IoT

The Growing Popularity of IoT

The IoT Market

The Organization for Economic Cooperation and Development (OECD) and search engine Shodan have released new data about the Internet of Things (IoT) that may come as a surprise to many in the US. Though certainly prevalent in the United States, IoT devices are more numerous in Korea, Denmark, and Switzerland, and, in fact, Europe overall is making an avid play for the IoT market. Though Quartz points out that the IoT market is still only an emerging market, acquisitions such as that of Nest by Google in 2014, the release of voice-controlled speaker Amazon Echo later that same year, and the revamping of Apple TV, indicate the confidence of investors and entrepreneurs alike.

top-5-IoT

(Image Source: theatlas.com)

An Abridged History

Bill McCabe provides a “Quick History of the Internet of Things” that takes us back to the “birth of networking and the explosion of consumer technology.” With the infrastructure of the internet emerging in 1974, and the first website coming online in 1991, it often comes as a shock that the World Wide Web has only been a notable part of lives for 20 to 25 years. However, the term Internet of Things is apparently not a particularly new one, and some believe Tesla and Edison may be the grandfathers of connected objects. Apple’s return to the market in 1998 played a role in the development of IoT, as did the entrenching of smartphones in society, but the growth and evolution of IoT can’t be honed down to one or even several stimuli and is perhaps all the more exciting for its diverse influences. Zoom in to see the tremendous IoT infographic by Matt Turck.

Internet-of-Things-2016

(Image Source: By Matt Turck)

So Why Isn’t It Mainstream Yet?

Though the OECD believes IoT devices can improve government operations, better transportation monitoring, and advance the use of energy and eHealth, Quartz notes that IoT tech still isn’t in the mainstream. While this could, as suggested, be due to humanity’s often slow capacity for change, the speed at which smartphones and the internet itself have become ingrained in society beg the question, why not IoT? Security and privacy are two notable obstructions which, though perhaps as relevant in other more popular tech, can be particularly sticky when it comes to IoT devices. This may be partly because of the highly personalized nature of IoT devices, or perhaps the general public is simply more aware now of the pitfalls that have pervaded our connected world for decades. Either way, these hurdles aren’t likely to prevent the evolution of IoT, but will perhaps contribute to stronger, safer, and more effective networks in our future.

Thanks to the concern around IoT security, businesses and governments are taking the necessary steps to prevent future failures and disasters, and fiascos such as the Jeep Cherokee hack have a created a steep learning curve with manufacturers of IoT devices on the lookout for potential hazards. Security firms are being brought into the manufacturing process as collaborators, offering high-level encryption and tamper-resistant systems, and alliances such as the Internet of Things Security Foundation (IoTSF) bode well for the industry. Says John Moor, spokesperson for IoTSF, “The opportunity for IoT is staggering. However, there are ever-real security challenges that accompany those opportunities. By creating a dedicated focus on security, our intention is simple — drive excellence in IoT security. IoTSF aims to be the home for providers, adopters, and beneficiaries of IoT products and services.”

There’s no doubt that IoT will soon establish itself as a dominant technology in our world; with a little luck, today’s many powerful collaborations will ensure this is a positive move.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

CONTRIBUTORS

The Internet of (Retail) Things: How mPOS Systems Make Buying Stuff High-Tech

The Internet of (Retail) Things: How mPOS Systems Make Buying Stuff High-Tech

mPOS Systems On The Rise Modern society is increasingly connected — and mobile. Those realities have also carried over to ...
Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically ...
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, ...
IoT and the Evolution of the Workplace

IoT and the Evolution of the Workplace

IoT Evolution Just as the Industrial Revolution changed the relationship between humans and work, the rise of the Internet of ...
How Wearable Devices Are Making A Healthy Society Around Us

How Wearable Devices Are Making A Healthy Society Around Us

Wearable Devices Having smartphones to smarter the way we communicate or stay connected is an old fable. Technology has evolved ...
The AWS Cloud Goes Underground at re:Invent

The AWS Cloud Goes Underground at re:Invent

As you wander through the AWS re:Invent campus, take a minute to think about your expectations for all of the elements that ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as ...
Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) ...

NEWS

Red Hat global survey finds field services operations bullish on emerging technologies

Red Hat global survey finds field services operations bullish on emerging technologies

Bullish Emerging Technologies For many industries, from transportation to utilities, manufacturing and more, field workers are pivotal to the success ...
DigitalOcean Announces New Compute Plans to Provide Best Price-to-Performance for Production Applications

DigitalOcean Announces New Compute Plans to Provide Best Price-to-Performance for Production Applications

Changes Position DigitalOcean as Most Competitive, Simple Pricing Solution in Cloud Infrastructure Industry NEW YORK, Jan. 16, 2018 (GLOBE NEWSWIRE) ...
Cogeco Peer 1 Adds Managed Microsoft Azure Services to Cloud Portfolio

Cogeco Peer 1 Adds Managed Microsoft Azure Services to Cloud Portfolio

Cogeco Peer 1 Adds Managed Microsoft Azure Services Flexible services optimize customer's Azure investments, handle the day-to-day management of the ...