Escolar Documentos
Profissional Documentos
Cultura Documentos
Internet of Things in
Everything: Know
Your Rights
IoT is taking over: Are you ready?
E-guide
In this e-guide
In this e-guide:
Know your 'IoT rights' -- or
Gartner predicts that by 2020, IoT technology will be in 95% of
deploy IoT the hard way p.2 electronics for new product designs. What does the shift
toward IoT in everything mean for enterprises?
A year in the life of IoT: From
security instigator to business Simply put, it means new opportunities and challenges are on
enabler p.6 the horizon.
Three examples of IoT in the This guide explores the IoT business opportunities for digital
enterprise p.9
transformation and digs into the new networking and security
challenges you will need to tackle.
Five steps to enterprise digital
transformation p.16
Uncover:
• And more
Page 1 of 20
E-guide
In this e-guide
Know your 'IoT rights' -- or deploy IoT the
Know your 'IoT rights' -- or hard way
deploy IoT the hard way p.2
Don Reeves, CTO - Silver Spring Networks
A year in the life of IoT: From
For all the promises of IoT, there are just as many unknowns.
security instigator to business
enabler p.6
The IoT marketplace is exceedingly complex, has many moving parts, sees a
massive influx of new devices being connected annually and has seen many
Three examples of IoT in the organizations propose new “standards” or “platforms.” The industrial IoT
enterprise p.9
segment is evolving, and maturity is well beyond the horizon. And no single
vision of a desirable future is sure to emerge.
Five steps to enterprise digital
transformation p.16 This is a market where the certainties are few.
Page 2 of 20
E-guide
Know your 'IoT rights' -- or And, let’s face it: It’s hard to know in advance every potential application you,
deploy IoT the hard way p.2 as a customer, can build on your network. Not only do you have to face the
current challenge, but you also don’t want to limit your capabilities before
A year in the life of IoT: From you’ve even started by selecting a future-constrained network technology.
security instigator to business
enabler p.6 But, even with the inevitable uncertainty that comes with all emerging
technologies, one thing is certain: You can know your IoT rights. Those
rights do not have to be enacted, ratified or even codified. They’re yours
Three examples of IoT in the
enterprise p.9 simply by asking for them. So, let me propose “10 IoT rights” for your
consideration. And let me say that these rights can become part of a stated
covenant – and contractual obligations – between you and your network
Five steps to enterprise digital
transformation p.16 provider of choice.
Page 3 of 20
E-guide
Page 4 of 20
E-guide
9. The right to massive scalability. The largest IoT networks will look
In this e-guide small a decade from now. But making a large network larger is less of
a challenge than managing that network and deriving maximum value
Know your 'IoT rights' -- or
from it. Ask and expect your provider to guarantee massive scalability
deploy IoT the hard way p.2
of its network.
10. The right for your network to live long (and without failure). The
best IoT devices are built to last 15 years (including the battery).
A year in the life of IoT: From However, IoT networks can live far longer than that if they have the
security instigator to business flexibility to adapt and offer now capabilities as technologies evolve.
enabler p.6 Look for an end-to-end network designed to be future-proof.
Three examples of IoT in the As for choosing a network architecture for industrial IoT, here’s my
enterprise p.9 recommendation: If you, as a customer, are weighing the merits of Wi-SUN,
LoRaWAN and NB-IoT in determining your IoT network architecture of
Five steps to enterprise digital choice, make these 10 IoT rights your guidepost.
transformation p.16
Page 5 of 20
E-guide
In this e-guide
A year in the life of IoT: From security
Know your 'IoT rights' -- or instigator to business enabler
deploy IoT the hard way p.2
Geoff Webb, Vice President of Strategy - Micro Focus
A year in the life of IoT: From
Rewind to roughly a year ago when the Mirai malware and associated botnet
security instigator to business
burst onto the scene with the largest distributed denial-of-service attack
enabler p.6
ever seen, hammering service providers and websites alike. It was one of
those wake-up calls we all like to write about – a chill breeze that presaged
Three examples of IoT in the
the coming of an IoT winter. (Yes, that’s a Game of Thrones reference. I think
enterprise p.9
it’s a fair analogy given the circumstances and the nature of the threat.)
Five steps to enterprise digital And like most wake-up calls, we promptly hit the snooze button and went
transformation p.16 back to thinking about other priorities. Well, kind of. Over the last year, there
has at least been some initial movement in making IoT a little more secure
About IoT Agenda p.20 but we clearly have a long way to go. Thankfully there hasn’t been an IoT
Armageddon in the year since Mirai, which is actually a pleasant surprise.
