The Evolving Internet of Things Infographic

Evolving Internet of Things 

The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every aspect of our lives in the coming years. Says W. Roy Schulte, vice president and analyst at Gartner, “Uses of the IoT that were previously impractical will increasingly become practical. The IoT is relevant in virtually every industry, although not in every application. There will be no purely ‘IoT applications.’ Rather, there will be many applications that leverage the IoT in some small or large aspect of their work. As a result, business analysts and developers of information-centric processes need to have the expertise and the tools to implement IoT aspects that play a role in their systems.

Evolution-IoT

(Infographic Source: Lucas Blake)

Evolving Internet of Things 5 Year View

By 2020, Gartner predicts that more than half of major new business processes and systems will incorporate some element of the internet of things, and analysts have disclosed a few more unexpected implications resulting from the Internet of Things. Until 2018, it’s predicted that 75% of IoT projects will take up to twice as long as planned, resulting in cost overruns. Unsurprisingly, more complicated and/or ambitious projects are likely to have greater scheduling overruns, and compromises made are liable to lead to weak performances, security risks and integration problems.

It’s also expected that by 2020 a black market exceeding $5 billion will exist selling fake sensors and video data. New security risks and privacy repercussions are occurring with the IoT solutions and the types of data they generate, and organizations are seeing a new kind of IT complexity which without adequate appreciation and comprehension could critically jeopardize organizations. “The IoT has enormous potential to collect continuous data about our environment,” states Ted Friedman, vice president and analyst at Gartner. “The integrity of this data will be important in making personal and business decisions… A black market for fake or corrupted sensor and video data will mean that data can be compromised or substituted with inaccurate or deliberately manipulated data. This scenario will spur the growth of privacy products and services, resulting in an extensive public discussion regarding the future of privacy, the means to protect individual privacy, and the role of technology and Government in privacy protection.

Gartner also points to the expectation that 2020 will see an increase in IoT security costs to 20% of annual security budgets, a drastic increase from the 1% in 2015. Says Earl Perkins, research vice president at Gartner, “”Major cybersecurity vendors and service providers are already delivering roadmaps and architecture of IoT security, in anticipation of market opportunity. Small startups delivering niche IoT security in areas such as network segmentation, device-to-device authentication and simple data encryption are offering first-generation products and services, including cloud-based solutions where applicable. Large security vendors have already begun acquiring some of these IoT startups to support their early roadmaps and fill niches in their portfolios.”

Noteworthy IoT Stats

  • According to Gartner, 20.8 billion connected things will be used globally by 2020.
  • This year, 5.5 million new things will be connected every day.
  • Gartner predicts IoT will support a 22% increase in total service spending this year, reaching $235 billion.
  • Regarding hardware spending, consumer applications will amount to $546 billion this year.
  • IoT use in the enterprise will reach $868 in 2016.

By Jennifer Klostermann

Episode 3: The Bottomless Cloud – An Interview with David Friend of Wasabi

Why data is not “the new oil” and why “cloud” means more than we think ...

Episode 2: Coronavirus Phishing Emails and Work-from-Home Meetings

Coronavirus Phishing Emails What to watch out for as scammers exploit pandemic panic, and tips ...

Episode 4: The Power of Regulatory Compliant Cloud: A European Case Study

An interview with Johan Christenson, CEO of CityNetwork With the world focusing on the big ...
Gilad David Maayan

Accessing (HPC) High Performance Computing

HPC in the Cloud Big data and Machine Learning (ML) can provide businesses with incredible insights and an innovative edge. However, to properly analyze the ...
Kokumai

History, Current Status and Future Scenarios of Expanded Password System

Future Scenarios of Expanded Password System Passwords are so hard to manage that some people are urging the removal of passwords from digital identity altogether. What ...
Patrick Joggerst

Why Platforms Matter as UCaaS Adoption Continues to Soar

UCaaS Adoption Continues to Soar Industry analysts agree – the unified communications-as-a-Service (UCaaS) market will continue to grow by leaps and bounds in 2020 and ...
Martin Mendelsohn

Supporting CISOS, CIOS and CTOS That Are Overwhelmed During the COVID Battle

The Covid Era and CISO Stress Even before COVID-19, senior technology executives, including CISOs, CIOs and CTOs were overwhelmed, and felt an increasing lack of ...
Ian Hayes

EasyShip – Shipping and delivering across the cloud

The Shipping Industry  Article branded by Easyship Shipping and delivering across the world is as hectic as it sounds, and it can get really chaotic ...
Kayla Matthews

5 Cybersecurity Trends Defining 2019

5 Cybersecurity Trends The cybersecurity industry continually evolves to meet changing needs and adopt new technologies. As such, it's appropriate to take a look at ...
David Discenza

Four Ways to Improve Cybersecurity and Ensure Business Continuity

Four Ways to Improve Cybersecurity Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are ...
Chandani Patel

Design Practices: AWS IoT Solutions

AWS IoT Solutions Internet of Things (IoT) presents an unparalleled opportunity for every industry to address their business challenges. With the proliferation of devices, one ...
Kokumai

Identity Assurance – Sufficient and Necessary Conditions

Identity Assurance It is not easy to define the 'sufficient condition' for describing a set of processes used to establish that a natural person is ...
Aarti Parikh

Serverless Multi-Tier Architecture on AWS

Serverless Multi-Tier Architecture Multi-tier Architecture Multi-tier Architecture is also known as n-tier architecture. In such architecture, an application is developed and distributed in more than ...