The Year Ahead in the Industrial IoT

Connected World

In 2016, we saw breathless growth in the industrial IoT market with a bewildering mix of solutions confronting the industrial operator.

Head on over to Peggy Smedley’s Connected World where I’ll give you my predictions for the IIoT market in 2017 to help you plan for the new year. Topics I cover include:

  • IoT security moving to the forefront after the DDoS attack
  • Predictive asset heath with machine learning
  • The Internet of Humans and Machines represented by Digital Twins
  • Which IoT platform players will make it and which ones won’t

Don’t miss it!

 

Mobile Apps Must be Instrumented Just Like IoT Devices

Quebec

Just like IoT devices, mobile apps should be instrumented to send usage, feedback, error and engagement telemetry to analytic systems.

Instrument everything!

While many developers have written code or used frameworks to log errors, they only scratched the surface when it comes to the amount and types of metrics an app should capture. Beyond data collection, apps must stream telemetry back to analytic systems to benefit marketers, product managers, the QA team and developers. This is all about gleaning insights and improving the app and user experience you’re delivering to your customers and employees.

Capture the following app metrics:

  • Runtime errors and fatal crashes to help developers find the root cause of bugs
  • User feedback and app ratings (stars)
  • Task completion rates
  • Passive sentiment via app engagement depth and duration
  • Sales conversions
  • App launch rates, usage patterns and where users are clicking
  • Underlying operating systems, devices, mobile operators, app versions, available memory, CPU usage and power management data

In addition to passively capturing metrics, actively engage users via push notifications to ask for feedback.

Improve user productivity through app instrumentation to create a feedback loop that continuously enhances the quality, usability and performance for customers and employees. Does the organization where you work instrument all its mobile apps?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Internet of Things Predictions for 2017

Hyperspace

When it comes to IoT predictions, 2017 will see solutions solving business pain points jump to hyperspace as VC funding dries up for many platform plays.

As we move into 2017, the marketplace will start to separate the “build it and they will come” crowd from IoT solutions that add compelling business value. When it comes to value creation, I anticipate we’ll finally see technologies that abstract machine learning algorithms plus data prep and cleansing to solve business problems for specific equipment. Think of this as an advanced analytics extension to existing digital twins. Vendors that seize upon this technology will see success in the $900M Industrial IoT market. On the other hand, the vendors promoting generic, often cloud-only platforms that try to be all things to all people will face a tough road ahead.

The IoT platforms set to take off are the ones tailored to specific industries and flexible enough to run on-premises, in hybrid mode and in the cloud as needed by customers. I’m not just talking about cloud offerings that work with edge gateways in the fog. I’m talking about solutions that are truly portable. On the security front, industrial customers will struggle to safely IoT-enable machines that aren’t securable and were never intended to be on the Internet. This will continue to be a problem until next generation versions of industrial equipment rolls off the assembly line with built-in compute, storage, IP networking and security. Expect lots of the industrial world to remain air-gapped and firmly in its M2M comfort zone.

Lastly, enterprises that can merge domain expertise, data science and machine learning will realize cost savings by stretching equipment maintenance cycles and avoiding downtime by predicting asset health. This represents the true value of IoT in business.

The Cloud is Dead, Long Live the Edge

fog

We interrupt your regularly scheduled migration to the cloud to bring you a much more important megatrend called the Internet of Things.

The Internet of Things demands a low-latency, distributed, peer-to-peer environment that can only be found in the fog layer via edge computing.

The Industrial Internet of Things is Like Football

Russell Wilson

The Industrial Internet of Things is a lot like football. Sensors relay data to devices like a center hikes the ball to a quarterback.

Devices send telemetry to IIoT platforms like a quarterback passes the ball to a receiver. IIoT platforms ingest data like a receiver catches a pass. I think you get the idea.

Is your company enjoying positive outcomes through the use of an Industrial Internet of Things platform?

Connect > Collect > Analyze > Act

12 Steps to Stop the Next IoT Attack in its Tracks

IoT Attack

The recent distributed denial-of-service (DDoS) IoT attack against DNS is a wake up call to how fragile the Internet can be.