But the internet of things has continued to develop in both predictable and
surprising ways.
First, it’s still growing. Gartner estimated that there are around 8 billion
devices in action this year, a growth of over 30% from 2016. However many
there are, the amount of traffic these devices is generating is massive. While
Page 6 of 20
E-guide
IoT devices may not yet dominate the net in terms of bandwidth (there’s a
In this e-guide LOT of video streaming out there), the total traffic is growing so fast we’re
having to get used to new terms just to measure the size.
Know your 'IoT rights' -- or
deploy IoT the hard way p.2 At the same time, IoT itself is becoming more integrated into other emerging
trends. Whether it’s digital twinning, feeding the voracious data appetite of
A year in the life of IoT: From AI/machine learning development or simply accelerating the event-driven
security instigator to business agenda of digital transformation, IoT has faded as a central element of
enabler p.6 conversation. Now, IoT is discussed in terms of its supporting role in new
productions. We’ve stopping talking about IoT as though it’s an emergent
Three examples of IoT in the trend in its own right, and are starting to see it more and more as a crucial
enterprise p.9 element in other trends.
While some may view this as a reflection that the whole IoT thing was really
Five steps to enterprise digital
transformation p.16 overhyped to begin with, I believe the opposite is true. The downplaying of
IoT in these conversations is not a result of its diminishing importance, but
rather the result of the foundational impact IoT is having. In much the same
About IoT Agenda p.20
way as we no longer ponder how businesses will react to the advent of the
internet itself, so the conversation has already moved past a discussion of
IoT as such, and is now reorienting around the impact that IoT is having on
other aspects of information technology.
Simply put, in a year’s time, IoT has become so foundational to the digital
transformation of business that we assume its presence and must now
begin to plan for the effect it will have on other emerging trends. The need
Page 7 of 20
E-guide
A year in the life of IoT: From A year after IoT became the test bed for the largest distributed denial-of-
security instigator to business service attack ever, we are already beginning to experience the first wave of
enabler p.6 impact of this transformative trend. IoT isn’t just changing how we think
about security or service delivery or the value of products, it’s starting to
Three examples of IoT in the change the capabilities of information technology. And it’s barely even
enterprise p.9 begun to arrive yet. A year from now? Who knows.
Page 8 of 20
E-guide
In this e-guide
Three examples of IoT in the enterprise
Know your 'IoT rights' -- or
Josh Garrett, President and Co-Founder – MOBI
deploy IoT the hard way p.2
Enterprises can gain a host of benefits by integrating internet of things
A year in the life of IoT: From devices into their current IT infrastructure. However, the true value and
security instigator to business impact of IoT is discovered once devices capture, analyze and act on data.
enabler p.6
Below are three industries that can still experience digital transformation
Three examples of IoT in the and greatly benefit from implementing IoT technology. Additionally, we’ll look
enterprise p.9 at how companies can use existing technology – such as a mobility
management platform (MMP) – to centralize IoT endpoint management.
Five steps to enterprise digital
transformation p.16
IoT in the enterprise: Healthcare
About IoT Agenda p.20
Healthcare is adopting IoT technology faster than almost any other industry.
Innovators in healthcare were quick to recognize the potential available to
patients when IoT technologies were first integrated with medical devices:
greatly improved quality and effectiveness of service that’s especially
valuable for the elderly, patients battling chronic conditions and individuals
requiring constant supervision.
Page 9 of 20
E-guide
Wearable devices can also provide a sense of security for the family
About IoT Agenda p.20
members of those with Alzheimer’s or autism who might be prone to
wandering away from safety. If a patient’s wearables are enabled with GPS,
family members can be alerted when they cross preset GPS parameters –
like exiting a home in the middle of the night – and the coordinates of their
devices can be used to locate them quickly and ensure their safety.
Page 10 of 20
E-guide
Page 11 of 20
E-guide
The data aggregated from IoT devices during the manufacturing process –
Three examples of IoT in the
enterprise p.9 including product data, customer sentiment and other third-party syndicated
data – can be used to monitor and enhance product and process quality.
Five steps to enterprise digital
One of the most important functions for an MMP monitoring IoT devices in
transformation p.16
manufacturing is to ensure that all IoT devices remain up and running to
prevent downtime. If an IoT device does go down, someone at the plant or
About IoT Agenda p.20
facility will be notified right away and the IT team or MMP provider’s help
desk must troubleshoot and initiate device replacement workflows
immediately to restore productivity. A trusted MMP partner understands that
downtime is unacceptable and helps identify predictive device failure
behaviors to take preventative measures and maintain productivity.
