The Litmus Test For Internet Of Things

The Litmus Test For Internet Of Things

The Litmus Test For Internet Of Things

A Swiss customer of ours recently harnessed the power of machine-to-machine communications by hooking up one of its customers – the largest Brewery in Switzerland – with intelligent beer tanks. Patrons no longer have to worry about running dry of their favorite brew, as the kegs now automatically order a refill once at the peril of running empty.

Meanwhile, I also spent some time going through Cisco System’s vision on Internet of Things (IoT). Although I may be cutting a few corners here, the gist of the matter is that by 2020 or so, pretty much everything that can be connected will be. The only limitation is our imagination.

But is it really so?

Although intelligent beer tanks do sound imaginative for a layman like me, that may not not hold true for someone who has been responsible for the associated logistics. If you were running a chain of bars, the downside of being left with empty tanks is very real. So although the solution in itself was creative for sure, the underlying problem that the technology solves is very concrete. I bet they even made a business case.

A common phenomena in the technology industry is that even if something is technically possible, there are no guarantees that the concept would ever be adopted by users. Developing new technology concepts tends to be costly, and most things we use in our daily life do not really produce that much value. With this in mind, even if you furnish something that creates only little value with a chip and hook it to the cloud, it is by no means certain there will be any meaningful utility even if imagination was at play.

Rather than winging it on imagination, I have come to realize that there is a simple litmus test for identifying the feasibility of various IoT concepts. It goes like this:

Does my IoT concept provide machine-aided anticipation?

In the beer tank example, the answer would most definitely be an unequivocal yes. The intelligent beer tank is not only capable of anticipating the risk of running empty, but autonomously saves the day by ordering a refill. Some variation of this same theme would also seem to apply to most of the 10 Cool Companies That are Monetizing Internet Of Things published in CloudTweaks on July 21 st 2014.

Posing this question to test imaginative concepts is important because it reveals how much utility the application is likely to create. Technologies that improve our lives in some concrete way are usually the ones that resonate with the buying public.

The future for IoT is certainly bright, as long we get past the ”anything is possible” hubris. Instead, we must focus on applications that produce concrete value. Where there is value, there is a way.

By Juha Holkkola

juha-holkkola

Juha Holkkola is managing director of Nixu Software Oy Ltd, the cloud application deployment company, an affiliate of Nixu. He joined Nixu in early 2000 and has since held various business and sales management positions. Before Nixu, Juha worked for Nokia Networks and financial services company Danske Bank in marketing and treasury positions.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…