2. “Internet of Things”
“(IoT) refers to idea to connect the physical to
the digital via embedded technology. To
receive data from all kind of smart objects and
have them communicate and interact with one
another in order to simplify and facilitate
human life, improve business processes, reduce
costs and risks and raise efficiency.“
6. Enabling Technologies
RFID
To identify
and track the
data of things.
Sensors
To collect and
process the
data to detect
the changes in
the physical
status of
things.
Smart Tech
To enhance the
power of the
network by
devolving
processing
capabilities to
different part of
the network.
Nano Tech
To make the
smaller and
smaller things
have the
ability to
connect and
interact.
Enabling Technologies
8. When entering the doors, scanners
will identify the tags on clothing.
When shopping in the market, the
goods will introduce themselves
(iBeacon).
When moving the goods, the reader
will tell the staff to put a new one.
When paying for the goods, the
microchip of the credit card will
communicate with checkout reader.
9. Across Industries
Industry /
Application area
Case description Products / services / benefits offered Technology needed
Manufacturing IoT-adapted manufacturing
processes
Customization of products during the
production process.
Situation-aware smart
machines and robots
Health Health related products and
services
Medical expertise Sensors, IoT communication
infrastructure
Health guidance service Monitoring of key parameters; analyzes by
medical experts.
Sensors
Home Home owner’s digital service Monitor and manage facilities. Plug-and-play devices,
installation package,
open and user-friendly
applications
Saving energy Measuring temperature, and thus decreasing
energy consumption
Sensors
Traffic Traffic data marketplace Real-time traffic, environment, weather, road
condition, incident, etc. related data
Databank, sensors
Shopping Electronic shopping assistant Key information about a product which a
customer points to in a shop, for example
price per unit, production/expiration date,
ingredients, calories, country of origin, etc.
Electronic shopping
assistant device, RFID
Food Food security tracking system Tracing of food products from original
material providers to consumers
Sensors, RFID
Real Estate Real-time waste monitoring Reducing the costs of waste collection. Sensors
14. Points of Engagement Evolution
TIME
Single Channel Multi-Channel Cross-Channel Omni-Channel
15. Development Teams Channels
Most companies approach this complexity tactically
Tablets
Mobile
Desktop
Kiosk
NEW
App
X 1.0
NEW
App
X 1.0
NEW
App
X 1.0
NEW
App
X 1.0
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
Security
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
synchronization
Features
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
New OS upgrades
Security Patches
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
New OS upgrades
New UIs
Compatability
Multiple
Codebases
Same
Features
Multiple
Channels
+
+
=
Time & $$
16. Development Teams Channels
The multi-channel approach reduces the complexity
Tablets
Mobile
Desktop
Kiosk
NEW
App
X 1.0
NEW
App
X 1.0
NEW
App
X 1.0
NEW
App
X 1.0
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
Security
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
synchronization
Features
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
New OS upgrades
Security Patches
Scanner stdIn = new Scanner(System.in double speed; // User
entered valuedouble tailGatingDistance; // user entered
valudouble stoppingDistance;System.out.print("Enter your speed
(mph): ");speed = stdIn.nextDouble();
System.out.print("Enter your tailgate distance:
");tailGatingDistance = stdIn.nextDouble();stoppingDistance =
speed * (2.25 + speed/21); // number
stoppingDistanc
e
;speed =
stdIn.nextDouble
New OS upgrades
New UIs
Compatability
Multiple
Codebases
Same
Features
Multiple
Channels
+
+
=
Time & $$
NEW
App
X 1.0
17. Cost of a Multi-Channel Strategy
Innovation Bump
Break even line
Initial Investment
18. Will the market keep up with the IoT?
• Consumer consumption will drive enterprise adoption of
new channels
• Security/Accessibility capabilities will be at a premium in
determining enterprise adoption
• Easy and fast development platforms, tools and
communities will drive growth
• Must work off the cloud
• Must seamlessly integrate with existing products
• Must have the best yet different user experience
• Needs to be energy efficient
19. Multi-Channel Strategy – What To
Consider
• How large is your user base?
