Internet of Things (IoT) – Part 4: CoAP protocol
Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.
The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world
Internet of Things (IoT) – Part 4: CoAP protocol
Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.
Information
2024-01-25
INNOKREA recognized as a Top Development Company in 2024 by Techreviewer.co
We are delighted to have been recognized as one of the top software development companies in 2024.
Information
2024-01-24
Internet Of Things (IoT) – Part 3
IOT - available technologies, software packages and what are the differences between the protocols specific to IOT?
Information
2024-01-18
Internet Of Things (IoT) – Part 2
Technical aspects of the operation of Internet of Things (IOT) devices, protocol stacks and challenges that engineers have to face.
Information
2024-01-11
Internet Of Things (IoT) – part 1
IOT - how rapidly the number of devices on the Internet is growing and how the number of sensors we use directly or indirectly is increasing.
Information
2024-01-04
Machine Learning – Part 3: Data Representation Methods
Several widely used data representation methods - how to effectively transfer data to the data processing algorithm.
Information
2023-12-21
Machine Learning – Part 2: Different Approaches
About the approaches used in this field, their advantages and disadvantages, as well as possible applications of some algorithms.
Information
2023-12-14
Machine Learning – Part 1: Is It Worth It?
Machine learning is a field that is developing at an incredible pace and is penetrating virtually all sectors of the economy.
Information
2023-12-07
Low-level operation of encryption algorithms - what are LSFR registers and where stream ciphers are used.
Security
2023-11-30
Cryptography – good password and good practices
About storing, saving and password policy.
Security
2023-11-23
Cryptography – hash functions, hashes and passwords (part 2)
Passwords and their security on the Internet.
Security
2023-11-16
Cryptography – hash functions and passwords (part 1)
Cryptography - discover the secrets of hash functions, hashes and passwords.
Security
2023-11-09
Cryptography – randomness in cybersecurity
What is randomness, how to properly estimate it, and how important is it in the field of cryptography.
Security
2023-11-02
Cryptography – basic concepts and definitions
Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series
Security
2023-10-26
Authentication, Second Factor, and Session Hijacking
What is authentication, what is the second factor and what options do we have to confirm the user's identity
Security
2023-10-19