Internet Of Things (IoT) and IT Service Management

13 downloads 0 Views 3MB Size Report
Mobility and summary diagram . ..... firefighting and become a proactive part of the organisation. .... and acceptable use documents to outline what is best ...
Internet of Things

IT Service Management

Internet Of Things (IoT) and IT Service Management What should you do? Author | Hassan Ahmad Date |December 2015

As organisations are faced with a constant threat of a new technological phenomenon in our case the Internet of Things (IoT), it is only natural that you would look to research how to cope with it. Even better than coping is to embrace and manage the change to use it to your competitive advantage. The IoT could be an extremely powerful tool in enhancing not only your internal business functions and services, but also better understanding your customer environment and their needs. The key element will be how to harness this in order to manipulate it to your business and gain the most out of it.

1|Page

Contents Executive summary ................................................................................................................................. 3 Audience ................................................................................................................................................. 3 Introduction ............................................................................................................................................ 3 What is IoT? ............................................................................................................................................ 4 A brief history.......................................................................................................................................... 5 Where are we today and the Future?..................................................................................................... 6 Enterprise IoT challenges ........................................................................................................................ 8 Challenge 1 – Central IT’s/Service Desks role (IT) in IoT.................................................................... 9 Challenge 2 – Business unit Silos & non-IT service domains .............................................................. 11 Challenge 3 – Dealing with IT mega trends ........................................................................................ 13 Big Data ......................................................................................................................................... 13 Security, privacy and cloud ........................................................................................................... 14 Mobility and summary diagram .................................................................................................... 15 Business model and adoption of IoT..................................................................................................... 17 Case studies .......................................................................................................................................... 19 Case Study 1: Government Smart City project in Hong Kong ....................................................... 19 Case Study 2: Real Time Location System [RTLS] (Stanley Black and Decker) in Mexico. ........... 21 SWOT Analysis....................................................................................................................................... 22 Conclusion ............................................................................................................................................. 22 References ............................................................................................................................................ 23

2|Page

Executive summary Organisations need to be ready for the Internet of Things (IoT) in order to make the most of existing services. Most importantly, what new services they could potentially provide to their customers. To do this we need know what IoT is and how it has evolved into where we are today. Vital points include central IT and the services

Introduction

desk role in businesses today. In many cases

This white paper will talk about the Internet

business unit silos and non IT service

of Things (IoT) in the context of IT Service

domains fail to make collaborative use of IT.

Management. It will identify key talking

Whilst thinking about what technologies to

points as well as challenges that enterprises

use for which service, we are also having to

could face with this new phenomenon. It

cope with mega trends such as security,

will present possible solutions to combat

cloud, mobility and big data. With all this in

certain challenges identified.

mind your business model needs to be lean

IoT has no defined structure or definition.

and agile to cope with a range of

This paper will look to try and make the

environmental factors.

concept more familiar. Whilst also trying to

Audience This paper is aimed at IT professionals ranging, from administrators to CIOs. Anyone who would like to know more about how IoT will affect enterprises. In essence those with ranging responsibilities from dayto-day running, all the way up to making those business-critical strategic decisions.

3|Page

give it an identity by looking at characteristics of what makes up IoT.

What is IoT? In the technological centric world we

normal, now is abnormal). Therefore it would be a good idea to take things back to basics. Let’s start by looking at its raw form, the

live in today we are always facing

name would be a good place.

new innovations. One step further we can go as far as to call them phenomena’s, purely for the sheer level of advancement. From the evolution of the internet to new ways of computing such as cloud computing which opposes the traditional siloed approach of compute. Now

The examples mentioned above all use the internet to connect in some form and what are they connecting? They are connecting all sorts of devices, these are all objects or 'Things'.

we are facing this new buzzword called the

These 'Things' are designed for a specific

Internet of Things (IoT).

function or purpose e.g. the HexoSkin Smart Shirt provides a professional athlete with detailed biometric data like breathing rate and

You may or may not have heard of this but

heart rate variability whilst training.

these “Things” are already out there today. Let’s look at a few examples of consumer led products that exist today to put things into

IoT describes an ecosystem or a network of

context: Smart watches (Apple watch),

multiple objects from the physical and virtual

activity/fitness trackers (FitBit), headphones

world with social/technical groups connecting

(Beats Studio Wireless), virtual reality

through wireless/wired means. Creating a

(Oculus Rift), smart clothing (HexoSkin

sophisticated network to make the world we

Smart Shirt), e-printers and switches etc.

live in a simpler more informative world.

