2018 promises the IoT-ification of a lot of existing technology Credit: Thinkstock IDG Instrumentation is coming – 2018 promises the IoT-ification of a lot of existing technology, plus edge computing, improved analytics and even some security improvements, if we’re reading these tea-leaves correctly. IoT has been one of the biggest phenomena in technology for years, but 2018 is the year that it begins to really shake up the rank-and-file of enterprise users, according to Christian Renaud, director of 451 Research’s IoT practice. There’s a new level of sophistication coming to the way companies approach the analytical end of the IoT phenomenon, Renaud said. Businesses store roughly half of the data they capture, and analyze about half of what’s stored. “So why did I pay all that money for all those damn sensors if I’m not going to do anything with all the data that they capture?” he saud. “I think the people that have deployed are getting a lot better about what data [they’re] capturing, is important and what data is not.” That’s set to change as businesses recognize the importance of processing all the data they’re taking in. The exploratory/discovery phase is over, and more widespread deployment is on the way. How that new focus on analytics looks on the ground will vary by industry. In the retail sector, for instance, companies are tying point-of-sale systems into all their other databases, which are multiplying because of IoT. This lets them correlate PoS data with numbers of people who enter the store, what areas of the store they visited, demographics and tying that into conversion rate. Kilton Hopkins is an entrepreneur and the IoT program director at Northeastern University’s Silicon Valley outpost. He said that the measurement trend has been on the rise for some time now, and that falling hardware prices are part of the equation. “For every year of IoT that goes by, we see an increase in measurement. With continual price decreases in sensor and microcontroller hardware, it becomes more cost effective to gather more data over time,” he said. “Before we can do any analysis and make any improvements to our business operations, we need to have data. So if there is something that still needs to be measured, maybe this is the year?” Out on the edge Edge computing, in the context of IoT, is the idea that you can actually do some of the computational work required by a system close to the endpoints instead of in a cloud or a data center. The intent is to minimize latency, which, according to Renaud, means that it’s going to be a hot trend in certain kinds of industrial IoT application. “You’ve got these IT vendors who’ve been convincing people to go to the cloud for the last few decades, and they went out and said ‘OK, we’re going to bring the cloud to IoT land’ and the IoT people said, ‘The hell you are, because I’ve got ultra-low latency applications that can’t take a 200ms lap time through AWS,’” he said. The hottest trend is the use of dedicated edge boxes to connect brownfield devices or to do some form of low-latency analytics or control-plane applications. “The people that are in the driver’s seat for buying IoT solutions are generally not the IT people,” said Renaud. “They’re generally the guy who owns the factory, the guy who runs the fleet.” IoT security As usual, the elephant in the IoT room is security – constrained devices are still deeply vulnerable to malicious actors, and there isn’t an easy solution to the problem. Simply put, it’s never going to be economically viable to build tough security into certain kinds of IoT endpoint. This means that real security for IoT is going to have to come from somewhere else in the stack – the network, perhaps, or even higher up, as groups of companies eventually work out broad standards. The dean of Northeastern University’s Silicon Valley campus, P.K. Agarwal, said this work has to remain a priority in 2018. “We have reached a point in the evolution of IoT when we need to re-think the types of security we are putting in place,” he said. “Have we truly addressed the unique security challenges of IoT, or have we just patched existing security models into IoT with hope that it is sufficient?” Related content how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux news High-bandwidth memory nearly sold out until 2026 While it might be tempting to blame Nvidia for the shortage of HBM, it’s not alone in driving high-performance computing and demand for the memory HPC requires. By Andy Patrizio May 13, 2024 3 mins CPUs and Processors High-Performance Computing Data Center opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux how-to Download our SASE and SSE enterprise buyer’s guide From the editors of Network World, this enterprise buyer’s guide helps network and security IT staff understand what Secure Access Service Edge (SASE) and Secure Service Edge) SSE can do for their organizations and how to choose the right solut By Neal Weinberg May 13, 2024 1 min SASE Remote Access Security Network Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe