Welcome to IoTForums.com Community
Register now to participate in discussions, ask questions and share your knowledge on internet of things and automation! Feel free to sign up today.
Register Now

Multiple OS project development experience share


Jun 1, 2020
Recently, I have just finished an application project development for an embedded system(an IoT project). The project is building CMD line(CLI) tools for multiple OS, Windows10, Linux, and macOS. I just want to share with you guys my experience with the 3 platforms. BTW, the RTL8722DM dev from the following link is what my project is used for.
Please, Log in or Register to view URLs content!

Basically, Windows is the most convenient platform. It has all kinds of tools for compiling c, CPP, and c# projects. One thing that needs to be considered. 1, if you use visual studio for c# in windows. the tool you have built is not easy to transfer into the other platforms. To support a visual studio c# project there a lot of works to do in Linux and macOS. Additionally, you have to set up the toolchain/compiler properly for windows.

Linux has no issue to compile my project. But lack of development tools and “sudo” sometimes give you big problems. For, c and CPP development, I suggest that Linux is the best and all project is able to transfer to the other platform.

macOS has the most limitations. I am a Windows person so using macOS to develop is a bit troublesome for me. And the disc name of macOS always has a “space” which is very bad for process command. However, I would say the project made by macOS is the most stable and small size one.

To summarize, if you trying to make a multiple platform/OS support project. I would recommend to use C/CPP project and start on Linux. Please try not to start with Windows, Windows is the easiest way, but will give you troubles when trying to support all 3 platforms/OS.
  • Like
Reactions: EduIoTize


Just Hatched
Jul 13, 2020
Please, Log in or Register to view URLs content!
we make modules that give wireless connectivity to an electronic device BLE/NFC/WiFi/LoRa. Furthermore using our software
Please, Log in or Register to view URLs content!
you can generate mobile applications by simply taking the variables from the .elf file. Our software also manages the interactions between target device/ our component/ mobile applications and targeted cloud platform


Just Hatched
Sep 30, 2020
The scale of cyber threat has been growing exponentially ever since a few years, and this year just rounded it up by a large percentage due to the extremely fast-paced digitalization that took place due to social distancing and people in isolation, unable to visit stores, marketplaces or even their workplace. This phenomenon left businesses with the only option to go online if they wanted to continue not only their work but the expected end result of the entire business process i.e. sales.

This allowed more cybercriminals to work their way through businesses and steal important data especially in case of financial or medical data stored somewhere, but the threat is the same for the majority of companies. Network security, cyber security, information security, application security and data security are a few main types of cyber protection that companies these days require.

In Q3 of 2019 alone, 5,183 breaches were reported with 7.9 billion records exposed, that was up 112% from mid year 2018. This tells you the extent that data information security needs to reach in order to keep confidential information out of the hands of unauthorized people, that could use it for many illegal and harmful measures for the corporation and the general public.

In the midst of this crisis, IT companies that take the lead in UAE such as Alpha Data, can help you keep your system safe from breaches and unauthorized activity. They deal with information security management, coming on top of the best network security companies in the MENA region. They have the industry experience and expert knowledge on many companies and markets, including knowledge and resources that can help you achieve a holistic cyber security measure for your company without much hassle.

Log in

or Log in using