Page 12 of 20
E-guide
In this e-guide
IoT in the enterprise: Retail
Know your 'IoT rights' -- or The benefits of IoT for retail pay off most when it comes to the optimization
deploy IoT the hard way p.2 of processes, logistics and the customer experience. According to a study
conducted by Oracle, retailers that use RFID tags can expect 99% inventory
A year in the life of IoT: From accuracy, a 50% reduction in out-of-stocks, a 70% reduction in shrinkage
security instigator to business and sales lifts in the 2-7% range.
enabler p.6
As more and more customers opt to buy items online or pick them up from a
Three examples of IoT in the store, RFID tags help keep inventories in check, ensuring items remain in
enterprise p.9 stock and available for customers both online and in stores.
Increased sales are likely to result from digital marketing efforts that can be
targeted at each individual consumer. Interactive displays will be triggered to
feature a specific item of apparel when a hanger is lifted from a display rail.
Virtual closets will enable shoppers to browse and virtually try on
merchandise related to what they are wearing or what may be available in
other store locations.
Page 13 of 20
E-guide
For retail, the value of managing IoT devices with an MMP comes in
A year in the life of IoT: From
security instigator to business
establishing workflows that enable the data collected by IoT devices to
enabler p.6 trigger workflow tasks, such as “change screen to show item #123” or “lead
customer to bedding department.” Data is great, but only if it can be utilized
to impact the bottom line. Look for an MMP vendor with not only experience
Three examples of IoT in the
enterprise p.9 in the retail space, but specifically with experience in tailoring customer
experiences through mobile devices. A vendor experienced with point-of-
sale integrations is also an ideal choice. MMP vendors should also have fluid,
Five steps to enterprise digital
transformation p.16 customizable workflow options that allow stores to tailor their customers’
experiences by location – what works in one region might not work in
another.
About IoT Agenda p.20
Page 14 of 20
E-guide
Managing IoT and mobility devices share many common needs. Procuring,
In this e-guide provisioning, deploying and managing an IoT device is very similar to a tablet
or phone. It often makes sense for CIOs and mobility managers to turn to an
Know your 'IoT rights' -- or MMP for help implementing intricate and innovative IoT initiatives. All mobile
deploy IoT the hard way p.2
devices are a part of IoT, after all.
Page 15 of 20
E-guide
In this e-guide
Five steps to enterprise digital
Know your 'IoT rights' -- or transformation
deploy IoT the hard way p.2
Kevin Niblock, President and COO - Software AG
A year in the life of IoT: From
Business leaders acknowledge the important role technology plays in their
security instigator to business
growth strategies as customers and competition embrace the age of digital
enabler p.6
transformation. But they are not so clear on how to lay a solid software
foundation to enable this transformation. As devices and platforms become
Three examples of IoT in the
increasingly connected, companies must move towards the digital world by
enterprise p.9
acclimating their services, products and processes. Enterprises that can
create and execute on one unifying strategy will help their digital
Five steps to enterprise digital
transformation journey.
transformation p.16
Page 16 of 20
E-guide
Focus on data
A year in the life of IoT: From
security instigator to business Successful enterprises today are fueled by data, and it is important to
enabler p.6 include data analytics in the overall plan rather than creating a separate
strategy. To better understand how ready a digital strategy is and how it will
Three examples of IoT in the be achieved, enterprises should start by taking a look at their data discovery
enterprise p.9 journey. The further a business is down the road of discovering data,
including historical, real-time event data, non-transactional data and IoT, the
Five steps to enterprise digital more apparent it will become that the structure of the architecture is game
transformation p.16 changing.
Page 17 of 20
E-guide
Page 18 of 20
E-guide
Page 19 of 20
E-guide
In this e-guide
About IoT Agenda
Know your 'IoT rights' -- or
IoT Agenda covers all aspects of Internet of Things technology and strategy
deploy IoT the hard way p.2
as it relates to enterprise IT, including the technologies that enhance and
enable internal business processes, and the resulting IoT products
A year in the life of IoT: From themselves -- the "things" that the business produces.
security instigator to business
enabler p.6 Our coverage from award-winning editors and leading industry experts
readies businesses looking to deploy monitors in the field, embed sensors to
help them improve products, manage their inventories and supply chains,
Three examples of IoT in the
and distribute intelligence to improve their work environments and
enterprise p.9
production floors.
Five steps to enterprise digital This is new territory, and IT and business professionals need expert
transformation p.16
assistance to make the leap. IoT Agenda is the leading site focused on the
needs of enterprises grappling with IoT.
©2017 TechTarget. No part of this publication may be transmitted or reproduced in any form or by any means
without written permission from the publisher.
Page 20 of 20