The Internet of Things: What Does It Take to Make the Internet of Everything Real?

The Internet of Things: What Does It Take to Make the Internet of Everything Real?

I recently delivered a keynote address called “The Internet of Things: What Does It Take to Make the Internet of Everything Real?” at the IoT Global Innovation Forum in Dallas.

I talked about the important linkage between the Internet of Things (IoT) and the next wave of the Internet — the Internet of Everything (IoE). For the uninitiated, the Internet of Things is the networked connection of physical objects. The Internet of Everything is the networked connection of those physical objects along with people, data, and process.

I see signs daily that IoE is having an impact on businesses and people. And with that impact comes unprecedented opportunity for both the private and public sectors. When people, process, data, and things are connected, there is an incredible opportunity to create new revenue streams, compete with disruptive competitors, deliver better experiences, and use new operating models to drive efficiency and value.

Countries, cities, industries, and businesses around the globe are becoming digital to capitalize on the immense opportunity that IoE brings. But becoming a digital business requires rethinking core business processes and implementing an agile information technology (IT) and operations technology (OT) foundation that embraces new security, cloud, mobile, social, and analytics technologies. These underpinnings set the stage for driving business innovation and were the core of my talk.

My presentation resonated with the audience, and I got validation on the following key points:

? There is a lot of interest in fog computing; participants see the limitations of a cloud-only approach and understand the value of our fog approach

? There is deep interest in the skills gap and how to address it (see the education initiative we launched at the IoT World Forum last October)

? There is much interest in how to achieve interoperability, which involves leveraging the stack from things up to applications

? And, no surprise here, there was widespread agreement that IoT security is a big challenge and one that is ripe for innovation (see my April 15 blog on Cisco’s plan to team with Identiv for access control and identity management)

? Cisco’s IoT Product Portfolio provides the right capabilities to support a converged IoT environment.


By now, we know that people, process, data, and things are connecting at a rapid rate. According to Cisco research, there will be 25 billion devices connected to the Internet by the end of this year and 50 billion by 2020 — the equivalent of 3 1/2 devices for every person on the planet.

And what will result? Compelling experiences, new markets, greater efficiency, and more. Behind this great wave are massive shifts in technology and consumption models. Cloud, security, mobility, analytics, and programmable networks are all driving different business models and compelling opportunities. Where information lives and how it’s accessed are changing dramatically.

IT leaders must embrace this new digital model, making themselves more strategic and more nimble — a source of innovation and transformation across their entire organization.

The question is: Are you ready to compete and excel in this next generation of the digital age?

 

Roger Attick

Data and critical thinking drive competitive advantage

8 年

We're seeing rapid expansion of hyperconnected smart devices in the IoT & M2M space. The growth of applications is phenomenal, with industrial IoT, transportation, digital health and consumer tech segments exploding. Smart devices can be both transformative and disruptive. They are not only connected to the cloud, but they're also connected to themselves, manufacturers, employers, end-users, and machine learning software algorithms. This exponential growth of IoT has created a flurry of discussion about privacy and data security. Exactly what are we trying to secure...? Industrial systems have very different attack vectors and threats than medical devices or self-driving cars, and although many legacy IT security concepts can be applied, special consideration needs to be given to the unique requirements (and constraints) in these diverse environments. Security concerns apply at the network, system and application levels. Special precautions must be taken when introducing legacy security solutions to IoT networks and M2M platforms which are deployed in a diverse range of environments and applications.

回复
Lapi Dixit

Building amazing products

9 年

Nice post Kip !

回复
Isabelle Coste

Fast-To-Impact Growth Marketer & Operations Builder

9 年

Great post by Kip showing progress on Cisco's vision

回复

I am seeing the IoT market move rapidly from just hardware (edge devices) to PaaS and SaaS, delivering end client business value from the data sent. The edge devices are an enabler, but 'IoT value' is being able to identify, extract and align with a clients business or users needs and consideration of the total end to end approach becomes essential.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了