Top Challenges to Successful IoT Initiatives — And How to Overcome Them
In the past few years that I’ve spent in the IoT industry, helping to develop, deploy, and improve IoT solutions involving millions of sensors, I’ve learned that often the biggest hurdles to success aren’t technological. A Gartner study last year found that only 26 percent of surveyed companies were successful with their IoT initiatives. This is an abysmal statistic, but it doesn’t surprise me given the many I’ve personally seen—many of which are purely operational or organizational.
Although many issues associated with IoT deployments aren’t technological, they’re equally painful and difficult to overcome. And if every organization has to overcome these challenges in a void, a 74 percent failure rate is likely to continue. But here at Leverege, we believe in openly sharing the knowledge and insights that we’ve gained through our extensive experience, because it’s this open sharing of knowledge that will help us all to move forward together, collectively amplifying our human potential.
So in this series, I’ll be exploring the issues we’ve seen, with examples taken from our experiences, and how you can overcome similar challenges as you pursue your own IoT initiatives. Whether you’re a solutions provider building new solutions for clients, or you’re one of the organizations integrating IoT technologies into your current systems and processes, I hope this series of posts will equip you with knowledge and strategies that will help you to succeed.
If you’re relatively new to IoT and the various technologies and terminologies associated with it, I encourage you first to read the Intro to IoT eBook I wrote. This is a comprehensive (but simple!) introduction to and explanation of many important concepts that I’ll assume readers know as I explore various challenges.
I’ll save the in-depth exploration for future posts, but here are just a few of the topics to come:
You Need to Associate
We’re increasingly using sensors and devices to allow us to represent physical objects and their attributes digitally. For example, in asset tracking applications, you’ll likely have a tracker that’s attached to a given asset you’d like to track. The asset is the thing we want to track, but the tracker is the thing that’s capturing and sending data. Therefore, you need to know that this tracker is on this asset, which we call “association” or “pairing.”
For most asset tracking applications, someone needs to manually associate a tracker to a given asset, and when you introduce a manual step, there are bound to be problems. From labeling issues during manufacturing to operational issues like employees simply not associating trackers to the assets, I’ll share some of the challenges we’ve faced with IoT Association and how you can avoid or overcome them.
Little Changes Are Big Changes in IoT Initiatives
The Internet of Things is often called “a system of systems,” and with good reason: successful IoT initiatives usually involve a combination of hardware, software, and connectivity, which is then tied into business processes and operations. Because of the complexity and systemic codependence, a simple change in one part of the system—or subsystem—can effectively break the entire system of systems.
Let’s say that you want to make some changes to the firmware on your sensor/device to help reduce the battery drain, so you reduce the number of messages sent from the sensor/device per day. Great! You’ve just added on a few months of battery life!
But unbeknownst to you, your IoT system uses the number of messages from the sensors/devices to flag when a sensor/device may be defective. After making this change, you suddenly have countless sensors/devices being flagged by the system as defective, which at best hurts user confidence and at worst means that the system itself doesn’t work (e.g. if defective sensors/devices are automatically prevented from being used).
In the past few years that I’ve spent in the IoT industry, helping to develop, deploy, and improve IoT solutions involving millions of sensors, I’ve learned that often the biggest hurdles to success aren’t technological. A Gartner study last year found that only 26 percent of surveyed companies were successful with their IoT initiatives. This is an abysmal statistic, but it doesn’t surprise me given the many I’ve personally seen—many of which are purely operational or organizational.
Although many issues associated with IoT deployments aren’t technological, they’re equally painful and difficult to overcome. And if every organization has to overcome these challenges in a void, a 74 percent failure rate is likely to continue. But here at Leverege, we believe in openly sharing the knowledge and insights that we’ve gained through our extensive experience, because it’s this open sharing of knowledge that will help us all to move forward together, collectively amplifying our human potential.
So in this series, I’ll be exploring the issues we’ve seen, with examples taken from our experiences, and how you can overcome similar challenges as you pursue your own IoT initiatives. Whether you’re a solutions provider building new solutions for clients, or you’re one of the organizations integrating IoT technologies into your current systems and processes, I hope this series of posts will equip you with knowledge and strategies that will help you to succeed.
If you’re relatively new to IoT and the various technologies and terminologies associated with it, I encourage you first to read the Intro to IoT eBook I wrote. This is a comprehensive (but simple!) introduction to and explanation of many important concepts that I’ll assume readers know as I explore various challenges.
I’ll save the in-depth exploration for future posts, but here are just a few of the topics to come:
You Need to Associate
We’re increasingly using sensors and devices to allow us to represent physical objects and their attributes digitally. For example, in asset tracking applications, you’ll likely have a tracker that’s attached to a given asset you’d like to track. The asset is the thing we want to track, but the tracker is the thing that’s capturing and sending data. Therefore, you need to know that this tracker is on this asset, which we call “association” or “pairing.”
