12SYSTEM MONITORING

Image

Monitoring often comes with a negative connotation because it suggests that data is collected for surveillance by something or somebody. However, many digital business models like predictive maintenance wouldn’t work without monitoring and subsequent data analytics. In the same way, the continuous protection of devices requires data logging and analysis to detect and trace back malicious activities.

The creation of extensive logfiles in IT systems has been common for decades. However, when it comes to embedded systems, logs might not receive the attention they deserve. In the past, low storage capacities and missing internet ...

Get Engineering Secure Devices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.