The Evolving Internet of Things Infographic

Iot Source

Evolving Internet of Things 

The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every aspect of our lives in the coming years. Says W. Roy Schulte, vice president and analyst at Gartner, “Uses of the IoT that were previously impractical will increasingly become practical. The IoT is relevant in virtually every industry, although not in every application. There will be no purely ‘IoT applications.’ Rather, there will be many applications that leverage the IoT in some small or large aspect of their work. As a result, business analysts and developers of information-centric processes need to have the expertise and the tools to implement IoT aspects that play a role in their systems.

Evolution-IoT

(Infographic Source: Lucas Blake)

Evolving Internet of Things 5 Year View

By 2020, Gartner predicts that more than half of major new business processes and systems will incorporate some element of the internet of things, and analysts have disclosed a few more unexpected implications resulting from the Internet of Things. Until 2018, it’s predicted that 75% of IoT projects will take up to twice as long as planned, resulting in cost overruns. Unsurprisingly, more complicated and/or ambitious projects are likely to have greater scheduling overruns, and compromises made are liable to lead to weak performances, security risks and integration problems.

It’s also expected that by 2020 a black market exceeding $5 billion will exist selling fake sensors and video data. New security risks and privacy repercussions are occurring with the IoT solutions and the types of data they generate, and organizations are seeing a new kind of IT complexity which without adequate appreciation and comprehension could critically jeopardize organizations. “The IoT has enormous potential to collect continuous data about our environment,” states Ted Friedman, vice president and analyst at Gartner. “The integrity of this data will be important in making personal and business decisions… A black market for fake or corrupted sensor and video data will mean that data can be compromised or substituted with inaccurate or deliberately manipulated data. This scenario will spur the growth of privacy products and services, resulting in an extensive public discussion regarding the future of privacy, the means to protect individual privacy, and the role of technology and Government in privacy protection.

Gartner also points to the expectation that 2020 will see an increase in IoT security costs to 20% of annual security budgets, a drastic increase from the 1% in 2015. Says Earl Perkins, research vice president at Gartner, “”Major cybersecurity vendors and service providers are already delivering roadmaps and architecture of IoT security, in anticipation of market opportunity. Small startups delivering niche IoT security in areas such as network segmentation, device-to-device authentication and simple data encryption are offering first-generation products and services, including cloud-based solutions where applicable. Large security vendors have already begun acquiring some of these IoT startups to support their early roadmaps and fill niches in their portfolios.”

Noteworthy IoT Stats

  • According to Gartner, 20.8 billion connected things will be used globally by 2020.
  • This year, 5.5 million new things will be connected every day.
  • Gartner predicts IoT will support a 22% increase in total service spending this year, reaching $235 billion.
  • Regarding hardware spending, consumer applications will amount to $546 billion this year.
  • IoT use in the enterprise will reach $868 in 2016.

By Jennifer Klostermann

Brian Day

Tips for Developing Apps In a Cloud Environment

DevOps and the Cloud Unless you’ve just started a brand-new organization, your IT environment is currently running a diverse collection of last-generation and older applications that were deployed with the one-application-per-server approach that unleashed the ...
Digital Theft

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications (Updated August 11th, 2020) IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in ...
David Gevorkian

Website Accessibility: Compliancy, Laws and Best Practices

Key to Making Your Website Accessible The internet has changed the education sector in so many ways. With e-learning, more people around the globe are able to access high-quality education and advance their careers. E-learning ...
Printing Industry

How to Choose the Right Cloud Printing Solution for Your Business

Cloud Printing Business Solutions The demand for cloud printing is primarily driven by the overall organizational benefits of Software as a Service (SaaS) portfolio. The expectation of flexibility in workplace tools, of plug-and-play solutions for ...
Nik Thumma Contributor

Why It’s Time for Companies to Move ‘All-In’ on the Cloud

Companies to Move ‘All-In’ on the Cloud The cloud offers businesses innovative ways to optimize operations and achieve amazing results. While many companies have already migrated to the cloud in some capacity, the full scope ...
Patrick Joggerst

Why Platforms Matter as UCaaS Adoption Continues to Soar

UCaaS Adoption Continues to Soar Industry analysts agree – the unified communications-as-a-Service (UCaaS) market will continue to grow by leaps and bounds in 2020 and beyond. Mordor Intelligence, for example, predicts a compound aggregated growth ...