How Far Away Is The Internet Of Things?

How Far Away Is The Internet Of Things?

How Far Away Is The Internet Of Things?

For all the talk about the growth and expansion of the internet of things, the reality is that we are still quite far away from seeing consumer level, widespread adoption of the concept. How long will it be until the internet of things becomes an everyday reality?

WearableElectronics2

The internet of things is still very limited when compared with the grandiose statements we hear about its potential. The wearable tech devices that we are slowly starting to see hit the market – such as Google Glass and FitBit – are only the first iterations of the genre. Homes are slowly starting to digitise with customised apps and remote heating and hot water control systems, but again, its a far cry from the fridge telling you that your milk is turning sour.

The industry might think we are closer than we actually are. Evans Data recently carried out a survey of 1,400 developers worldwide and discovered that seventeen percent stated that they were working on internet of things-related projects, while twenty three percent said they expected to begin IoT projects in January 2015. Whether or not these figures should be considered as high or low (or even credible) is anyone’s guess.

“We’re still in the early stages of development for internet of things,” said Janel Garvin, Evans’ chief executive. “But at the same time the required technologies are now converging with cloud, big data, embedded stems, real-time event processing, even cognitive computing combining to change the face of the technological landscape we live in, and developers are leading the way”.

Key to understanding when we can consider the IoT to have truly ‘arrived’ lies in properly understanding and defining the term. It is a commonly held misconception that because the IoT is related to embedded systems, all we need to do is connect units with embedded systems (such as TVs, cycle computers and self-service checkouts) to the web and they will automatically become IoT devices. In reality, a IoT device needs to exhibit more properties than merely having an embedded systems and being connected to the internet. Some examples include; an ability to communicate, store and exchange data, interoperability, security controls, configuration management capabilities and possibly artificial intelligence.

So in answer to how far away is the IoT- it’s partly down to developers and the supply of IoT-enabled machine-to-machine programming tools. IoT machines need to operate in a standardised environment where data from any device can be translated and presented in a standard format for web developers.

When asked to comment, John Horn, President of RacoWireless said “We see a very fragmented space as companies and individuals from all backgrounds are clamoring to adopt connected technologies. However, it has been a challenge for many to get to market because of the lack of industry standards and high upfront development costs”.

Away from developers, it’s also partly down to other aspects such as the question of efficient and sufficient power supply to sensors, connectivity transport mechanisms, and networking standards and protocols.

The overlap of machine-to-machine tools, embedded computing and early IoT devices means foundations are in place, we just need someone to build the house.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…