For most asset tracking applications, someone needs to manually associate a tracker to a given asset, and when you introduce a manual step, there are bound to be problems. From labeling issues during manufacturing to operational issues like employees simply not associating trackers to the assets, I’ll share some of the challenges we’ve faced with IoT Association and how you can avoid or overcome them.
Little Changes Are Big Changes in IoT Initiatives
The Internet of Things is often called “a system of systems,” and with good reason: successful IoT initiatives usually involve a combination of hardware, software, and connectivity, which is then tied into business processes and operations. Because of the complexity and systemic codependence, a simple change in one part of the system—or subsystem—can effectively break the entire system of systems.
Let’s say that you want to make some changes to the firmware on your sensor/device to help reduce the battery drain, so you reduce the number of messages sent from the sensor/device per day. Great! You’ve just added on a few months of battery life!
But unbeknownst to you, your IoT system uses the number of messages from the sensors/devices to flag when a sensor/device may be defective. After making this change, you suddenly have countless sensors/devices being flagged by the system as defective, which at best hurts user confidence and at worst means that the system itself doesn’t work (e.g. if defective sensors/devices are automatically prevented from being used).
Although this challenge effectively boils down to good communication, this can be difficult within a single organization—let alone across the multiple organizations and partnerships that IoT initiatives often require to be successful. In this future post, I’ll share some examples to demonstrate how seriously you should take even the little changes. I’ll also offer some strategies for effectively communicating and managing these changes
#personalblog
How will change experience in online shopping?
In my channel, you can check my first pitch deck and what goals I want to implement in reality
https://t.me/zelinskiyblog
How will change experience in online shopping?
In my channel, you can check my first pitch deck and what goals I want to implement in reality
https://t.me/zelinskiyblog
Forwarded from Каталог каналов | HAN Media
Catalog channels from the largest media network in the Telegram - @catalog_channels
Where're you from?
Anonymous Poll
54%
India
6%
Ukraine, Russia, Belarus
1%
China
1%
Iran
4%
Brazil
2%
Turkey
32%
Other countries
Top Hacks and Cybersecurity Breaches of 2018
Aadhar
The Aadhar data breach affected 1.1 billion people. The Indian government’s ID database keeps a record of the citizen’s identity and biometric info. The database suffered a major leak in which the private information of Indian residents, including their names, bank account information, and ID numbers, was stolen. The data leak surfaced on a system run by the utility company Indane. The company hadn’t secured their API.
The exact date of the data breach could not be determined, but the breach was discovered in March of 2018.
Marriott Starwood Hotels
500 million people suffered at the hands of this data breach. The guest information included email addresses, passport numbers, reservation dates and phone numbers along with payment card numbers and their expiration dates. The hackers were able to gain access to the reservation database of Marriott Starwood Hotels. After that, they copied and stole all the information. This all started in 2014 but the breach wasn’t discovered until September 2018.
Exactis
The Exactis data breach affected 340 million people. The company compiles data on millions of people and businesses, and the data includes everything from their personal information, phone numbers, and addresses to interests and specific characteristics.
The data breach occurred in June 2018 and was discovered when a security expert came across a publicly accessible database that had almost every US citizen in it. It still remains vague whether any hacker was able to access that information or not.
Quora
The account information of 100 million people was compromised. It included names, emails addresses and encrypted passwords, users’ public questions and answers, and the data from the accounts linked to Quora. The data breach was carried out by a malicious third-party that accessed one of Quora’s systems. It was discovered in November 2018.
MyHeritage
92 million people were affected from this data breach in which email addresses, along with encrypted passwords of the signed-up users, were stolen and put on a private server outside the company. The data breach occurred in October 2017.
Cambridge Analytica
87 million people suffered because of the Cambridge Analytica data leak in which Facebook profiles and other data that assists in identifying users’ interests and preferences were stolen. The breach occurred in 2015.
Here is what happened: A professor from the University of Cambridge developed a personality prediction app called thisisyourdigitallife. The app passed user information to third parties, including Cambridge Analytica. This is the same firm that helped the presidential campaign of Donald Trump via targeted ads creation while using the voter data of millions of people.
Although only 270,000 Facebook users installed the app on their phones, because of the former data-sharing policies of Facebook, the app was able to collect data on millions of their friends as well.
Google
The Google data breach affected 52.5 million users, leaking the private information on their Google+ profiles, including their name, email address, date of birth, age, relationship status, employer and job title. The breach occurred from 2015 till March 2018 and then from November 7 to 13.
At the beginning of the year, Google made it public that it would shut down Google+ after a report from Wall Street Journal surfaced exposing a software glitch that led Google to reveal the personal profile data of 500,000 Google+ users. Later, in December, Google again announced that it had suffered another data breach that affected 52.5 million users. Google has now decided to shut down Google+ permanently in April 2019.
Aadhar
The Aadhar data breach affected 1.1 billion people. The Indian government’s ID database keeps a record of the citizen’s identity and biometric info. The database suffered a major leak in which the private information of Indian residents, including their names, bank account information, and ID numbers, was stolen. The data leak surfaced on a system run by the utility company Indane. The company hadn’t secured their API.
