Mobile Operators Neglecting IoT Is A Paramount Mistake

Mobile Operators

Within the past year, mobile operators have been working hard to build relationships with major information and communications technology (ICT) vendors to gain more relevance in the enterprise ecosystem, particularly in regards to IoT value-added services. Recent notable partnerships include AT&T and IBM, Verizon and Cognizant, Tele2 and HCL Technologies, and Vodafone and Huawei. These partnerships are critical to operator growth in IoT to add more connections on the networks, build new enterprise relationships, and add new revenues from applications and data/analytics services. But less understood is the impact IT firm relationships have on mobile operator’s smartphone businesses; mobile operators gain a majority of their wireless revenues from smartphone connections. Image dicovered via statista.com

Market share of wireless subscriptions held by carriers in the U.S

Mobile Operators

For IoT services, IT-centric firms, such as HCL Technologies, Cognizant, and IBM understand that their greatest value is in managing machine data and providing insights based on analysis of that data. However, they are not as adept at extracting the machine data, which can require expertise in embedded software/hardware engineering, communications devices, and networking.

Communications devices and networking are mobile operator core competencies. And some mobile operators are starting to excel in other areas. AT&T, for instance, is offering through its innovation centers embedded software/hardware engineering services designing and building sensors.

Learning To Adapt

The bigger prize for mobile operators from these relationships is the benefits to smartphone services revenues. Smartphones are an important if not primary hub for many IoT applications within the connected car, smart home, healthcare, and connected machine field services sectors. It is these IoT applications that drive up the value of the smartphone and therefore help operators maintain their smartphone data plan fees.

The numbers paint a clear picture. Worldwide handset data plan revenues, which are dominated by smartphones, across business and consumer segments, were approximately $350 billion in 2015 and will grow to about $475 billion in 2020. In the enterprise segment alone, handset data plan revenues were $153 billion in 2015 and will grow to more than $200 billion in 2020.

In contrast, IoT services revenues for data and analytics, as well as professional services that include applications/development, systems integration, and consulting, will grow from $44 billion in 2015 to $128 billion in 2020. If only considering cellular connections, these same revenues value in at $20 billion and $72 billion, respectively.

Neglecting IoT Could be Costly

While IoT services revenues are significant, smartphone data plans are still the backbone of mobile operators’ business. For a mobile operator to neglect IoT is a paramount mistake, as IoT applications help maintain a data plan’s value, regardless of whether or not they pursue IoT services. Moving forward, operator smartphone strategies need to evolve to support the myriad of applications and opportunities that will stem from the billions of connections in the IoT. This can be something as simple as shared data plans across IoT and smartphone assets, to full IoT solution services.

Mobile operators that are serious about IoT are transforming their business models to offer more value-added services and the ICT partnership is an important first step in this journey. A critical side benefit for operators is the positive impact of these relationships on its smartphone businesses. Interestingly a future benefit for operators is they become bonafide IT services firms themselves. Whether this becomes a reality is up for grabs. As for today, the mobile operator-IT services firm relationship is very complementary. Both are benefitting from a growing IoT market expected to grow to over 22 billion connections by 2020.

By Dan Shey

Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
Gilad David Maayan
What Is Cloud Deployment? Cloud deployment is the process of deploying and managing applications, services, and infrastructure in a cloud computing environment. Cloud deployment provides scalability, reliability and accessibility over the internet, and it allows ...
Ronald van Loon
5G networks are expanding to drive new, diverse use cases and innovative mobile-first experiences. Organizations are preparing their 5G strategies accordingly to help fuel transformation, support digital business processes, and improve how people collaborate and ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

Cloud Community Supporters

(ISC)²
Aws
Hp
Ca
Cisco Logo

Cloud community support comes from sponsorship advertising and collaborative network partnership initiatives.

Contact us for more information on how to get involved in our flexibly priced programs!