Internet of Things (IoT) – Part 4: CoAP protocol
Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.
The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world
Internet of Things (IoT) – Part 4: CoAP protocol
Discover an alternative to MQTT - the CoAP protocol in IoT. Similar to HTTP, efficient on limited resources, secure with DTLS.
Information
INNOKREA recognized as a Top Development Company in 2024 by Techreviewer.co
We are delighted to have been recognized as one of the top software development companies in 2024.
Information
Internet Of Things (IoT) – Part 3
IOT - available technologies, software packages and what are the differences between the protocols specific to IOT?
Information
Internet Of Things (IoT) – Part 2
Technical aspects of the operation of Internet of Things (IOT) devices, protocol stacks and challenges that engineers have to face.
Information
Internet Of Things (IoT) – part 1
IOT - how rapidly the number of devices on the Internet is growing and how the number of sensors we use directly or indirectly is increasing.
Information
Machine Learning – Part 3: Data Representation Methods
Several widely used data representation methods - how to effectively transfer data to the data processing algorithm.
AIInnovation
Machine Learning – Part 2: Different Approaches
About the approaches used in this field, their advantages and disadvantages, as well as possible applications of some algorithms.
AIInformation
Machine Learning – Part 1: Is It Worth It?
Machine learning is a field that is developing at an incredible pace and is penetrating virtually all sectors of the economy.
AIInformation
Low-level operation of encryption algorithms - what are LSFR registers and where stream ciphers are used.
Security
Cryptography – hash functions, hashes and passwords (part 2)
Passwords and their security on the Internet.
Security
Cryptography – hash functions and passwords (part 1)
Cryptography - discover the secrets of hash functions, hashes and passwords.
Security
Cryptography – randomness in cybersecurity
What is randomness, how to properly estimate it, and how important is it in the field of cryptography.
Security
Cryptography – basic concepts and definitions
Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series
Security
Authentication, Second Factor, and Session Hijacking
What is authentication, what is the second factor and what options do we have to confirm the user's identity
Security