SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
| |March 2015
1CIOReview
CIOREVIEW.COM
CIOReviewMaRCh 10 - 2015
T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s
WIRElEss tEChnOlOgy spECIal
Brian Day
CEO
Rock-Solid
Mobile App
Management
Platform
Apperian:
In My Opinion:
Hank Kafka,
VP-Access
Architecture &
Devices, AT&T
| |March 2015
45CIOReview
CXO Insight
“
In the next century,
Planet Earth will don
an electronic skin. It
will use the Internet
as a scaffold to
supportandtransmititssensations.
This skin is already being stitched
together. It consists of millions of
embedded electronic measuring
devices: thermostats, pressure
gauges, pollution detectors, cameras,
microphones, glucose sensors, EKGs,
electroencephalographs.
These will probe
and monitor
cities and
endangered
species, the
atmosphere,
our ships,
highways
and fleets
of trucks, our conversations, our bodies–even our dreams.”
-Neil Gross
Much-discussed and often-reported in 2014, the ‘Internet
of Things’ (IoT) reached the peak of Gartner Group’s ‘Hype
Cycle for Emerging Technologies’ and appears poised to
begin wide scale market adoption in 2015 and beyond. IDC
forecasted that the market for IoT would reach $7 trillion
by 2020, and estimates in this range were repeated by other
professional prognosticators. By the end of the year, many
companies had managed to fit (if nothing else) an IoT strategy
element into their press releases and annual statements.
The term IoT is itself a bit of a marketing label; in reality
it’s a combination of things: Big Data, Cyberphysical Systems,
Machine-to-Machine Computing, and Ubiquitous/Pervasive
Computing. These nuances didn’t stop IoT from being top of
the fold for anyone covering the 2015 Consumer Electronics
Show. No less than a dozen companies showcased their IoT-
savvy-ness with ‘IoT Pavilions’ and ‘Homes of the Future’,
showcasing everything from Internet-aware washing machines
to sensor-laden bicycles. Everywhere I looked, robots roamed,
coffee pots tweeted successful completion of their savory task,
and cars texted and were texted to. Presuming that standards
can be ratified and interfaces aligned, the dividing line between
our physical lives and digital presence will get a lot thinner and
in some cases disappear altogether.
While it might seem like the Internet of Things is new
and radical, it’s rooted in a set of ideas set forth in 1999 at
MIT by Kevin Ashton. Technology needed over a decade to
By David Witkowski, Founder & Principal Consultant, Oku Solutions
& President, Wireless Communications Alliance
David Witkowski
Enterprise IT
and the
“Internet
of Things”
| |March 2015
46CIOReview
catch up with his vision; it’s been the convergence of low-power
wireless standards like Bluetooth Low Energy, the availability
of efficient and inexpensive processing power (courtesy of
the seemingly relentless march of Moore’s Law), and sensor
technologies borrowed from mobile phones that
have combined to set the stage for IoT’s
emergence as a multi-trillion dollar market
opportunity.
Emergence of the Internet of Things is
following the patterns we saw in previous
technology evolutions. IoT is really just the
“Fourth Wave” of connected computing. In
the First Wave we had mainframe computers,
accessed by terminals and later connected by
early ancestors of the Internet. The Second Wave
gave us personal computers, initially standalone
then connected to servers by modems and
ultimately broadband links. Early mobile devices
(such as the PalmPilot) connected to PCs, and were
later unfettered from their cable leashes by mobile
data networks and evolved to become smartphones.
Today our IoT devices are connected to PCs or smartphones
via Bluetooth or proprietary standards – if I walk away from
my Android phone my Pebble watch will quickly let me know
something is amiss. It’s just a matter of time before the minions
of IoT throw off their smartphone shackles and begin seeking
connections directly to mobile data networks.
$7 trillion worth of IoT is a lot of devices, mostly consumer-
owned. By their nature IoT devices tend to be something that
people keep nearby at all times. Take off my FitBit to recharge
it and I risk falling short on the daily step competition I have
going with my wife and friends. So what happens when people
show up wearing or carrying several IoT devices, all of which are
clamoring for connectivity and access to the Internet?
There’s some precedent for this already, as we saw in recent
years when corporate IT shifted away from company-owned
mobile devices and began implementing Bring Your Own
Device (BYOD) systems and policies. Most of these systems
are controlled and secured by opt-in forms that require
company-provided credentials, or at least an email
and a click-signature acknowledgement of terms
of service. The use model of these systems
range from mostly reasonable to annoyingly
complex, and I can say that in my travels around
the Silicon Valley I never encounter a guest or
public broadband opt-in system that’s exactly like
another – each one is a unique work of security
artistry. Entering sign-in credentials for them on
a PC is fairly easy, on a tablet a challenge, on
a smartphone an exercise in frustration. Some
systems text you a code, others don’t. I’ll say
this; I don’t see myself tapping in network sign-in
credentials via the up-down-enter buttons on my
Pebble watch. If enterprise IT is going to support
IoT onboarding, we need a different approach.
An evolution of the use model set forth by the IEEE 802.11u
standard and Wi-Fi Certified Passpoint (formerly called Hotspot
2.0) may be the solution. Created by the Wi-Fi Alliance in 2012,
Wi-Fi CertifiedPasspoint™ was intended to be “an industry-wide
solution to streamline network access in hotspots and eliminate
the need for users to find and authenticate a network each time
they connect.” Rather than ask a person to sign-in to different
networks, devices enabled with Wi-Fi Certified Passpoint can be
verified from a database containing trusted devices. The same
use model could be applied to IoT devices, allowing enterprise IT
systems to bring customer’s or employee’s IoT devices onboard
without requiring action by the user.
Of course, the question of security in IoT needs to be
addressed. As of today, very little has been done to consider
the security risks created by IoT devices. For the most part IoT
devices are innocuous – they perform simple sensing or alerting
functions and exchange information between devices or between
a device and a user. In some cases (such as cyberphysical
systems) IoT devices can initiate real-world actions such as
moving a lever or knob. Most IoT systems have (at least in their
designed function) little potential to create danger for people or
systems. Do I really care if someone hacks my FitBit and learns
that I walked 11,818 steps yesterday? Probably not.Yet there
could be vulnerabilities we haven’t yet found, and these need to
be considered.
As the Internet of Things revolution takes hold and our IoT
devices become more and more integrated into our daily lives,
enterprise IT will have to determine how to respond. Corporate
IT, hospitality IT, public, and semi-public hotspots will all have
to content with this – it’s not a matter of if, but when this will
need to be addressed.
IoT devices are innocuous
they perform simple
sensing or alerting
functions and exchange
information between
devices or between a
device and a user

Contenu connexe

Tendances

inside IOT BCX 2015v3
inside IOT BCX 2015v3inside IOT BCX 2015v3
inside IOT BCX 2015v3
Andy Brauer
 

Tendances (20)

How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
How the Internet of Things will disrupt your industry (Avanade Inspire 2015)
 
Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010Design beyond the glowing rectangle - EuroIA2010
Design beyond the glowing rectangle - EuroIA2010
 
Applying design thinking to IoT
Applying design thinking to IoTApplying design thinking to IoT
Applying design thinking to IoT
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
inside IOT BCX 2015v3
inside IOT BCX 2015v3inside IOT BCX 2015v3
inside IOT BCX 2015v3
 
IoT Startup State of The Union
IoT Startup State of The Union  IoT Startup State of The Union
IoT Startup State of The Union
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017Top 10 Technology Trends to Watch Out for in 2017
Top 10 Technology Trends to Watch Out for in 2017
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
Implementing IOT - A Road Map
Implementing IOT - A Road MapImplementing IOT - A Road Map
Implementing IOT - A Road Map
 
CMMC - IoT
CMMC - IoTCMMC - IoT
CMMC - IoT
 
Is there such a thing as the internet of things !
Is there such a thing as the internet of things !Is there such a thing as the internet of things !
Is there such a thing as the internet of things !
 
trendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGStrendwatching.com's INTERNET OF CARING THINGS
trendwatching.com's INTERNET OF CARING THINGS
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
 

Similaire à Enterprise IT and the Internet of Things

02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
ssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
Janasudhan1
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
Michelle Singh
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 

Similaire à Enterprise IT and the Internet of Things (20)

What Is Internet of Things?
What Is Internet of Things?What Is Internet of Things?
What Is Internet of Things?
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
 
MTBiz November 2014
MTBiz November 2014MTBiz November 2014
MTBiz November 2014
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICS
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
A Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixA Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - Apptunix
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Enterprise IT and the Internet of Things

  • 1. | |March 2015 1CIOReview CIOREVIEW.COM CIOReviewMaRCh 10 - 2015 T h e N a v i g a t o r f o r E n t e r p r i s e S o l u t i o n s WIRElEss tEChnOlOgy spECIal Brian Day CEO Rock-Solid Mobile App Management Platform Apperian: In My Opinion: Hank Kafka, VP-Access Architecture & Devices, AT&T | |March 2015 45CIOReview CXO Insight “ In the next century, Planet Earth will don an electronic skin. It will use the Internet as a scaffold to supportandtransmititssensations. This skin is already being stitched together. It consists of millions of embedded electronic measuring devices: thermostats, pressure gauges, pollution detectors, cameras, microphones, glucose sensors, EKGs, electroencephalographs. These will probe and monitor cities and endangered species, the atmosphere, our ships, highways and fleets of trucks, our conversations, our bodies–even our dreams.” -Neil Gross Much-discussed and often-reported in 2014, the ‘Internet of Things’ (IoT) reached the peak of Gartner Group’s ‘Hype Cycle for Emerging Technologies’ and appears poised to begin wide scale market adoption in 2015 and beyond. IDC forecasted that the market for IoT would reach $7 trillion by 2020, and estimates in this range were repeated by other professional prognosticators. By the end of the year, many companies had managed to fit (if nothing else) an IoT strategy element into their press releases and annual statements. The term IoT is itself a bit of a marketing label; in reality it’s a combination of things: Big Data, Cyberphysical Systems, Machine-to-Machine Computing, and Ubiquitous/Pervasive Computing. These nuances didn’t stop IoT from being top of the fold for anyone covering the 2015 Consumer Electronics Show. No less than a dozen companies showcased their IoT- savvy-ness with ‘IoT Pavilions’ and ‘Homes of the Future’, showcasing everything from Internet-aware washing machines to sensor-laden bicycles. Everywhere I looked, robots roamed, coffee pots tweeted successful completion of their savory task, and cars texted and were texted to. Presuming that standards can be ratified and interfaces aligned, the dividing line between our physical lives and digital presence will get a lot thinner and in some cases disappear altogether. While it might seem like the Internet of Things is new and radical, it’s rooted in a set of ideas set forth in 1999 at MIT by Kevin Ashton. Technology needed over a decade to By David Witkowski, Founder & Principal Consultant, Oku Solutions & President, Wireless Communications Alliance David Witkowski Enterprise IT and the “Internet of Things” | |March 2015 46CIOReview catch up with his vision; it’s been the convergence of low-power wireless standards like Bluetooth Low Energy, the availability of efficient and inexpensive processing power (courtesy of the seemingly relentless march of Moore’s Law), and sensor technologies borrowed from mobile phones that have combined to set the stage for IoT’s emergence as a multi-trillion dollar market opportunity. Emergence of the Internet of Things is following the patterns we saw in previous technology evolutions. IoT is really just the “Fourth Wave” of connected computing. In the First Wave we had mainframe computers, accessed by terminals and later connected by early ancestors of the Internet. The Second Wave gave us personal computers, initially standalone then connected to servers by modems and ultimately broadband links. Early mobile devices (such as the PalmPilot) connected to PCs, and were later unfettered from their cable leashes by mobile data networks and evolved to become smartphones. Today our IoT devices are connected to PCs or smartphones via Bluetooth or proprietary standards – if I walk away from my Android phone my Pebble watch will quickly let me know something is amiss. It’s just a matter of time before the minions of IoT throw off their smartphone shackles and begin seeking connections directly to mobile data networks. $7 trillion worth of IoT is a lot of devices, mostly consumer- owned. By their nature IoT devices tend to be something that people keep nearby at all times. Take off my FitBit to recharge it and I risk falling short on the daily step competition I have going with my wife and friends. So what happens when people show up wearing or carrying several IoT devices, all of which are clamoring for connectivity and access to the Internet? There’s some precedent for this already, as we saw in recent years when corporate IT shifted away from company-owned mobile devices and began implementing Bring Your Own Device (BYOD) systems and policies. Most of these systems are controlled and secured by opt-in forms that require company-provided credentials, or at least an email and a click-signature acknowledgement of terms of service. The use model of these systems range from mostly reasonable to annoyingly complex, and I can say that in my travels around the Silicon Valley I never encounter a guest or public broadband opt-in system that’s exactly like another – each one is a unique work of security artistry. Entering sign-in credentials for them on a PC is fairly easy, on a tablet a challenge, on a smartphone an exercise in frustration. Some systems text you a code, others don’t. I’ll say this; I don’t see myself tapping in network sign-in credentials via the up-down-enter buttons on my Pebble watch. If enterprise IT is going to support IoT onboarding, we need a different approach. An evolution of the use model set forth by the IEEE 802.11u standard and Wi-Fi Certified Passpoint (formerly called Hotspot 2.0) may be the solution. Created by the Wi-Fi Alliance in 2012, Wi-Fi CertifiedPasspoint™ was intended to be “an industry-wide solution to streamline network access in hotspots and eliminate the need for users to find and authenticate a network each time they connect.” Rather than ask a person to sign-in to different networks, devices enabled with Wi-Fi Certified Passpoint can be verified from a database containing trusted devices. The same use model could be applied to IoT devices, allowing enterprise IT systems to bring customer’s or employee’s IoT devices onboard without requiring action by the user. Of course, the question of security in IoT needs to be addressed. As of today, very little has been done to consider the security risks created by IoT devices. For the most part IoT devices are innocuous – they perform simple sensing or alerting functions and exchange information between devices or between a device and a user. In some cases (such as cyberphysical systems) IoT devices can initiate real-world actions such as moving a lever or knob. Most IoT systems have (at least in their designed function) little potential to create danger for people or systems. Do I really care if someone hacks my FitBit and learns that I walked 11,818 steps yesterday? Probably not.Yet there could be vulnerabilities we haven’t yet found, and these need to be considered. As the Internet of Things revolution takes hold and our IoT devices become more and more integrated into our daily lives, enterprise IT will have to determine how to respond. Corporate IT, hospitality IT, public, and semi-public hotspots will all have to content with this – it’s not a matter of if, but when this will need to be addressed. IoT devices are innocuous they perform simple sensing or alerting functions and exchange information between devices or between a device and a user