Welcome to the INNOKREA blog!

Your source of knowledge about technologies

The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world

Internet of Things (IoT) – Part 4: CoAP protocol

Internet of Things (IoT) – Part 4: CoAP protocol

Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.

Information

INNOKREA recognized as a Top Development Company in 2024 by Techreviewer.co

INNOKREA recognized as a Top Development Company in 2024 by Techreviewer.co

We are delighted to have been recognized as one of the top software development companies in 2024.

Information

Internet Of Things (IoT) – Part 3

Internet Of Things (IoT) – Part 3

IOT - available technologies, software packages and what are the differences between the protocols specific to IOT?

Information

Internet Of Things (IoT) – Part 2

Internet Of Things (IoT) – Part 2

Technical aspects of the operation of Internet of Things (IOT) devices, protocol stacks and challenges that engineers have to face.

Information

Internet Of Things (IoT) – part 1

Internet Of Things (IoT) – part 1

IOT - how rapidly the number of devices on the Internet is growing and how the number of sensors we use directly or indirectly is increasing.

Information

Machine Learning – Part 3: Data Representation Methods

Machine Learning – Part 3: Data Representation Methods

Several widely used data representation methods - how to effectively transfer data to the data processing algorithm.

Information

Machine Learning – Part 2: Different Approaches

Machine Learning – Part 2: Different Approaches

About the approaches used in this field, their advantages and disadvantages, as well as possible applications of some algorithms.

Information

Machine Learning – Part 1: Is It Worth It?

Machine Learning – Part 1: Is It Worth It?

Machine learning is a field that is developing at an incredible pace and is penetrating virtually all sectors of the economy.

Information

Cryptography – stream ciphers

Cryptography – stream ciphers

Low-level operation of encryption algorithms - what are LSFR registers and where stream ciphers are used.

Security

Cryptography – good password and good practices

Cryptography – good password and good practices

About storing, saving and password policy.

Security

Cryptography – hash functions, hashes and passwords (part 2)

Cryptography – hash functions, hashes and passwords (part 2)

Passwords and their security on the Internet.

Security

Cryptography – hash functions and passwords (part 1)

Cryptography – hash functions and passwords (part 1)

Cryptography - discover the secrets of hash functions, hashes and passwords.

Security

Cryptography – randomness in cybersecurity

Cryptography – randomness in cybersecurity

What is randomness, how to properly estimate it, and how important is it in the field of cryptography.

Security

Cryptography – basic concepts and definitions

Cryptography – basic concepts and definitions

Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series

Security

Authentication, Second Factor, and Session Hijacking

Authentication, Second Factor, and Session Hijacking

What is authentication, what is the second factor and what options do we have to confirm the user's identity

Security