For those who have heard of the term IoT, it has almost been so overused in conversation that it has become a cliché; even before its time. Like the IT term “New Normal” which is also being thrown around without proper context (something that was previously

4|Page

A brief history A term associated with IoT is

(Ubiquitous) without us as people not even being aware of its presence. All this is very thought provoking…

something called Ubiquitous Computing. In 1991 Xerox scientist Mark Weiser published The Computer in the 21st Century. He has this to say on describing his vision: Now over the years there have been many significant developments in technology and “Specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence”.

Ashton also identified the following characteristics: knows everything there is, needs no help, able to gather data, selfhealing and autonomic; you could almost imply that this in fact is a living organism like a human being. This is great but there are still many questions that must be asked of this: how do you connect everything in this world? What kind of devices will power this complex network? What energy would be needed and would it be sustainable? Even all those years ago there were people who envisaged such a reality in years to come. The idea that all this compute (with microprocessors), existing everywhere 5|Page

innovations over the years. Some key events have been picked out and put into a timeline to visually represent the evolution of IoT.

Where are we today and the Future? We are in an age where we no longer

improved operational efficiency, data & statistics to help informed business decision making, increase customer satisfaction through strategic data analysis etc. It will

need a laptop or desktop computer to

transform every industry including oil, gas,

perform complex tasks we would

healthcare, education, transportation and

have needed to 5 years ago.

enterprises. One concept that is in

Most of us own a Smartphone which now is a very powerful computer in itself. Our attachment to technologies such as mobile phones has become so dependant that there is even a phobia called Nomophobia (the fear of being out of mobile phone contact).

development is the idea of something called a Smart City (see case study section of this paper). This makes use of sensors with the vision to enhance performance and quality of urban services such as healthcare, transportation, and parking. E.g. your car telling you how far the next available parking

You may be thinking how does it affect me

space is. See the infographic below on some

and my business? What are the implications

more future developments.

of IoT? How can we embrace it and not be eaten up by what could be potentially a business black hole?

Think how far we have come looking back at the timeline above. IoT has naturally evolved from the internet: with IP (Internet Protocol) giving us ubiquitous connectivity, the WWW (World Wide Web) providing ubiquitous access to content and the cloud supplying

One of the main aspects is the devices

ubiquitous access to services.

element of IoT. As company employees,

When speaking to Ian Brooks (European

customers, supplier etc connect multiple

Head of Innovation for Hewlett Packard

devices with embedded sensors, this creates a

Enterprise [HPE]) he had this to say on the

very complex and dynamic network. The

next step:

newly connected devices which would most likely produce new types of data would really test and strain your companies systems. This is not such a bad thing as it opens a whole host of opportunities. Opportunities for: 6|Page

The next step is the “Internet of Things” which will provide ubiquitous access to sensing, understanding the real world and the having potential to change it.

By 2020, it’s estimated that 90% of cars will be connected to the Internet as compared to 10% in 2012

By 2019, companies will ship 1.9 billion connected home devices, bringing in

about $490 billion in revenue

7|Page

Most IoT smart devices aren't in your home or phone; they are in factories, businesses and health care. By 2025, the total global worth of IoT technology could be as much as $6.2 trillion

As of 2008 there were officially more devices than people

Enterprise IoT challenges We hear so much about what Consumer IoT is, what about Enterprise IoT (EIoT)?

