IoT Development Studio

Enterprise platform for devices, apps and teams

platform capabilities

IoT Development Made Simple

Create and manage multiple compact IoT ecosystems called swarms. A swarm is the basic, fully autonomous hub for IoT device management. This is where you connect, monitor and control IoT devices. Within your device swarm, you install IoT apps on individual devices or device groups.

IoT App Development
and Deployment

Develop IoT applications right on the device. Get instant live feedback. Deploy code on devices or groups instantly and securely.

  •  Live device coding in a cloud IDE
  • Deploy and run OTA updates
  •  Any programming language

Connect and Manage from Anywhere

Continue to read out IoT data and get value from existing machines. No need to exchange legacy equipment or controllers.

  • Open API, open standards, open data
  • Hardware-agnostic: add any device
  • Configure, monitor & control

Bring Your Experts Together

Create an environment where the specialists in your organization—from IoT engineer to data scientist—work together on joint projects worldwide.

  • Multi-tenancy for quicker outcomes
  • Seamless workflows
  • Easy-to-use UI for non-tech staff
bringing experts together

IoT Applications

Get Started with Applications from the IoT App Store

IoT development studio opcf logo

OPC UA Client

Run OPC operations on an OPC UA server with this app.

Go to app →

gps reader

Display the GPS location of your device on a map.

Go to app →

AWS S3 Sender

Observe a folder and send files to your S3 bucket.

Go to app →

Modbus tcp client

Simulate a Modbus Client with this app.

Go to app →

Is your company new to IoT? We can help you kick off. 

Sign up for a free account – no payment info needed – or contact us to discuss your case.


Full Protection for All Assets

User authentication

The authentication of users takes place via password and token-supported procedures. After authentication, user access authorization is controlled by a two-stage process. A gatekeeper intercepts all unauthorized requests even before they reach the backend. A detailed authorization check is performed based on the individually assigned rights.

Individual certificates

Certificates are issued individually for each IoT device. The certificates are used to connect to the IoT platform and encrypt the data traffic.
Previously authenticated users assign a secret key to each connected IoT device, which identifies the IoT device to the platform and controls the access.

No open ports

The IoT devices on the platform have no open ports and cannot be accessed from the outside. The connection with the IoT platform can only be initiated by the IoT device.

Regular data backups

The IoT studio stores the state of the devices, login data, and all other relevant data. This data is secured by creating regular backups. An online backup system for the database continuously pushes backup data to an S3 bucket.

Data protection

We differentiate between four forms of data: user data, device data, code data, and data accumulated from devices for analytics. All these forms of data are protected against unauthorized access by highly granular authentication and authorization mechanisms.

Any questions around security?

Simply get in touch with us using one of our contact forms.


Find Out Which IoT Devices You Can Use

You have questions? We are here to help. 

IoT stands for the Internet of Things. Within our platform ecosystem, an IoT device is a Docker-capable device that runs on a Linux operating system. Popular examples include Raspberry Pi and modern Industrial PCs (IPC).

The IoT device is connected to the sensor to be read or the machine to be interacted with. This makes the sensor or machine available to the platform.

Any IoT device with a Linux operating system and Docker service can be used as an IoT device. Currently, the easiest way to get started with the IoT studio is to get a Raspberry Pi or developer kits such as NVIDIA Jetson. If you are planning to connect IoT devices and don’t know how, you can simply contact us.

Yes. The Raspberry Pi is a capable lab and R&D device, suitable for a vast range of application scenarios. Developing with Raspberry Pi is cost-effective, simple and flexible. There is a wide availability of suitable hardware interfaces and a large user community. Robust hardware configurations based on Raspberry Pi are now also available (e.g. Kunbus RevPi Core 3). Contact us for more information.

You can use Docker-capable Industrial PCs (e.g. Beckhoff CX9020, WAGO PFC100) and can connect to a wide range of interfaces using various adapters. For easy communication with your machines, libraries are available for most protocols and in many programming languages (e.g. Modbus, Profibus, CODESYS, PLC4X, C, C++, Python). Contact us to discuss the IoT devices that best suit your case.

To connect a device, the device needs to boot a Docker-enabled Linux system. For a secure and encrypted connection, the device requires an individual configuration including a device ID, secrets, certificates, and other information. 

To facilitate this process, we have developed the Record Evolution Reflasher: an open-source, cross-platform (linux, win32, darwin) desktop application to create bootable, configured flash drives ready to be used in IoT devices. To connect with the IoT studio, the Reflasher uses the custom .reswarm file extension including the full configuration for an IoT device.

You can also use the open-source Reflasher as an all-purpose flashing tool to prepare conventional bootable drives for an operating system on any kind of flash drive.

The platform allows you to develop software live on your IoT devices directly from the browser using your preferred programming languages and protocols. This way, you work with the machines and sensors in a hands-on configuration during development.

Connectivity is independent of the platform. The IoT devices can connect to the internet via wireless local area networks (e.g. WiFi), LoRa, mobile GSM connection or LAN cable. The IoT device ports can be opened and closed through the IoT platform. In this way, different network security scenarios can be implemented on the device. Corporate networks often have a similar shielded architecture.

The power supply of the IoT devices is independent of the platform and can range from power supply connection or battery to energy sources such as solar or wind.

Ready to get started?

Get in touch and let us know how we can support you.