SlideShare a Scribd company logo
| |March 2015
1CIOReview
CIOREVIEW.COM
CIOReviewMaRCh 10 - 2015
T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s
WIRElEss tEChnOlOgy spECIal
Brian Day
CEO
Rock-Solid
Mobile App
Management
Platform
Apperian:
In My Opinion:
Hank Kafka,
VP-Access
Architecture &
Devices, AT&T
| |March 2015
45CIOReview
CXO Insight
“
In the next century,
Planet Earth will don
an electronic skin. It
will use the Internet
as a scaffold to
supportandtransmititssensations.
This skin is already being stitched
together. It consists of millions of
embedded electronic measuring
devices: thermostats, pressure
gauges, pollution detectors, cameras,
microphones, glucose sensors, EKGs,
electroencephalographs.
These will probe
and monitor
cities and
endangered
species, the
atmosphere,
our ships,
highways
and fleets
of trucks, our conversations, our bodies–even our dreams.”
-Neil Gross
Much-discussed and often-reported in 2014, the ‘Internet
of Things’ (IoT) reached the peak of Gartner Group’s ‘Hype
Cycle for Emerging Technologies’ and appears poised to
begin wide scale market adoption in 2015 and beyond. IDC
forecasted that the market for IoT would reach $7 trillion
by 2020, and estimates in this range were repeated by other
professional prognosticators. By the end of the year, many
companies had managed to fit (if nothing else) an IoT strategy
element into their press releases and annual statements.
The term IoT is itself a bit of a marketing label; in reality
it’s a combination of things: Big Data, Cyberphysical Systems,
Machine-to-Machine Computing, and Ubiquitous/Pervasive
Computing. These nuances didn’t stop IoT from being top of
the fold for anyone covering the 2015 Consumer Electronics
Show. No less than a dozen companies showcased their IoT-
savvy-ness with ‘IoT Pavilions’ and ‘Homes of the Future’,
showcasing everything from Internet-aware washing machines
to sensor-laden bicycles. Everywhere I looked, robots roamed,
coffee pots tweeted successful completion of their savory task,
and cars texted and were texted to. Presuming that standards
can be ratified and interfaces aligned, the dividing line between
our physical lives and digital presence will get a lot thinner and
in some cases disappear altogether.
While it might seem like the Internet of Things is new
and radical, it’s rooted in a set of ideas set forth in 1999 at
MIT by Kevin Ashton. Technology needed over a decade to
By David Witkowski, Founder & Principal Consultant, Oku Solutions
& President, Wireless Communications Alliance
David Witkowski
Enterprise IT
and the
“Internet
of Things”
| |March 2015
46CIOReview
catch up with his vision; it’s been the convergence of low-power
wireless standards like Bluetooth Low Energy, the availability
of efficient and inexpensive processing power (courtesy of
the seemingly relentless march of Moore’s Law), and sensor
technologies borrowed from mobile phones that
have combined to set the stage for IoT’s
emergence as a multi-trillion dollar market
opportunity.
Emergence of the Internet of Things is
following the patterns we saw in previous
technology evolutions. IoT is really just the
“Fourth Wave” of connected computing. In
the First Wave we had mainframe computers,
accessed by terminals and later connected by
early ancestors of the Internet. The Second Wave
gave us personal computers, initially standalone
then connected to servers by modems and
ultimately broadband links. Early mobile devices
(such as the PalmPilot) connected to PCs, and were
later unfettered from their cable leashes by mobile
data networks and evolved to become smartphones.
Today our IoT devices are connected to PCs or smartphones
via Bluetooth or proprietary standards – if I walk away from
my Android phone my Pebble watch will quickly let me know
something is amiss. It’s just a matter of time before the minions
of IoT throw off their smartphone shackles and begin seeking
connections directly to mobile data networks.
$7 trillion worth of IoT is a lot of devices, mostly consumer-
owned. By their nature IoT devices tend to be something that
people keep nearby at all times. Take off my FitBit to recharge
it and I risk falling short on the daily step competition I have
going with my wife and friends. So what happens when people
show up wearing or carrying several IoT devices, all of which are
clamoring for connectivity and access to the Internet?
There’s some precedent for this already, as we saw in recent
years when corporate IT shifted away from company-owned
mobile devices and began implementing Bring Your Own
Device (BYOD) systems and policies. Most of these systems
are controlled and secured by opt-in forms that require
company-provided credentials, or at least an email
and a click-signature acknowledgement of terms
of service. The use model of these systems
range from mostly reasonable to annoyingly
complex, and I can say that in my travels around
the Silicon Valley I never encounter a guest or
public broadband opt-in system that’s exactly like
another – each one is a unique work of security
artistry. Entering sign-in credentials for them on
a PC is fairly easy, on a tablet a challenge, on
a smartphone an exercise in frustration. Some
systems text you a code, others don’t. I’ll say
this; I don’t see myself tapping in network sign-in
credentials via the up-down-enter buttons on my
Pebble watch. If enterprise IT is going to support
IoT onboarding, we need a different approach.
An evolution of the use model set forth by the IEEE 802.11u
standard and Wi-Fi Certified Passpoint (formerly called Hotspot
2.0) may be the solution. Created by the Wi-Fi Alliance in 2012,
Wi-Fi CertifiedPasspoint™ was intended to be “an industry-wide
solution to streamline network access in hotspots and eliminate
the need for users to find and authenticate a network each time
they connect.” Rather than ask a person to sign-in to different
networks, devices enabled with Wi-Fi Certified Passpoint can be
verified from a database containing trusted devices. The same
use model could be applied to IoT devices, allowing enterprise IT
systems to bring customer’s or employee’s IoT devices onboard
without requiring action by the user.
Of course, the question of security in IoT needs to be
addressed. As of today, very little has been done to consider
the security risks created by IoT devices. For the most part IoT
devices are innocuous – they perform simple sensing or alerting
functions and exchange information between devices or between
a device and a user. In some cases (such as cyberphysical
systems) IoT devices can initiate real-world actions such as
moving a lever or knob. Most IoT systems have (at least in their
designed function) little potential to create danger for people or
systems. Do I really care if someone hacks my FitBit and learns
that I walked 11,818 steps yesterday? Probably not.Yet there
could be vulnerabilities we haven’t yet found, and these need to
be considered.
As the Internet of Things revolution takes hold and our IoT
devices become more and more integrated into our daily lives,
enterprise IT will have to determine how to respond. Corporate
IT, hospitality IT, public, and semi-public hotspots will all have
to content with this – it’s not a matter of if, but when this will
need to be addressed.
IoT devices are innocuous
they perform simple
sensing or alerting
functions and exchange
information between
devices or between a
device and a user