Take a look at the bar chart on predicted spend of investment in IoT solutions by industries, year on year.

Previously we have used examples of what you would call Consumer IoT. Concepts and devices aimed at the consumer market that in turn creates this intricate network of “Things”. That is not to say we need to make a clear distinction between CIoT and EIoT. In essence they both interlink. For example the wide adoption and popularity in apps most commonly on android and Apples IOS. Organisations know to increase revenue streams, accessibility and serviceability, consumers require a dynamic and userfriendly method of consuming services. Both are stakeholders in the app and require different needs from it. Difference being enterprises have the capital, depth and breadth to purchase IoT devices and IoT service enablers on a large scale.

There is set to be a predicted huge $23.3 billion IoT devices connected by 2019, 40% ($9.1 billion) of which the enterprise market will account for. Interestingly IoT software and services sales will reach $43.9 billion in

EIoT will affect all industries and this is why

comparison to IoT hardware sales which will

it is critical to be proactive in evolving your

account for $2.3 billion in revenue. Service

business… rather than being hindered by a

providers, service suppliers and other key

“disruption”. In the business model section

stakeholders alike should be jumping out of

of this paper, we will take a brief look at the

their seats with the idea of this mouth-

.com boom and businesses who failed to

watering notion and investment opportunity.

innovate; ultimately paying the biggest price of business closure.

Let take a deeper look into 3 key challenges EIoT will face internally as well as externally.

8|Page

Challenge 1 – Central IT’s/Service Desks role (IT) in IoT

According to Gartner, an average of 73% of

IT is viewed as no more than cost center or

central IT, the other 27% is Shadow IT

sink, how will we ever accomplish Business and IT alignment? One of the important issues in IT service management is that it is not being taken seriously. This is resulting in budgets being cut and re-distributed to other Business Units (BUs).

enterprise technology spend is controlled by

The IoT however can play an integral role for the service desk. Today organisations have an IT estate which is already complexly connected. Think about the printer services, laptops, smart phones, routers, switches. All these devices are carefully monitored using various

If we cannot get IT and business to align

management tools to administer and

how will we ever even think of adopting a

troubleshoot the IT infrastructure.

concept like IoT. IoT is still an immature concept and is a bleeding edge technology which has been adopted by a select few. See the case study sections on some examples.

With the added value of IoT we could have more devices with embedded sensors. IoT devices are self-healing, autonomic and have human-like characteristics. We can reduce

With that being said with the lack of use

the amount of time IT staff are running

cases, how can a CEO justify an investment

around the data centre and start to innovate.

without a proven Return On Investment

HP identified that we spend approximately

(ROI)?

80% of the time in the data centre and 20%

A common concept being identified is the term “Stealth IT”. The idea that other BUs within an organisation have surpassed central IT by consuming other technologies

actually innovating and helping our business move forward. The service desk could stop firefighting and become a proactive part of the organisation.

from outside the realm of IT, without proper

How you might ask. With the data that is

approval (Shadow IT). This causes a

generated, predictive analysis methods could

complete chaotic network of unknown

be used to discover new patterns/trends and,

devices etc which is a key issue when

even better, spot anomalies that could be a

performing asset management.

threat or an opportunity. Of course this would put a strain on the IT storage assets that are having to process all this data and

9|Page

capacity management would have to be

The diagram below is a model on how you

carefully monitored here.

can achieve this equilibrium between IT and

The idea is that IT becomes the centre of

the Business.

excellence due to the fact that they have the

By having both strategies align, this enables

IT predictive analysis tools to supply senior

your business to go forward and be the first

executives with data, which can be used to

to spot new innovations and gaps in the

make much more informative business

market.

decisions.

10 | P a g e

Challenge 2 – Business unit Silos & non-IT service domains

all these complex workflows and processes

Even if Business and IT are aligned, how

interactions that need to happen on a daily

do we deal with other business units and

basis.

especially the ones who do not use IT?

