
Ever wondered what's actually happening when your IoT device fails a TLS handshake with cryptic errors? We captured real TLS packets from an STM32 board and dissected them in Wireshark to reveal the hidden cipher suite and certificate constraints that cause these failures, and discovered why even valid ECDSA certificates can be rejected.

These days, most applications need access to external infrastructure, such as a database or another application's API, to perform meaningful tasks. Applications that run without such dependencies are an exception rather than a norm. Yet, there is no widely accepted consensus on how such applications should be tested, and most literature and online resources on the topic of software testing are focused on other aspects.

Email deliverability can be challenging, particularly when dealing with the Google phishing quarantine. In this article, we will explore our approach to addressing this issue by modifying our verification email template. Initially, we will discuss the rationale behind selecting shared IP addresses over dedicated ones. We will also present concrete modifications that have significantly enhanced our email delivery efficiency, a critical factor for Spotflow's free trial and user registration processes.

The goal of exemplars is to provide additional context to metrics. The idea is to pair the time series with a few raw measurements that contain extra information, such as which span was active at the time of the measurement. Thanks to that, when you see a peak in your request duration plot, you can quickly jump into the trace associated with the lengthy request.

Facing delays in email verification delivery can lead to a significant loss of potential customers. In this article, we will share our journey of troubleshooting these delays and evaluating the performance of well-known email service providers like SendGrid, Postmark, and Resend. Discover how our email deliverability improved as we transitioned to a new provider.

The security of IoT devices is complex and has many facets. While there are various types of IoT devices available, there are some fundamental security aspects that every IoT solution designer should bear in mind. To learn more about IoT device security, check out our concise guide.

Spotflow engineers with a 4+ year teaching record at leading Czech universities continue to impart their expertise in cloud architecture, data-intensive systems, observability, and IoT to computer science and software engineering students.

Observability solutions are notoriously expensive when managing large-scale operations, particularly in IoT environments where telemetry data comes from thousands of devices. In this article, we will explore strategies for scaling an observability stack to maintain high performance and detailed insights while minimizing costs.

Due to the unpredictable environments in which IoT devices frequently operate, it's essential to monitor them closely. Learn how to ensure seamless operation through effective monitoring and observability practices. Discover the key aspects of your IoT devices that require monitoring and the appropriate instruments for this purpose.