Blog
Recent Posts
Azure Sphere IoT Development Kit Comes With A Set Of Visual Studio Tools
Posted by
onThe Azure Sphere MT3620 Development Kit is specially designed for rapid prototyping and help to gain experience with the Azure Sphere technology. The MT3620 is the first Azure Sphere certified MCU. Azure Sphere certified MCUs are a new class of secured, connected crossover microcontrollers.
The MT3620 features three user-accessible microcontroller cores, one application processor subsystem based on an ARM Cortex-A7 core which runs at up to 500MHz, two general purpose ARM Cortex-M4F I/O subsystems, each of which runs at up to 200MHz.
The MT3620 were designed to bolster real-time requirements when interfacing with a diversity of on-chip peripherals including UART, I2C, SPI, I2S, and ADC. It has built-in security subsystem with its dedicated CM4F core for secure boot and secure system operation, dual-band 802.11a/b/g/n Wi-Fi.
Features
- Azure Sphere: End-to-end security for IoT devices.
- Dual-band 802.11 a/b/g/n with antenna diversity.
- Tri-core microcontroller with on-chip RAM & flash.
- Microsoft Visual Studio development environment.
- Online authentication & updates for device lifetime.
- Expand UART, I2C, I2S, SPI, ADC, GPIO resource on pin header.
Take a practitioner's approach in analyzing the Internet of Things (IoT) devices and the security issues challenging an IoT architecture.
You’ll review the architecture's central components, from hardware communication interfaces, such as UART and SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces.
You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufacturers need to take the necessary steps to secure devices and protect them from attackers.
The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices increase securely.