20:18:17 GMT<![CDATA[Lua Fast-Tracks Embedded Web Application Development]]>http://realtimelogic.com/blog/2012/08/Lua-FastTracks-Embedded-Web-Application-DevelopmentIntroducing Lua

    Lua is a powerful, fast, lightweight, and embeddable scripting language. Lua combines simple procedural syntax with powerful data description constructs based on associative arrays and extensible semantics. Lua is dynamically typed, runs by compiling the script to bytecode for a register-based virtual machine, and has automatic memory management with incremental garbage collection.

    Although not specifically designed for use in]]>WhitepapersFri, 10 Aug 2012 12:00:00 GMT