CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Tool

M2MLabs Mainspring

M2MLabs

Reading Time: 4 mins read
in IoT, Software, Tool

 

M2MLabs Mainspring is an application framework for building machine-to-machine applications like vehicle tracking or machine remote monitoring. In such applications typically a remote device equipped with sensors (e.g. gps, temperature, pressure) and actors communicates with a server application that is running the device communication protocol, device configuration, storage of data sent by the devices as well as the application business logic and the presentation layer.

Mainspring takes care of device communication, configuration as well as data storage and retrieval so that application developers can focus on business logic purely. M2M applications can be prototyped in hours rather than weeks and finally transferred to a high performance execution environment built on top of a standard J2EE server and the highly scalable Apache Cassandra database.

It covers common functionalities required by M2M applications

  • flexible modeling of devices, their parts and their characteristics: devices represent a physical device and contains sensors and actors. Each sensor has a set of attributes which correspond to the data sent by the sensor, e.g. temperature sensor may send an indoor and an outdoor attribute. Data for each attribute is time stamped so that one value represents a measurement at a certain point in time.
  • device configuration: each device holds a set of key-value pairs representing the configuration of the device, e.g. sensor ranges or metadata such as units of measurement for a device
  • communication between device and application: devices send data according to a defined REST webservice, see the Api description. This is fine if the device is developed together with the application. If the device is not modifiable and sends data via arbitrary HTTP GET or POST messages an adaptation script in Groovy translates the message to the standard format.
  • validation and normalization of the data: reception of new data triggers the execution of Groovy scripts to perform boundary checking of data, interpolation or threshold supervision.
  • long term storage of data sent by devices: all measurements are stored as time series of values in a very compact format with minimum overhead. Meta information such as units of measurements are stored separately in the device and sensor models.
  • data retrieval functions for external applications using REST Api: give the business logic access to the data. Each access provides a set of values for a set of entities and a time interval.

The framework is written in Java and runs on a standard J2EE6 application servers like glassfish 3.1 and JBoss 6.0. Data storage is provided by the extremely scalable noSQL database from the Apache Cassandra project.

Samples in the Wiki show how to connect an Arduino board, a Raspberry PI, an Android phone or a Ubunto Core device.

 

Get Tool

Tags: AndroidApache CassandraArduinoCyber securityInternet of thingsIOTIOT ToolsM2M applicationsM2MLabsM2MLabs MainspringMachine-to-machine applicationsopen sourceRaspberry PISoftwareToolsUbunto
ADVERTISEMENT

Related Posts

Shodan – Tool

Mine – Tool

February 5, 2023
Shodan – Tool

Shodan – Tool

February 5, 2023
Lexar LJDF35-128BNL Jumpdrive Fingerprint

Lexar LJDF35-128BNL Jumpdrive Fingerprint

January 24, 2023
YubiKey Bio Series – FIDO Edition

YubiKey Bio Series – FIDO Edition

January 24, 2023

More Articles

Document

Threat Landscape for Ransomware Attacks

October 8, 2022

SAP security advisory (AV22-572)

October 11, 2022
Alerts

HPE security advisory (AV22-311)

June 9, 2022
Alerts

Mitsubishi Electric security advisory

May 10, 2022

Transforming Risk into Confidence

April 11, 2022
Alerts

Intel security advisory (AV23-015)

January 10, 2023
Quotes

“Once you have broken in and compromised…”

July 8, 2022
Alerts

F5 security advisory (AV22-154)

March 29, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.