What we're about

Data security and Authenticity are major challenges when a number of data nodes and services increases. Protecting every IOT node is essential. Back-end technologies, web applications, storage, network services, certification management and vulnerability assessment in various code blocks helps entire ecosystem to work reliably.

This session provides an introduction on IOT back-end technologies, the role of spring boot, advantage of being full stack developer, an end to end security architecture, the role of the developer in building code with no vulnerabilities, compliance and key management.

Past events (1)

Photos (3)