The exact date of the data breach could not be determined, but the breach was discovered in March of 2018.
Marriott Starwood Hotels
500 million people suffered at the hands of this data breach. The guest information included email addresses, passport numbers, reservation dates and phone numbers along with payment card numbers and their expiration dates. The hackers were able to gain access to the reservation database of Marriott Starwood Hotels. After that, they copied and stole all the information. This all started in 2014 but the breach wasn’t discovered until September 2018.
Exactis
The Exactis data breach affected 340 million people. The company compiles data on millions of people and businesses, and the data includes everything from their personal information, phone numbers, and addresses to interests and specific characteristics.
The data breach occurred in June 2018 and was discovered when a security expert came across a publicly accessible database that had almost every US citizen in it. It still remains vague whether any hacker was able to access that information or not.
Quora
The account information of 100 million people was compromised. It included names, emails addresses and encrypted passwords, users’ public questions and answers, and the data from the accounts linked to Quora. The data breach was carried out by a malicious third-party that accessed one of Quora’s systems. It was discovered in November 2018.
MyHeritage
92 million people were affected from this data breach in which email addresses, along with encrypted passwords of the signed-up users, were stolen and put on a private server outside the company. The data breach occurred in October 2017.
Cambridge Analytica
87 million people suffered because of the Cambridge Analytica data leak in which Facebook profiles and other data that assists in identifying users’ interests and preferences were stolen. The breach occurred in 2015.
Here is what happened: A professor from the University of Cambridge developed a personality prediction app called thisisyourdigitallife. The app passed user information to third parties, including Cambridge Analytica. This is the same firm that helped the presidential campaign of Donald Trump via targeted ads creation while using the voter data of millions of people.
Although only 270,000 Facebook users installed the app on their phones, because of the former data-sharing policies of Facebook, the app was able to collect data on millions of their friends as well.
The Google data breach affected 52.5 million users, leaking the private information on their Google+ profiles, including their name, email address, date of birth, age, relationship status, employer and job title. The breach occurred from 2015 till March 2018 and then from November 7 to 13.
At the beginning of the year, Google made it public that it would shut down Google+ after a report from Wall Street Journal surfaced exposing a software glitch that led Google to reveal the personal profile data of 500,000 Google+ users. Later, in December, Google again announced that it had suffered another data breach that affected 52.5 million users. Google has now decided to shut down Google+ permanently in April 2019.
Plug & Play Best Practices for Wireless IoT Deployments
Few IoT solutions are truly plug-and-play.
Many IoT deployments are technically difficult and error-prone. Apple provides us with a blueprint for creating truly plug-and-play platforms. IoT developers and service providers should design their solutions according to Apple's methodology.
Full article: https://teletype.in/@vasylzelinskiy/SJryen_NN
Few IoT solutions are truly plug-and-play.
Many IoT deployments are technically difficult and error-prone. Apple provides us with a blueprint for creating truly plug-and-play platforms. IoT developers and service providers should design their solutions according to Apple's methodology.
Full article: https://teletype.in/@vasylzelinskiy/SJryen_NN
Putting AI to Work in Healthcare: Turning Data into Action
There’s no shortage of statistics, surveys and industry hype that have espoused the benefits of artificial intelligence (AI) within healthcare. AI already plays a significant role in our daily lives. Healthcare may be one of the spaces in which AI can most impact our daily existence. Nonetheless, we're only just beginning to scratch the surface of what AI could do for healthcare services.
Full article: https://teletype.in/@vasylzelinskiy/HkCO3DtVV
There’s no shortage of statistics, surveys and industry hype that have espoused the benefits of artificial intelligence (AI) within healthcare. AI already plays a significant role in our daily lives. Healthcare may be one of the spaces in which AI can most impact our daily existence. Nonetheless, we're only just beginning to scratch the surface of what AI could do for healthcare services.
Full article: https://teletype.in/@vasylzelinskiy/HkCO3DtVV
Machine Learning Applications in the Internet of Things
There's a lot of hype and buzz around machine learning and IoT. Here are some machine learning applications in IoT that are actually out in the world today.
Full article: https://teletype.in/@vasylzelinskiy/H1g3pvYVV
There's a lot of hype and buzz around machine learning and IoT. Here are some machine learning applications in IoT that are actually out in the world today.
Full article: https://teletype.in/@vasylzelinskiy/H1g3pvYVV
8 Reasons Why You Need To Embrace IIoT
IIoT refers to an industrial connectivity system connecting all elements of the sector (machines, people, buildings, etc.) to create a totally new paradigm. Now is a better time than ever to leverage IIoT solutions.
Full article: https://teletype.in/@vasylzelinskiy/r1mdLvjNN
IIoT refers to an industrial connectivity system connecting all elements of the sector (machines, people, buildings, etc.) to create a totally new paradigm. Now is a better time than ever to leverage IIoT solutions.
Full article: https://teletype.in/@vasylzelinskiy/r1mdLvjNN