Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    6 Considerations for a Successful Enterprise IoT Strategy

    By
    Darryl K. Taft
    -
    October 7, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      16 Considerations for a Successful Enterprise IoT Strategy

      1 - 6 Considerations for a Successful Enterprise IoT Strategy

      From having adequate manpower to planning for unpredictability in a mass-deployment environment, organizations need to cover their bases to use IoT applications successfully.

      2IoT Solutions Should Make Financial Sense

      2 - IoT Solutions Should Make Financial Sense

      The current generation of IoT use cases revolves around optimization of existing processes, such as collecting smart meter readings. IoT applications may struggle to offer real value, since potential per-deployment savings may be small. For example, in the U.S., the 10-year cost of reading a water meter might be $120. This means the 10-year cost of an IoT meter solution would need to be substantially less than that or offer dramatic benefits to be justifiable. As a consequence, many IoT business plans are wildly optimistic.

      3Organizations Must Be Equipped to Handle Sensitive Data

      3 - Organizations Must Be Equipped to Handle Sensitive Data

      IoT data’s value can be very asymmetric—it’s worth different things to different people. For example, utility meter readings at 15-minute intervals are a source of entertainment to home owners, are useful for load planning for the power company and can also reveal when the home is empty to criminals. IoT data’s value is also related to how easy it is to join with other data streams and whether this can be done in real time or not.

      4Handling Massive Amounts of Data Over Long Periods Requires Skill

      4 - Handling Massive Amounts of Data Over Long Periods Requires Skill

      Storing data is easy, but accessing it in a coherent fashion afterward is a challenge. Consider whether the data is being collected for data science or operational purposes. Data scientists want untouched raw data streams, but such data is unusable for monetization purposes. Enterprises that want to monetize IoT will need quality, enriched and value-added data. The same considerations that applied to legacy extract, transform and load (ETL) systems apply to operational IoT systems. Just because they use Hadoop instead of a legacy relational database doesn’t mean that 40 years of experience and knowledge related to data processing suddenly becomes irrelevant.

      5IoT Often Requires Running a 24/7/365 Application

      5 - IoT Often Requires Running a 24/7/365 Application

      IoT applications differ in that it is generally not possible to “turn off” the IoT. As a consequence, a different operational mindset will be required because customers will be unhappy if their IoT devices stop working for any reason. The machine-generated nature of traffic also will be a challenge—such data can be very bursty and devices will tend to keep sending messages until they get an answer. Service-level agreements (SLAs) will become important. The de facto SLA for older applications is often the human short-term memory limit of around seven seconds. If IoT devices behave like telephone switching and charging equipment, we can expect a de facto SLA of between 50 and 150 milliseconds before the devices start to misbehave.

      6Don’t Forget About IoT App or Device Security

      6 - Don't Forget About IoT App or Device Security

      Stored historical data may be a liability instead of an asset for organizations. Don’t let enthusiasm for IoT technologies hide the reality that they are going to be custodians of the most intimate details of people’s lives. From a device perspective, the industry tends to pretend that security is someone else’s problem. Trying to reconcile the rapidly evolving state of security with the difficulty of upgrading deployed devices, while anticipating consumer expectations for minimal configuration requirements, is close to impossible.

      7Understanding Mass Deployment in Uncontrolled Environments

      7 - Understanding Mass Deployment in Uncontrolled Environments

      Developers need to consider the implications of mass deployment in real-world environments. IoT devices will have to cope with a wide variety of environments, and especially with erratic connectivity. Developers probably won’t be able to control or mandate the environment in which the device is used. If they are successful and end up with millions of deployments, they will find that everything that can happen will happen, and some things that can’t happen will happen as well.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×