Enabling Transformation Quickly With Agile Project Management

Enabling Transformation Quickly With Agile Project Management

Agile Project Management Lack of understanding and fear of failure in an enterprise setting is a combination that leaves most organizations paralyzed when trying to develop a digital strategy. In a survey conducted at the 2018 Enaxis Leadership Forum, most business leaders viewed digital transformation as
Survey: The State of Enterprise IT Infrastructure and Security in 2018

Survey: The State of Enterprise IT Infrastructure and Security in 2018

The State of Enterprise IT Infrastructure and Security When it comes to cloud adoption, there’s a common misconception that many of today’s enterprises are already operating IT in the cloud. While cloud infrastructure is certainly on the rise, the reality is that it still only
IoT

The Evolution of the IoT Broker

The IoT Broker

The concept of a cloud broker has changed and we now instead call it the Hybrid Cloud. Where the customer, partner or the organization we are a part of has multiple cloud solutions deployed, and the goal is the create a simple management structure. Why would you want to create a simple management structure? The more you manage, the thinner your IT staff gets, the more likely that human error will get your company.

(IoT Impact Infographic Source: McKinsey)

One of the things that I see in the near term is the rise of IoT Brokers. I know, I was a dreamer when it came to the reality of cloud brokers. We, in this case, we mean the broader cloud market, were not ready for the concept yet. We are nearing the time when an IoT broker is going to be a significant value. I feel like it is time to start the initial design conversation around what would an IoT broker bring to the table that we don’t already have.

First off, the concept of IoT broker is similar to cloud broker, providing standardized services to businesses.

  1. Standardized gateway services for all IoT Devices. One of the things that slowed the evolution of email systems in the 1990’s was the reality of LCD. SMTP was the lowest common denominator for most email systems. But how they implemented that standard forced the user and the user’s email system to adapt. The concept of LCD for data always has to be the least amount of data in a pure form that the user needs to solve their problem.
  2. Standardized data collection service and structure for supporting storage regardless of where it is (cloud, on-premise or hybrid)
  3. The standardized device deployment provides a structure that includes the ability to automatically update IoT devices for new security, protocols, and data capture changes. Standardized deployment and management of IoT devices would generate the ability to add support for an IoT mesh network system.

Those three things are my 1.0 IoT Broker solution. The starting point of the overall solution. The first thing is the standardized data and device gateway. Simply put, the major cloud providers globally are all considering or have an IoT gateway deployed. The value proposition of the IoT Broker will be the ability to bridge or span multiple IoT gateways in building your IoT solutions in-house. The simple example within an IoT Broker model would be video surveillance. Each system deployed by businesses has different inputs and outputs. But connected to a standardized IoT gateway all the business’ on the street can share surveillance feeds. It reduces the cost of security for every business that shares the surveillance. You don’t need a camera covering the alley if the business next to you already has one.

IoT camera

The standardization of data collection is an interesting problem. Today IoT devices produce ~110 zettabytes of data annually. Data standardization allows for several things to be handled at the IoT Broker level, the easy button being if there is no motion in the security video don’t share it. The more complex application of the standardized data gateway allows hierarchical viewing of information. Not managed hierarchies rather who see’s what data as a structure within the organization. I don’t care how many times the surveillance drone scans the grounds of the building in a day. I do, based on the motion detected at 12:21 want to see the footage from that drone in the air at that time.

Finally, the standardize deployment system allows the organization to deploy, update and manage devices more effectively. Standardized deployment of IoT devices expands on the already existing concepts within Mobile Device Management to support the concepts of device update, device removal, and device reprogramming.

One last thing that the IoT Broker will allow is the broader deployment of an IoT concept I call mesh networking. Where any one device connects to the mesh and announces the services, it provides. Such as I have a cellular data connection, or I have a satellite up link. These services would then exist within the IoT device mesh. It then allows the IoT broker to offer a more resilient IoT infrastructure that supports managed communication for the IoT devices.

I realize that the three concepts I am proposing exist in part today. The rise of the first company to pull them all together is going to be interesting!

By Scott Andersen

Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

TOP ARCHIVES

Critical Success Factors when shifting Workloads into the Cloud

Critical Success Factors when shifting Workloads into the Cloud

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain ...
Max Contributor

Zero-Rating and Data Consumption

Zero-Rating The ordinary mobile user often feels the need to backup their personal files only after they’ve lost it. It’s ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
5 Reasons to Head for the Cloud – Part 1

5 Reasons to Head for the Cloud – Part 1

Head for the Cloud Last month Salesforce held its 14th annual Dreamforce event in San Francisco. It has become the ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...