IoT Curator – Nov 2018
Whether you accept it or not, manufacturers are rapidly adopting IoT for their digital transformation journey. For those who are in the midst of IoT projects, how projects are moving forward, which use cases are more promising than others in delivering RoI, these and other questions are their key concerns. In this issue, we present you three such articles which go deeper into these aspects.
Digital Transformation in Manufacturing: Top Trends
IoT adoption is at different stages for different manufacturers. It is real, but it’s difficult to say how long it will take for companies to embrace IoT. It will surely take many years to fully realize its value but is already happening faster than many expected. This blog presents some of the key digital transformation trends in the manufacturing industry. There are certain technology themes that are prominently discussed, debated and deliberated.
- Advanced Analytics and Machine Learning
- Open Systems
- Platform vs. Platform
- Supply Chain Digitization
- Edge and Fog
- Smart Products and Services
- Smart Factories, Plants, Operations
- Additive Manufacturing
- Asset Performance Management
- Smart Environments
Read in-depth about digital transformation, Learn more.
The Consumerization of IoT: #Reimagine
Consumerization of the technology is a term that describes how technologies emerge and grow first in the consumer market and then spread to enterprises. The same phenomenon will be seen in IoT and immersive technologies to some extent. In one year alone (Q42016 to Q42017), shipments of intelligent speakers from Amazon and Google grew by nearly a factor of four. VR headset sale has grown at a compound annual growth rate of more than fifty percent. The home IoT market will be a big snowball. This consumerization of IoT will help the Industrial IoT and edge computing markets explode over the next few years. Just like how mobile computing and smartphones changed the enterprises, enterprise IT will react to the demand of IoT and immersive experiences rather than drive the demand itself. It’s time to decide – lead, or follow?
Why Industrial IoT stakes are so high?
In mid-2017, Cisco produced a report of survey results indicating that companies considered 76% of their IoT initiatives failures, and a majority said that IoT initiatives looked good on paper, but turned out to be more complex than expected. In early July, Gartner published its first ever 2018 Magic Quadrant for Industrial IoT, which included companies that provide IoT platforms that work in multiple verticals, such as transportation, manufacturing, utilities, and natural resources. The punchline is that very few company could cross the Gartner’s bar for execution – indicating an opinion that the market is still at a nascent stage.
In spite of the hype, most organizations are somewhere between Industry 2.0 and Industry 3.0 – they have mass production capabilities and basic automation, but no aggregated data systems or networking. As they look to understand what Industry 4.0 technologies can do for their businesses, they must keep in mind that in order to be successful, they will need to spend effort on developing a strong foundation of data and identifying the key business metrics that they want to improve. Without this foundation, the rest of the technologies will remain one-off, isolated, and won’t live up to the promises we’ve all been sold.
Network Security & Endpoint Security are Better Together
One of the biggest challenges organizations are facing today is the need to respond quickly to an increasingly mobile workforce and customer base. Gartner predicts that 99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident. Endpoint devices represent a major source for such exploits. The challenge is that IoT network security cannot protect endpoints, or even adequately protect themselves from rogue endpoints devices when those devices and their vulnerabilities exist outside of the corporate parameters.
Endpoint security is the responsibility of far more than the endpoint or desktop IT team. In fact, it is required to be understood and leveraged by anyone who is responsible for the organization’s network security. These groups need better visibility, compliance, controls, and response across the entire distributed network, including on and off network endpoints. More than simply protecting individual devices, a true endpoint security solution continually assesses and ensures the integrity, confidentiality, and availability of enterprise data, network resources, and information systems. This article goes deep into this aspect.