Overview - Features - Full Stack
Since the key feature of Blinky-Lite is remote access, security is the driving force in the development of Blinky-Lite. To be secure, a control platform must be complete or full-stack. Most available control platforms are just communication protocols. This leaves the user with missing functionality which often leads to a patchwork system, riddled with potential security vulnerabilities.
In contrast, Blinky-Lite strives to deliver a complete system. Not only does Blinky-Lite provide a set of device interfaces, a communication protocol, and configuration databases, it also provides
- an alarm system,
- notification system,
- device viewers,
- and plotting packages.
The data archiving system also includes access and setting history. User authentication interfaces include one-time-password, two factor authentication. And, instead of name-value pairs, device data is object-oriented which lends to complex data types, such as vectors and images. There is even an integrated logbook application, with hooks into the notification system.
Blinky-Lite Alarm Scanner
Blinky-Lite Notification Application
Blinky-Lite Device Viewer
Blinky-Lite Time Plotter
Blinky-Lite Archive Plotter
Blinky-Lite Access Log
Blinky-Lite Settings Log
Blinky-Lite Two Factor Authentication
Examples of vector and image data in Blinky-Lite
Blinky-Lite Logbook Application