Today, the majority of computing power is on smartphones not computers. The point to note here is that they’re all connected, not by an ethernet card, but by a SIM card. This industry shift is already accelerating because of the myriad of devices connected through the Internet of Things (IoT).
Injustice - Developers Among Us (SciFiDevCon 2024)
Guide to the Impact of IoT in Connected World
1.
A
Guided
Tour
to
the
Internet
of
Things
in
the
SIM
Connected
World
By
Tom
Howells,
Fraud
&
Technology
Wire
Oct
30,
2015
Everywhere
we
look
we
are
constantly
reminded
that
we
are
living
in
an
increasingly
connected
world.
In
2014
over
1.5
billion
smartphone
and
tablets
shipped
versus
308
million
portable
PCs
and
desktop
PCs.
Ericsson’s
June
2015
Mobility
Report
indicates
that
there
are
over
2.6
billion
smartphone
subscriptions
worldwide,
a
figure
that
will
double
by
2020
as
smartphone
penetration
rises
in
the
developing
world
(smartphone
penetration
has
largely
leveled
out
in
markets
like
the
US,
Europe
and
China).
We
are
getting
to
the
point
where
the
majority
of
computing
power
in
the
world
is
on
smartphones
not
computers.
The
common
denominator
here
is
that
they’re
all
connected,
not
by
an
ethernet
card,
but
by
a
SIM
card.
This
industry
shift
is
only
going
to
accelerate
with
the
myriad
of
devices
connected
through
the
Internet
of
Things
(IoT)
This
“guided
tour”
series
of
posts
will
focus
on
the
Internet
of
Things
as
a
series
of
sensors
connected
to
computer
systems
performing
analytics
and
machine
learning.
The
key
distinction
here
is
sensors
are
automatically
feeding
machine
data
into
analytics
and
machine
learning
engines
as
opposed
to
human
entered
data
via
a
touchscreen
or
mouse.
The
IoT
industry
is
estimated
to
have
an
astonishing
maximum
potential
of
$3.9
to
$11
trillion
dollars.
This
guided
tour
will
look
at:
• The
industries
that
IoT
will
impact
the
most
• The
geographies
that
IoT
will
impact
the
most
2. • Will
IoT
impact
B2B
or
B2C
the
most
• The
economic
impact
• The
critical
technological
requirements
to
guide
the
impact
to
$11
not
$3.9
trillion
dollars
A
recent
McKinsey
report,
“The
Internet
of
Things:
Mapping
the
Value
Beyond
the
Hype”
found
that:
• Less
than
1%
of
the
data
collected
is
fully
exploited
• Interoperability
between
IoT
systems
is
required
to
capture
40%
of
potential
value
The
guided
tour
of
IoT
will
analyze,
in
a
series
of
posts:
• The
Connected
Human/Self
• The
Connected
Home
• The
Connected
City
• The
Connected
Car
• The
Connected
Retailer
• The
Connected
Office
• The
Connected
Factory
• The
Connected
Worksite
• The
Connected
Utility
• The
Connected
Outside
The
importance
of
this
shift
is
important
not
only
to
these
areas
but
also
to
carriers.
Fierce
Wireless
reported
that
in
Q3
2015,
“nearly
two-‐thirds
of
AT&T’s
wireless
customer
growth
in
the
quarter
came
from
connected
devices,
including
connected
cars.
While
AT&T
has
emphasized
that
is
where
its
business
is
going
as
it
provides
cellular
connectivity
for
wearables,
cars
and
devices
inside
in
smart
homes,
such
devices
typically
come
with
lower
average
revenue
per
user
than
smartphones.”
In
July,
British
telco
Vodafone,
the
second
largest
telecommunications
company
in
the
world,
released
its
third
annual
M2M
Barometer
report,
which
offers
a
qualitative
and
quantitative
glimpse
into
how
businesses
are
adopting
Machine-‐to-‐Machine
(M2M)
technology.
At
a
high
level,
the
report’s
researchers,
analyzing
data
from
16
countries
and
650
business
executives
across
seven
industries,
found
that
businesses
are
increasingly
adopting
and
prioritizing
M2M
(compared
to
the
previous
reports
from
2013
and
2014),
and
that
M2M
is
not
only
driving
new
business
and
operating
models,
but
is
also
significantly
augmenting
and
improving
business
processes
through
a
number
of
means,
including
by
helping
businesses
to
add
actionable
real-‐time
analytics
to
their
data,
to
expand
their
reach
to
new
countries
and
regions
and
to
connect
with
customers
more
effectively,
among
other
benefits.
In
fact,
83%
of
M2M
adopters
agreed
that
they
had
gained
a
competitive
business
advantage
from
M2M
and
59%
said
they
had
seen
significant
ROI,
mostly
within
the
first
12
months
of
adoption.
This
new
world
is
also
a
new
playground
for
new
attacks.
We
are
in
a
land
of
opportunity
both
for
the
vendor
and
the
cyber
fraudster.
Many
people
will
have
read
about
the
hacked
Jeep
in
wired
magazine.
The
problem
is
the
old
way
of
protecting
computer
systems
behind
a
firewall
and
analyzing
signatures
or
log
files
doesn’t
work
in
the
IoT
world.
There’s
no
firewall
on
your
ioT
device.
Big
data
applications
using
machine
learning
against
a
data
lake
of
IoT
packets
will
go
hand-‐in-‐hand
with
the
hardware
sensors
of
IoT.
Stay
tuned
for
future
articles.
Tom
Howells
is
a
contributing
writer
for
Fraud
&
Technology
Wire
(www.fraudtechwire.com),
a
weekly
publication
sponsored
by
Argyle
Data,
Inc.