These BUs can be identified as a service

Within an organisations there are many

domain which means that each BU provides

business processes other than the core

internal services to each other even though

customer-facing ones, such as HR, Finance,

they may not necessarily think it. e.g.

Admin, legal and facilities. These BUs

marketing may not think they provide a

support the core processes and form part of

service to sales but in essence they are both

the value chain even if they are not directly

supplying and consuming from each other.

in the supply chain.

One way of tackling these issues discussed is

Many tasks in various BUs are automated by

something called Enterprise Service

IT but it is in fact the processes that tie these

Management (ESM). This is the application

tasks together to create the “value” that is

of applying a service-orientated business

handled manually. This increase can result in

model for how your organisation works

wastage, costs increasing, requests being lost

internally; this is a company-wide strategy.

or worse dropped.

By adopting this you can reduce overheads,

For IoT to be fully utilised, it is imperative

increase predictability by making sure things

to have all the cogs (BUs) in sync and

are delivered on time (with quality) and

working in convergence with one another.

simplifying processes for end users

you can start to identify the multiple

(customer satisfaction). But you may ask the question what do I actually get? You make use of one system that will converge all the different web portal and help desks. This could significantly drive productivity because of the simplification of having to deal without Everyday workers need help from people in other departments or rely on other people in the value chain to perform their tasks. With

11 | P a g e

multiple interfaces and knowing where to go.

For the service desk from an IoT perspective this is the perfect world. Having smartified devices that are self-healing and visible to IT mean they can be aware of an issue before it manifests. They are also bringing all BUs under one IT domain, shifting from reactive

On top of using ESM the IT department can work on end user engagement namely with the various BU’s. Customer satisfaction is key to building credibility with business executives.

firefighting model to a managed proactive one.

One way to do this is to have mini sub-teams sit within the BUs and live among them to

Effectively looking at a holistic view of what people want in an organisation they want the same thing: get support and information from other departments quickly and easily, to know the status of when it will arrive, able to escalate or know an alternative way to obtain it and able to complete requests from other BUs efficiently and effectively. Different groups of people may want to use this information in different ways but the principle remains the same.

12 | P a g e

identify key problems and be able to troubleshoot efficiently and quickly. A major benefit is building the well needed rapport with the BUs that often IT are criticised for lacking. With a network of “Things” working in conjunction with sub-teams organisations can expect to see the breakdown of business and IT silos. See the diagram below to put things into a visual context.

Challenge 3 – Dealing with IT mega trends

of systems/processors) natured data coming

So we may have a state where our

there are, the higher the chance your data

Business and IT functions are not only

will perpetuate and soar off the charts; also

aligned but we have convergence and

data storage becomes a problem. See the

collaboration throughout. What about the

security section on hybrid cloud model to

external mega trends affecting EIoT?

cope with a storage issue.

from all types of devices. The more devices

The industry has identified that there are around 4 key mega trends. These being the

So we use something called Data Analytics;

explosion of Big Data, the service-orientated

which is what the term suggests… analysing

cloud, the convenience of mobility and

data. This helps you harness the sheer

hopefully wrapped round in tight security.

variety and velocity of how data is

All 4 overlap, interact and are cohesive.

accumulated.

Big Data IoT devices or products (Things) that contain embedded sensors and actuators (a mechanism i.e a motor that puts something into automation by controlling or moving it by a source of energy e.g. wind energy) can create a huge amount of raw data. Devices such as wearables may already have embedded analytics in a real time fashion, so Now having the data is all well and good

you can make informed decision there and

until you think what does this data actually

then. For example Samsungs app, S Health,

mean? Am I gaining any value or benefit

allows you to monitor how many steps you

from storing this data? This is already a

have taken over what period of time,

problem that enterprises are facing.

measure heart rate, stress levels and oxygen saturation. This could help organisations monitor the health of their employees and be

Introduce IoT in the mix and you are now dealing with a heterogeneous (multiple types 13 | P a g e

proactive in spotting correlations.