More Related Content

What's hot

How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
Geert van der Cruijsen
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
Claire Rowland
 
Applying design thinking to IoT
Applying design thinking to IoTApplying design thinking to IoT
Applying design thinking to IoT
Eli Otniel Garcia
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
Dr. Mazlan Abbas
 
inside IOT BCX 2015v3
inside IOT BCX 2015v3inside IOT BCX 2015v3
inside IOT BCX 2015v3Andy Brauer
 
IoT Startup State of The Union
IoT Startup State of The Union  IoT Startup State of The Union
IoT Startup State of The Union
Wing Venture Capital
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
Davor Dokonal
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Kim Escherich
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
baddi youssef
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
Kirti Khanna
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
Ajith Kumar Ravi
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
Nagarro
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
ardiri
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
TechXpla
 
Implementing IOT - A Road Map
Implementing IOT - A Road MapImplementing IOT - A Road Map
Implementing IOT - A Road Map
Bryan K. O'Rourke
 
CMMC - IoT
CMMC - IoTCMMC - IoT
CMMC - IoT
Nat Weerawan
 
Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Is there such a thing as the internet of things !
Is there such a thing as the internet of things !
Pierre Metivier
 
trendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGStrendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGS
TrendWatching
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
Rustomjee Business School
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
Dr. Mazlan Abbas
 

What's hot (20)

How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Applying design thinking to IoT
Applying design thinking to IoTApplying design thinking to IoT
Applying design thinking to IoT
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
inside IOT BCX 2015v3
inside IOT BCX 2015v3inside IOT BCX 2015v3
inside IOT BCX 2015v3
 
IoT Startup State of The Union
IoT Startup State of The Union  IoT Startup State of The Union
IoT Startup State of The Union
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
Implementing IOT - A Road Map
Implementing IOT - A Road MapImplementing IOT - A Road Map
Implementing IOT - A Road Map
 
CMMC - IoT
CMMC - IoTCMMC - IoT
CMMC - IoT
 
Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Is there such a thing as the internet of things !
Is there such a thing as the internet of things !
 
trendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGStrendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGS
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
 

Similar to Enterprise IT and the Internet of Things

What Is Internet of Things?
What Is Internet of Things?What Is Internet of Things?
What Is Internet of Things?
CDN Mobile Solutions
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
ssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
Janasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
SourajitMaity1
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam25
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
Deva Johnson
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
Souma Maiti
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
Social Friendly
 
MTBiz November 2014
MTBiz November 2014MTBiz November 2014
MTBiz November 2014
Mutual Trust Bank Ltd.
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
COEPD HR
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICS
CCN
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
Michelle Singh
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Anil
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
Abaram Network Solutions
 
A Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixA Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - Apptunix
Apptunix
 
Internet of things
Internet of thingsInternet of things
Internet of things
Komal Agarwal
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 

Similar to Enterprise IT and the Internet of Things (20)

What Is Internet of Things?
What Is Internet of Things?What Is Internet of Things?
What Is Internet of Things?
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
 
MTBiz November 2014
MTBiz November 2014MTBiz November 2014
MTBiz November 2014
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICS
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
A Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixA Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - Apptunix
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

