Welcome!

Related Topics: SYS-CON MEDIA, Mobile IoT, @DXWorldExpo, @ThingsExpo

SYS-CON MEDIA: Article

IIoT Top News: CES 2016 and the Fate of IoT | @ThingsExpo #IoT #M2M

All eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week

All eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year's CES showcased plans to make the car a complete mobile office-with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones - not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn't need a private jet, just a ‘copter drone and a smart phone.

Now, as we watched all the products rolled out for their various purposes, it seems we have more connected things to add to an already expansive connected world. How will IoT connectivity technologies weather the storm as demand continues to skyrocket?

According to IDC Research, IoT is about to take center stage by globally growing from $656 billion in 2014 to $1.7 trillion by 2020. The buzzwords of 2016 and beyond, IoT and IIoT specifically, simply show we are moving to an "everything is connected" environment.

Naturally, once the luster of a shiny new thing wears off, we are tasked with the goal of protecting a critical piece of the IoT world - the data. Businesses need to make sure they are keeping information safe and secure. In this digital innovation age, plenty of industries (and therefore technologies) can't afford a hack or cybersecurity breach at any time, for fear of customer loss.  Companies need to trust their digital information infrastructure will be not only be safe, but also high-performing - or they could very well risk extinction altogether.

This week's IIoT top news post takes another look at the fate of IIoT, as many new "connected things" hit the market this year.

Hope you enjoy this week's recap, and as always, tell us what we missed!

Enterprise IoT Projects Will Be Costly, Lengthy and Vulnerable, Says Gartner (Computer Weekly)

Internet of things flat icons composition

As the IIoT continues to inhabit day-to-day life, it's not a surprise that, fifty percent of businesses will use some form of IoT systems by the year 2020. Gartner states that, "By 2020, addressing the black market and other compromises around IoT security will push overall security budgets up, with IoT costs expected to account for twenty percent of annual security budgets, compared with one percent in 2015."

Does Anyone Really Care About the Internet of Things? (Forbes)

Internet of Things image

In this latest article by Forbes, Todd Hixon claims the term IoT was coined 17 years ago and he is still waiting for the killer ultimate app to come out. Hixon further suggests that when it comes to IoT, "Most of the time people prefer to ignore security and focus on more immediate needs and wants."

CES 2016 Takeaways: IoT Could Be the Death of Your Security Network (Network World)

IoT Security Death

The real takeaway from CES 2016 is the overall lack of security for all these new IoT gadgets entering the market and how they fit into the IIoT ecosystem. Tom Henderson, from Network World believes the fate of IoT after CES is that "The damage, the damnation, the truculent total churl of the event was this: all of the new Internet of Thingies/IoT/KewlGear has no cohesive security strategy."

The Internet of Things: Hyped But Here to Stay (USA Today Tech)

IoT Hype

As the magnitude of connected things get ready for their clos-up, it would appear all the hype for IoT is here to stay. Edward Baig, with USA Today reports that, "You couldn't walk around CES this week without hearing about or bumping into products related in some way to IoT, the tech industry's inelegant way of describing all things connected."

What's Next for the Internet of Things? (TECHCO)

developmental-challenges-internet-of-things

Sensors, software, electronic devices and M2M have taken over our daily lives. So, what's next for IoT? Monoka Jha, with Tech.CO thinks the industry plan needs, "To use the Internet of Things optimally, we need to connect a device to different industries through varied media. For that to happen, the different industries need to have a common physical medium."

More Stories By Scott Allen

Scott is an executive leader with more than 25 years of experience in product lifecycle management, product marketing, business development, and technology deployment. He offers a unique blend of start-up aggressiveness and established company executive leadership, with expertise in product delivery, demand generation, and global market expansion. As CMO of FreeWave, Scott is responsible for product life cycle/management, GTM execution, demand generation, and brand creation/expansion strategies.

Prior to joining FreeWave, Scott held executive management positions at Fluke Networks (a Danaher Company), Network Associates (McAfee), and several start-ups including Mazu Networks and NEXVU Business Solutions. Scott earned his BA in Computer Information Systems from Weber University.

Latest Stories
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the tec...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...