policies in conjunction and compliance with An in-demand necessity is something called Data Mining which is the process of analysing large data sets in order to spot patterns, trends and anomalies to make better informed decisions. As we have discussed

legislation. For example the NHS are obliged to keep patient records for approximately 7 years. You could have a policy that deletes these records from the archives to save on storage space.

data can come from all manners of devices which gives the opportunity to collect data such as: vibrations, temperatures, locations,

Security, privacy and cloud The exponential increase of devices

competitor strategy, and cognitive customer

connected in an IoT networks poses both

and employee statistics.

security and privacy risks. Think about if you have a life support machine for

Data Aggregation is another point to consider, the fact you can summarise data to perform statistical analysis. For example your data might tell you that your customer

example. The possibility of someone trying to hack into it and turn it off; forget about the financial impact of credit card fraud we could be talking about life and death!

aged 21 is interested in a particular product. Every time that user logs on you can

With the ever-growing list of devices, the

advertise those products to that specific

network boundary expands so does the

target audience rather than mass marketing.

opportunity for risk increases. You want to protect your network but all you think about is the cost of doing so, however it is imperative. In 2015 Talk Talk were hacked and many user accounts were leaked into the open, resulting in an estimated cost £35m which could mean bankruptcy. So spending the capital could mean huge savings and give you the ROI you deserve.

Along with using analytics software you can

With the ability of a cloud you can mix and

govern the data being produced through data

match what is on-premise and off-premise,

14 | P a g e

with a combination of both public and private cloud solutions; known as a Hybrid Cloud Model. For example you may own a sophisticated infrastructure which you have invested heavily in, you can consume various security applications with the approach of using Software as a Service (SaaS).

Internal staff will also need guides, policies and acceptable use documents to outline what is best practice. Training sessions and days should be held to understand who (identity management) is accessing the data from where and on what.

The great thing about using the cloud is that you have the opportunity of the elasticity and freedom of expanding your capacity; with your chosen Cloud vendor or vendors.

Researchers have identified that trust is a key issue. In terms of users reluctance to use something that is not defined and “unknown”.

Therefore to combat this something called Trust Management is needed to take people’s perceptions of uncertainty and help overcome them. It also engages in user acceptance and the consumption of IoT services and apps. It is a technical area which requires training on techniques such How do we potentially solve this?

as Cryptography and making use of devices

Protecting at the app level would be the

such as RFID tags. Don’t forget IT vendors

logical answer, because no matter what

can offer expertise on complex areas such as

devices connect, if you have encryption

trust management… don’t be afraid to ask.

software etc which is policy based then your users are protected.

Mobility and summary diagram Our consumer lives are having a huge impact on our expectation of IT in the workplace. As the years have passed we are 15 | P a g e

increasing in IT self-sufficiency. This is

How does IT department deal when an

putting a massive strain on IT as it is

employee loses their device? How can you

struggling to keep up.

guarantee the corporate data that is on these

You may have heard of something called a Bring Your Own Device (BYOD) policy which is a growing trend, where employees

personal devices is not being misused? How do you train staff to accommodate and support such a wide variety of technologies?

choose what device they want to use for

IoT from a holistic view point seems to fit in

work purposes. Now this strategy increases

with this strategy. You are dealing with

employee satisfaction and productivity as

multiple devices that you cannot necessarily

they are comfortable with the device they are

identify (Identity Management issue) or

using. It reduces costs for the business in

control. IoT may secure at an app level not

terms of hardware spend/software licensing

at a device level. You could have a corporate

spend/device maintenance.

app where the information stored is not

However it doesn’t come without pressing

stored locally but on a server. Having a

concerns and risks, security being one of the major ones.

BYOD starter kit, for example, which installs anti-malware, encryption and remote wipe could be a possibility. In summary see the below diagram.

16 | P a g e

Business model and adoption of IoT How do we actually adapt our

Now there were many companies who did not evolve with getting their business online. Ultimately some of them pay the price of liquidation. Notable ones were companies

business to enable the use of

like Kodak in digital printing and

something like IoT?