The IoT attack against Domain Name Servers from a botnet of thousands of devices means it’s way past time to take IoT security seriously. The bad actors around the world who previously used PCs, servers and smartphones to carry out attacks have now set their sights on the growing tidal wave of IoT devices. It’s time for consumers and enterprises to protect themselves and others by locking down their devices, gateways and platforms. While staying secure is a never-ending journey, here’s a list of twelve actions you can take to get started:

  1. Change the default usernames and passwords on your IoT devices and edge gateways to something strong.
  2. Device telemetry connections must be outbound-only. Never listen for incoming commands or you’ll get hacked.
  3. Devices should support secure boot with cryptographically signed code by the manufacturer to ensure firmware is unaltered.
  4. Devices must have enough compute power and RAM to create a transport layer security (TLS) tunnel to secure data in transit.
  5. Use devices and edge gateways that include a Trusted Platform Module (TPM) chip to securely store keys, connection strings and passwords in hardware.
  6. IoT platforms must maintain a list of authorized devices, edge gateways, associated keys and expiration dates/times to authenticate each device.
  7. The telemetry ingestion component of IoT platforms must limit IP address ranges to just those used by managed devices and edge gateways.
  8. Since embedded IoT devices and edge gateways are only secure at a single point in time, IoT platforms must be able to remotely update their firmware to keep them secure.
  9. When telemetry arrives in an IoT platform, the queue, bus or storage where data comes to rest must be encrypted.
  10. Devices and edge gateways managed by an IoT platform must update/rotate their security access tokens prior to expiration.
  11. Field gateways in the fog layer must authenticate connected IoT devices, encrypt their data at rest and then authenticate with upstream IoT platforms.
  12. IoT platforms must authenticate each device sending telemetry and blacklist compromised devices to prevent attacks.

Keeping the various components that make up the IoT value chain secure requires constant vigilance. In addition to doing your part, it’s important to hold the vendors of the IoT devices, gateways and platforms accountable for delivering technology that’s secure today and in the future.

Rob Tiffany Named a Top 100 M2M Influencer

M2M Influencer

In Onalytica’s 2016 analysis and ranking of individuals and brands in the Machine to Machine space, Rob was ranked a top 100 M2M influencer.

For those of you who are unfamiliar with the term, Machine to Machine (M2M) refers to the direct communication between devices using a variety of communications channels, including wired and wireless. Many of you will think this is the same or similar to the Internet of Things and you wouldn’t necessarily be wrong. I started my career in the M2M space connecting unintelligent vending machines to primitive wireless networks to derive value from remotely monitoring them. Needless to say, a lot has changed since then.

Analytic M2M

 

 

 

 

 

 

 

In modern terms, traditional M2M is often expressed as the Industrial Internet of Things (IIoT) or Industrie 4.0. Imagine the value to be derived from connecting, analyzing and acting on data from industries such as healthcare, automotive, oil and gas, agriculture, government, smart cities, manufacturing, and public utilities. It’s an exciting space to be in and it’s rapidly transforming our world.

Check it out at http://www.onalytica.com/blog/posts/M2M-2016-Top-100-Influencers-Brands/

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Rob Tiffany Named Among Top 30 Technology Influencers in Major Report

Industry Analysts

I’m thrilled to be included in this group of technology influencers and luminaries like Werner Vogels, Steve Wozniak and Mark Russinovich.

To become one of those technology influencers, it’s taken a lot of years of hands-on experience building mobile, cloud and Internet of Things solutions combined with writing books, speaking at conferences around the world, blogging, tweeting and mentoring.

Top Technology Influencers

Check it out at: https://apollotarget.com/the-top-15-industry-analysts-usa/

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Digital Transformation Expert Interview

RobKevinDigital

Kevin Benedict from Cognizant’s Center for the Future of Work interviews Rob Tiffany on where Digital Transformation is taking the business world.

Kevin drills into the current unrealized upside with digital transformation efforts and Rob takes a deep dive on Machine Learning, the Cloud, Agile development, Mobile and the Internet of Things.

Learn more from Kevin at The Center for the Future of Work 

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany