@ThingsExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski

Related Topics: @ThingsExpo

@ThingsExpo: Blog Feed Post

An Optimal Path for the Internet of Things By @DaveGinsburg | @ThingsExpo #IoT

Is IoT only dribs and drabs of data across a cellular network, or is it more?

An Optimal Path for the Internet of Things
By Dave Ginsburg

To-date, we’ve deployed our technology for enterprise file sharing, backup and recovery, voice, ad serving, and financial services.  But what’s next?  If we look out a year or two, how does our solution intersect the Internet of Things?  Is IoT only dribs and drabs of data across a cellular network, or is it more?   The figure below from the GSMA segments IoT into three buckets, and provides some insight.

Fixed applications requiring low latency include both high bandwidth services such as surveillance, as well as lower bandwidth services such as the smart grid.  But it isn't just getting the data to-and-fro.  A central premise of IoT is being able to action the data in real-time, possibly through some evolution of IBM's Watson.   Within IoT, in most cases the remote device is not truly intelligent due to cost, power, or size.  The intelligence lies in the cloud, and the quicker the data from one or even a million devices can be ingested and analyzed, the quicker action may be taken.

An Optimal Path for the Internet of Things

In an electricity, natural gas, or water distribution network, a single sensor noticing an anomaly may not be enough, it may not have the context that something larger is at play. Distributed sensors in combination with cloud intelligence are quicker to react to any system-wide instability or may identify the source of a contaminant.   For the first time, closed-loop control that has existed in factories and power plants may now extend into the wide-area.  Alternatively, surveillance may transition from after-the-fact to actionable in real-time.  Local law-enforcement will have access to a live feed of a person or object identified as suspect.

Moving from the machine to the man, one could imagine a wristband monitoring a myriad of vital signs and chemistry.  These are all transmitted to the cloud, analyzed, and if out of equilibrium, help may be summoned or even action taken quicker than the individual could react on his or her own.

The use cases above all imply reach, unpredictability, access to resources most likely held within multiple cloud operators and data centers in real-time, and where necessary, interfaces to even more centralized expert systems.  It would be too costly and complex to attempt to provision a network for guaranteed performance, but what is possible is to leverage the cloud to offer optimal performacne at any point in time.  Throughput, latency, and loss may then be held within certain tolerances, permitting proper application behavior.   This is the goal of the Teridion Cloud Network.

Extending out from core IoT use cases, a second document from the GSMA does a great job of outlining 5G services, some of which may of course be handled by fixed networks as well.  Gaming, video, and virtual reality may all benefit from more assured delivery but due to reach don't lend themselves to pre-provisioned networks or content delivery networks.

Ultimately, any application can benefit from a network architecture that directs traffic onto the optimal path.


Read the original blog entry...

More Stories By Teridion Blog

Teridion is redefining content delivery by bringing a personalized Internet experience to businesses across the globe.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...