• What do your users want?
• What devices are your users on?
• What are your operational and maintenance
cost requirements?
• What UX and/or UI experience do your
users require?
• Are you looking to be in the app store?
• How do your users access and
consume content?
• Does your business need to evolve as fast as technology?
IoT will inherit the drawbacks of the current internet on an infinitely larger, but more invisible scaleAbsence of governance is the first main challengeOne major barrier for the widespread adoption of the Internet of Things technology is the absence of governance. Without an impartial governing authority it will be impossible to have a truly global “Internet of Things”, accepted by states, companies, trade organizations and the common people. Today there is not a unique universal numbering scheme as just described: PCglobal and the Ubiquitous Networking Lab propose two different, non-compatible ways of identifying objects, and there is the risk to have them competing in the coming future over the global market. There is also the need of keeping governance as generic as possible, as having one authority per application field will certainly lead to overlap, confusion and competition between standards. Objects can have different identities in different contexts so having multiple authorities would create a kind of multi-homing, which can lead to disastrous results.Privacy and securityIn order to have a widespread adoption of any object identification system, there is a need to have a technically sound solution to guarantee privacy and the security of the customers. While in many cases the security has been done as an add-on feature, it is the feeling that the public acceptance for the IoT will happen only when the strong security and privacy solution are in place. This could be hybrid security mechanisms that for example combine hardware security with key diversification to deliver superior security that makes attacks significantly more difficult or even impossible. The selection of ssecurity features and mechanisms will continue to be determined by the impact on business processes; and trade-offs will be made between chip size, cost, functionality, interoperability, security, and privacy. The security and privacy issues should be addressed by the forthcoming standards which must define different security features to provide confidentiality, integrity, or availability services. There are also a range of issues related to the identity of people. These must be dealt with in politics and legislation, and they are of crucial importance for the efficient public administrations of the future. Although many of the proposed technologies are based on RFID or smart systems, they will not be discussed in this report whose focus is on objects and things and the related technological and application challenges. Solution of the main challenge: Education and InformationEducation and Information are central aspects for the success of the upcoming IoT. As discussed in previous sections, privacy concerns about the misuse of information are high, and final users do not clearly see the advantages of the widespread adoption of this technology. Therefore, education about the potential use and clear benefits of the IoT must be carried out, together with significant advances in privacy enhancement technologies. As well, information to the users about the presence of RFID tags, the reading range, the kind of data contained in the devices and in the back system, and the use of those, must be clear and easily available.Second solution to challenge LegislationWhen moving towards the Internet of Things it is mandatory that policy keeps up with technology so that citizens gain confidence in the new technology and will accept to live in the “Internet of Things”. When bar codes were introduced they received public uprising and rejection. Attempts to introduce electronic health cards have been unsuccessful based on public fear for information misuse. RFID tags have seen a similar resistance leading to tags that can be erased when clients leave the supermarket, or temporarily disabled, or just be read by trusted readers. In addition to research of current concerns, it is important to engage the wider public in a political debate and dialogue about the Internet of Things. People’s momentarily context and roles can determine their attitudes towards new technology: as an example, an employee will resist his boss' access to his or her mailbox while the same person may demand the same insight into the mailboxes of subordinates. Legislation: mandatory that policy keeps up with technology so that citizens gain confidence in the new technology People’s momentarily context and roles can determine their attitudes towards new technology. An employee will resist his boss’ access to his or her mailbox while the same person may demand the same insight into the mailboxes of subordinates.
Customer Engagement process
On the Enterprise you add synchronization and management and security issues.
On the Enterprise you add synchronization and management and security issues.
Every organization incurs TD, yet most are still profitable,Consider The churn in CIO’s – the highest of any “C” level executive (17-18) months is the average tenureThe constant need for increasing investment just to stay competitive while being asked to more with less- and optimize the impact of investment The need to keep up maintain competitive innovation while keeping the lights on. The need to Shadow IT is one thing that scares every CIO as it exposes and threatens key items under which the CIO is measured; security, compliance, EAI, Innovation and cost control.