Woolworth missing out on online retail. See

At the start of the paper we talked about how

the mind map below to have a look at some

you need to evolve your business, especially

more.

in the dynamic world of IT. One of the

When talking to Ian Brooks (HPE) on

biggest technology evolution was the .Com

business models and achieving value in IoT

boom pre 2000.

he had this to say:

This (IoT) involves changes in technology, but equally, changes in process and culture. In order for them (businesses) to respond rapidly to what they learn and capitalize on the opportunity (gain value).

17 | P a g e

A Business model is the plan in which the

Partners or suppliers is another vital

company operates in order to generate

component for successful IoT

revenue and make a profit; it can include

implementation, in particular: Software and

expenses, revenues, components (see

app developers, launching customers,

diagram below in relation to components

hardware partners and data analysis partners.

needed to enable IoT) and functions of the business. Business models are needed to create value and of course provide a return on investment from the prospective investor.

Using partners and growing your business network, especially involving software and technology, are susceptible to being outsourced which could be due to the issue

Value is more than just thinking about the

of the high cost involved and also

initial outlay costs or even ongoing. The

availability of resources; capacity

value comes from the data being generated

management issues.

by IoT devices and also the ability to analyse this data. The value of the service is what it will enable your customer to do, one of the most important being to make informative decisions based on reliable real-time data.

Another key point is supplier management which would be vital in maintaining and sustaining what could be a very complex network. Service Level Agreements (SLA) would be vital, laying out and managing expectations on what both the supplier and customer can expect from the respective service.

18 | P a g e

Case studies With few organisation adopting IoT, how have the ones that have been adopted, faired?

Here are some of the key challenges:  Strain on housing stock and transportation due to dense population.

We will take a look at 2 case studies: the implementation of a Real-Time Location System (Stanley Black and Decker) and also Smart Cities (Project in Hong Kong).

Case Study 1: Government Smart City project in Hong Kong We briefly talked about what is a Smart City in the section “Where are we today and the Future”? As a brief reminder see the picture below to depict what a Smart City could look like.

 Environmental – air, waste and water pollution.  Centralising IT under 1 banner – before most government departments had their own “ICT Shop”.  Capitalizing on the ICT market opportunity – they want to take advantage of and play a leading role in ICT innovation and trade.  Ensuring that all citizens can benefit from smart technology – many areas still not connected. How did they solve this and project results?  Strategy – devised something called Digital 21 which was a blueprint for their ICT development. It included how to facilitate the digital economy, promoting innovation, developing Hong Kong as a hub for

Hong Kong has a population of approximately 7 million people making it one of the most densely populated places in the world. It has its own economic system and political system which are clearly set apart from the systems in China.

technological co-operation/trade and finally building a knowledge-based society to enable the next generation to succeed. It brought government departments together.  Governing body – the OGCIO (Office of the Government Chief

19 | P a g e

Information Officer). This was

IoT has been helped by the amount of

intended to streamline government

devices and apps that are interconnected.

structure and leadership for ICT

However for the city to develop and expand

functions within the government.

further they would need to grow their

This mirrors the ESM concept

network of devices and application to give

mentioned in Challenge 2 of this

them more access to valuable data.

paper.  Leadership – see the below hierarchy.

You can see how the Hong Kong government has adapted its “business model” to accommodate technological change as well as having easy to use services. The government seemed to have used the ESM way of management by streamlining business functions and coming under one umbrella.

 Projects – Electronic Information

By doing this they are converging and

management (covers content/record

centralising lots of individual IT silos into

knowledge management), E-

one hub.

government (runs government website, meeting 80% of citizen’s needs, supports/develops governments 49 mobile apps & 38 services) and GovWifFi/Open data (provide free wireless internet services to all citizens through strategically placed government premises as well as demographic/economic available data).

20 | P a g e

Something that was not mentioned is an initiative the government introduced called Data One (effectively a portal like in ESM) where developers are encouraged to make publicly available real time data apps. For example one was made where you could locate your nearest available docter.

