editor's blog
Subscribe Now

Icon Labs Remaps from Servers to Edge Nodes

We’ve discussed Icon Labs’ Floodgate offering before – even in the context of the Internet of Things (IoT). So when they subsequently announced a Floodgate Security Manager for the IoT, I had to wonder how that was different from the Floodgate stuff they already had. A quick conversation with Icon Labs’ Alan Grau helped clarify the sitch.

The Floodgate suite we talked about before, even in the context of the IoT, is a full-up IT-oriented package running on servers. So in an IoT context, it would be a Cloud package. Specifically, it’s not running on a resource-constrained device.

FSM_Caption_LR_cr.jpgThe new Floodgate Security Manager, by contrast, is intended to be run on miserly IoT edge nodes. That means a few changes from their prior suite. First, the obvious: resources. And there are a number of things on a server – anti-virus management, Windows update management, and such – that don’t apply to an edge node. So those server-oriented functions were pared away.

The other major difference is the protocol support. Servers tend to speak in heavy, feature-rich protocols like AMQP. Edge nodes, on the other hand, use simpler protocols like MQTT and CoAP. The new Floodgate offering has been adapted to those protocols. Not only does this align better with how edge nodes communicate, but it also supports the constrained resource since, by definition and intent, these lightweight protocols require fewer resources to implement (at the expense of many features that an AMQP would have).

You can find out more in their announcement

 

(Image courtesy Icon Labs)

 

Leave a Reply

featured blogs
May 27, 2020
Could life evolve on ice worlds, ocean worlds, ocean worlds covered in ice, halo worlds that are tidally locked with their sun, and rogue worlds without a sun? If so, what sort of life might it be?...
May 26, 2020
I get pleasure from good quality things. Quality is a vague term, but, to me, it is some combination of good design for usability, functionality and aesthetics, along with reliability and durability. Some of these factors can be assessed very quickly; others take time. For ex...
May 26, 2020
#robotcombat #combatrobots #robotwars #WeWantSeason5 #WeGotSeason5 These are some of the most popular hashtags used by a growing number of global BattleBots enthusiasts. Teams from all backgrounds design, build and test robots of all sizes for one purpose in mind: Robot Comba...
May 22, 2020
[From the last episode: We looked at the complexities of cache in a multicore processor.] OK, time for a breather and for some review. We'€™ve taken quite the tour of computing, both in an IoT device (or even a laptop) and in the cloud. Here are some basic things we looked ...

Featured Video

DesignWare 112G Ethernet PHY IP JTOL & ITOL Performance

Sponsored by Synopsys

This video shows the Synopsys 112G Ethernet PHY IP in TSMC’s N7 process passing the jitter and interference tolerance test at the IEEE-specified bit error rate (BER). The IP with leading power, performance, and area is available in a range of FinFET processes for high-performance computing SoCs.

Click here for more information

Featured Paper

Choose the Ideal Bluetooth Protocol for Your Design

Sponsored by Maxim Integrated

Most people do not understand the difference between Bluetooth Low Energy and Bluetooth Basic Rate/Enhanced Data Rate. The emergence of Bluetooth 5 has further confused the landscape. This application note explains the differences and suggests ways to determine the best version for your design.

Click here to download the whitepaper