IoT: Connected Manufacturing Leads To Service as a Product

IoT: Connected Manufacturing Leads To Service as a Product

Connected Manufacturing

A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a different acceleration style (choice of sporty or smooth), improved navigation and mapping software, and new stay-in-lane safety features.

This is not a vision of some distant future. These things are happening now with certain brands of cars, and they will expand quickly across much of the retail and industrial automotive landscape. It is a subtle example of the power and diversity of the Internet of Things – the capacity for all types of machines, not simply computers and phones, but every kind of device or tool to communicate, primarily by way of the Internet.

IoT-IDC

(Image Source: IDC)

A vital observation from a business standpoint is the fact that so much of the value of this car company now lies with the transfer of data. The car is as physical a product as ever, but the current that drives everything forward, from design to manufacturing to sales to aftermarket monetization, is data.

Connected Manufacturing

From an outside perspective, the Internet of Things offers an unlimited selection of innovations, ranging from an electric toothbrush that monitors correct brushing style, through to tire pressure sensors in truck fleets to geolocation sensors attached to livestock. The potential for their use is limitless, and this includes on the factory floor. Connected Manufacturing is the industrial application of the Internet of Things. It ushers in a revolution in manufacturing, on par with Ford’s development of mass production and the mid-20th-century development of Just-In-Time logistics.

shutterstock_331211831

(Image Source: Shutterstock)

Proactive analytics, for example, helps a device identify future needs, such as when a part might fail, when it requires service, or when supplies need to be ordered. When the machine itself can dispatch the appropriate commands to a human or another machine, it ensures smooth, safe and economical operation.

Distributed intelligence allows for greater degrees of personalization. In healthcare, medical device dashboards can reflect an individual patient’s information and requirements. At home, an intelligent refrigerator can automatically add needed items to a grocery list or grocery delivery service. In manufacturing, greater capacity opens up for customized production according to an individual customer’s requirement without extensive retooling or downtime. The machines themselves can decide how best to approach the project and self-organize to get each job done.

Intelligence Through Data 

The universal availability of data and its intelligence allows decision-makers, designers, account reps and everyone else in the supply chain to share necessary information, opening up opportunities for enhanced sales and support, improved internal management, customer service, and innovation.

brain-data

Connected manufacturing is a type of cornucopia, a perpetual source of sustenance for every business and manufacturer primarily because of the data that it makes available. But it demands a change in mindset, even for those that deal in heavy tangible goods, since the same intelligence that powers the manufacturing process now modifies the management model.

Companies are now becoming purveyors of information and providers of services. Rather than sell, or even lease a piece of heavy machinery to a customer, a business may realize greater overall revenues by providing services, such as maintenance, training, and supplies. They can attract and retain essential customer data to facilitate up-sells, and innovative aftermarket monetization opportunities. This idea of not selling a product, but retaining ownership of it and delivering services instead, requires significant flexibility on the part of corporate decision-makers, long used to a more traditional approach to commerce and business. It is the result of a chain of processes that starts with the Internet of Things, moves through connected manufacturing and winds up in the service industry.

Business leaders who are contemplating a move into the world of the Internet of Things must ensure their education travels along two streams: first is understanding the sheer diversity and versatility of IOT technologies, and how to implement them into the manufacturing and delivery stream. Second and arguably the most important is the flipped notion of “you-as-a-service.” No matter how tangible or long-standing a company’s products may be, their value now lies in the information halo that surrounds it. Machine-to-machine communication leads to data; data leads to information, and information becomes the key to every company’s future.

For more on this topic, go to http://businessvalueexchange.com, sponsored by Hewlett Packard Enterprise.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…