Case Study 2: Real Time Location System [RTLS] (Stanley Black and Decker) in Mexico. Stanley Black and Decker (SBD) is one of the biggest tool manufacturers and provider of security products in the world. It has 52,000 employee worldwide and is in the fortune 250. SBD operates one of its biggest tool manufacturing plants in Reynosa, Mexico (serves North American market). With 40 multiproduct manufacturing lines and thousands of employees, the plant produces millions of power tools each year.

 Implemented RTLS – robust

wireless network making use of RFID tags that attached to any material to provide real time location/status to all level of staff (assembly staff, supervisors and plant managers).  Cisco WiFi and plant wide

Ethernet – provides a scalable and high performance network platform. Wireless access point are used to offer mobile access to production line information to plant floor managers providing value to its users.

Here are some of the key challenges:  Management – scale of production and manufacturing complexity.  Transparency – of real time production to schedule.

 Dashboard – AeroScout industrial provided a dashboard service to keep production floor manager up to date and made sure products were of high quality and also delivered on time.

 Costs – Actual labour costs exceeding standard costs.  Shifts – understanding affects of these changes and resource shifts line to line.  Visibility – able to see real-time equipment effectiveness, line productivity and reducing production line change over.

IoT was paramount to the success of this project. This was a clear case where you have different eco systems in the people,

How did they solve this and results?

21 | P a g e

materials, machinery.

Having a 3 tiered solution of the RTLS system underpinned by a robust network in the form of a visible dashboard. The need for simplicity is vital. For users to ultimately adopt the system it must be user-friendly. The use of simple RFID tags built up a

Conclusion Organisation across all industries will be affected by IoT, maybe not incurring any huge dents to their companies at first, but opportunities will be missed further down the line…Ian Brooks (HPE) highlights this:

strong network to provide relevant information to make informed quick decisions to meet daily targets, reduced inventory costs by 10% and achieved equipment effectiveness (was a 24% increase) for SBD.

The implications for organisations are enormous with those that invest early being prepared and those that don’t, missing out on new service opportunities and risking being lost in a sea of data that they can’t comprehend.

SWOT Analysis We will finish with a SWOT analysis of IoT. To encompass everything talked about above. See the diagram below.

Ask yourself these questions: 1. Do you want to get ahead of the curve or risk falling behind? 2. Are all your assets allowing you to be proactive not just reactive? 3. The data that you store - are you actually using it to its full valuable potential to make informed business decisions? 4. Are you innovating with your customers, users and supplier? 5. Can your current business model survive the way it is? All these questions are there to make you think and see that you may be sitting on a goldmine ready to be discovered and utilised with the power of IoT.

22 | P a g e

References Special acknowledgement to Ian Brooks [European Head of Innovation, Hewlett Packard Enterprise] for contributing to the paper.



Anon, (2013). [online] Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/24939 7/bis-13-1216-global-innovators-international-smart-cities.pdf [Accessed 11 Nov. 2015].



Axios Systems, The 5 Big Strategic ITSM Challenges for 2015, How technology, business and consumer megatrends are impacting service management (2015), pp.2-11.



Axios Systems, The Leading Provider of Service Management Solutions Enterprise Service Management (Beyond ITSM), Building a service-oriented enterprise (2015) pp. 2-14.



Baselinemag.com, (2014). A Brief History of the Internet of Things. [online] Available at: http://www.baselinemag.com/networking/slideshows/a-brief-history-of-the-internetof-things.html [Accessed 22 Nov. 2015].



Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications, 54, pp.1-31.



Bradley, J, Barbier, J & Handler, D. Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion (2013) pp.1-17



Brody, P. and Pureswaran, V. (2015). The next digital gold rush: how the internet of things will create liquid, transparent markets. Strategy & Leadership, 43(1), pp.36-41.