Enterprise IT and the Internet of Things

  • 1. | |March 2015 1CIOReview CIOREVIEW.COM CIOReviewMaRCh 10 - 2015 T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s WIRElEss tEChnOlOgy spECIal Brian Day CEO Rock-Solid Mobile App Management Platform Apperian: In My Opinion: Hank Kafka, VP-Access Architecture & Devices, AT&T | |March 2015 45CIOReview CXO Insight “ In the next century, Planet Earth will don an electronic skin. It will use the Internet as a scaffold to supportandtransmititssensations. This skin is already being stitched together. It consists of millions of embedded electronic measuring devices: thermostats, pressure gauges, pollution detectors, cameras, microphones, glucose sensors, EKGs, electroencephalographs. These will probe and monitor cities and endangered species, the atmosphere, our ships, highways and fleets of trucks, our conversations, our bodies–even our dreams.” -Neil Gross Much-discussed and often-reported in 2014, the ‘Internet of Things’ (IoT) reached the peak of Gartner Group’s ‘Hype Cycle for Emerging Technologies’ and appears poised to begin wide scale market adoption in 2015 and beyond. IDC forecasted that the market for IoT would reach $7 trillion by 2020, and estimates in this range were repeated by other professional prognosticators. By the end of the year, many companies had managed to fit (if nothing else) an IoT strategy element into their press releases and annual statements. The term IoT is itself a bit of a marketing label; in reality it’s a combination of things: Big Data, Cyberphysical Systems, Machine-to-Machine Computing, and Ubiquitous/Pervasive Computing. These nuances didn’t stop IoT from being top of the fold for anyone covering the 2015 Consumer Electronics Show. No less than a dozen companies showcased their IoT- savvy-ness with ‘IoT Pavilions’ and ‘Homes of the Future’, showcasing everything from Internet-aware washing machines to sensor-laden bicycles. Everywhere I looked, robots roamed, coffee pots tweeted successful completion of their savory task, and cars texted and were texted to. Presuming that standards can be ratified and interfaces aligned, the dividing line between our physical lives and digital presence will get a lot thinner and in some cases disappear altogether. While it might seem like the Internet of Things is new and radical, it’s rooted in a set of ideas set forth in 1999 at MIT by Kevin Ashton. Technology needed over a decade to By David Witkowski, Founder & Principal Consultant, Oku Solutions & President, Wireless Communications Alliance David Witkowski Enterprise IT and the “Internet of Things” | |March 2015 46CIOReview catch up with his vision; it’s been the convergence of low-power wireless standards like Bluetooth Low Energy, the availability of efficient and inexpensive processing power (courtesy of the seemingly relentless march of Moore’s Law), and sensor technologies borrowed from mobile phones that have combined to set the stage for IoT’s emergence as a multi-trillion dollar market opportunity. Emergence of the Internet of Things is following the patterns we saw in previous technology evolutions. IoT is really just the “Fourth Wave” of connected computing. In the First Wave we had mainframe computers, accessed by terminals and later connected by early ancestors of the Internet. The Second Wave gave us personal computers, initially standalone then connected to servers by modems and ultimately broadband links. Early mobile devices (such as the PalmPilot) connected to PCs, and were later unfettered from their cable leashes by mobile data networks and evolved to become smartphones. Today our IoT devices are connected to PCs or smartphones via Bluetooth or proprietary standards – if I walk away from my Android phone my Pebble watch will quickly let me know something is amiss. It’s just a matter of time before the minions of IoT throw off their smartphone shackles and begin seeking connections directly to mobile data networks. $7 trillion worth of IoT is a lot of devices, mostly consumer- owned. By their nature IoT devices tend to be something that people keep nearby at all times. Take off my FitBit to recharge it and I risk falling short on the daily step competition I have going with my wife and friends. So what happens when people show up wearing or carrying several IoT devices, all of which are clamoring for connectivity and access to the Internet? There’s some precedent for this already, as we saw in recent years when corporate IT shifted away from company-owned mobile devices and began implementing Bring Your Own Device (BYOD) systems and policies. Most of these systems are controlled and secured by opt-in forms that require company-provided credentials, or at least an email and a click-signature acknowledgement of terms of service. The use model of these systems range from mostly reasonable to annoyingly complex, and I can say that in my travels around the Silicon Valley I never encounter a guest or public broadband opt-in system that’s exactly like another – each one is a unique work of security artistry. Entering sign-in credentials for them on a PC is fairly easy, on a tablet a challenge, on a smartphone an exercise in frustration. Some systems text you a code, others don’t. I’ll say this; I don’t see myself tapping in network sign-in credentials via the up-down-enter buttons on my Pebble watch. If enterprise IT is going to support IoT onboarding, we need a different approach. An evolution of the use model set forth by the IEEE 802.11u standard and Wi-Fi Certified Passpoint (formerly called Hotspot 2.0) may be the solution. Created by the Wi-Fi Alliance in 2012, Wi-Fi CertifiedPasspoint™ was intended to be “an industry-wide solution to streamline network access in hotspots and eliminate the need for users to find and authenticate a network each time they connect.” Rather than ask a person to sign-in to different networks, devices enabled with Wi-Fi Certified Passpoint can be verified from a database containing trusted devices. The same use model could be applied to IoT devices, allowing enterprise IT systems to bring customer’s or employee’s IoT devices onboard without requiring action by the user. Of course, the question of security in IoT needs to be addressed. As of today, very little has been done to consider the security risks created by IoT devices. For the most part IoT devices are innocuous – they perform simple sensing or alerting functions and exchange information between devices or between a device and a user. In some cases (such as cyberphysical systems) IoT devices can initiate real-world actions such as moving a lever or knob. Most IoT systems have (at least in their designed function) little potential to create danger for people or systems. Do I really care if someone hacks my FitBit and learns that I walked 11,818 steps yesterday? Probably not.Yet there could be vulnerabilities we haven’t yet found, and these need to be considered. As the Internet of Things revolution takes hold and our IoT devices become more and more integrated into our daily lives, enterprise IT will have to determine how to respond. Corporate IT, hospitality IT, public, and semi-public hotspots will all have to content with this – it’s not a matter of if, but when this will need to be addressed. IoT devices are innocuous they perform simple sensing or alerting functions and exchange information between devices or between a device and a user