23 | P a g e



Chen, I., Bao, F. and Guo, J. (2015). Trust-based Service Management for Social Internet of Things Systems. IEEE Transactions on Dependable and Secure Computing, pp.1-1.



Cmo.com, (2015). 15 Mind-Blowing Stats About The Internet Of Things. [online] Available at: http://www.cmo.com/articles/2015/4/13/mind-blowing-stats-internet-ofthings-iot.html [Accessed 11 Nov. 2015].



Combined, T. (2015). The corporate 'Internet of Things' will encompass more devices than the smartphone and tablet markets combined. [online] Tech Insider. Available at: http://www.techinsider.io/the-enterprise-internet-of-things-market-2014-12 [Accessed 11 Nov. 2015].



Department for Business, Innovation and Skills, Global Innovators: International Case Studies on Smart Cities (2013), pp. 1-47



Dijkman, R., Sprenkels, B., Peeters, T. and Janssen, A. (2015). Business models for the Internet of Things. International Journal of Information Management, 35(6), pp.672-678.



Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion. (2015). 1st ed.



Enterprise Service Management (ESM). (2015). 1st ed.



Forbes.com, (2014). Forbes Welcome. [online] Available at: http://www.forbes.com/sites/gilpress/2014/06/18/a-very-short-history-of-the-internetof-things/ [Accessed 14 Nov. 2015].



Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), pp.1645-1660.

24 | P a g e



Ignite, (2012). Smart City. [online] Available at: http://enterpriseiot.org/book/enterprise-iot/part-i/smart-city/ [Accessed 8 Nov. 2015].



Investopedia, (2003). Business Model Definition | Investopedia. [online] Available at: http://www.investopedia.com/terms/b/businessmodel.asp [Accessed 23 Nov. 2015].



Lee, I. and Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), pp.431-440.



Lopez Research, An Introduction to the Internet of Things, (2013), pp. 2-6



Marshall, G. (2013). 10 amazing things you never knew a smartphone could do. [online] TechRadar. Available at: http://www.techradar.com/news/phone-andcommunications/mobile-phones/10-amazing-things-you-never-knew-a-smartphonecould-do-1175046 [Accessed 6 Dec. 2015].



McEwen, A. and Cassimally, H. (2014). Designing the internet of things. Chichester: Wiley.



McFedries, P. (2012). Cloud computing. San Francisco: HP Press.



Mckinsey.com, (2015). Preparing IT systems and organizations for the Internet of Things. [online] Available at: http://www.mckinsey.com/insights/high_tech_telecoms_internet/preparing_it_system s_and_organizations_for_the_internet_of_things [Accessed 11 Nov. 2015].



Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), pp.14971516.



Newe, G. (2015). Delivering the Internet of Things. Network Security, 2015(3), pp.1820.

25 | P a g e



Pettey, C. (2015). The Internet of Things and the Enterprise - Smarter With Gartner. [online] Smarter With Gartner. Available at: http://www.gartner.com/smarterwithgartner/the-internet-of-things-and-the-enterprise/ [Accessed 8 Nov. 2015]. Postscapes, (2014). History of the Internet of Things- Postscapes. [online] Available at: http://postscapes.com/internet-of-things-history [Accessed 2 Dec. 2015]



Roman, R., Zhou, J. and Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), pp.22662279.



Sicari, S., Rizzardi, A., Grieco, L. and Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, pp.146-164.



Wearables.com, (2015). Wearables.com | Wearable Technology News, Products, & Reviews. [online] Available at: http://www.wearables.com/ [Accessed 16 Oct. 2015].



Weber, H. (2011). 17 Dot Com failures and their modern counterparts - The Next Web. [online] The Next Web. Available at: http://thenextweb.com/entrepreneur/2011/10/27/17-dot-com-failures-and-theirmodern-counterparts/ [Accessed 6 Dec. 2015].



Weber, R. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), pp.23-30.



Yan, Z., Zhang, P. and Vasilakos, A. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, pp.120-134.



Yao, L., Sheng, Q. and Dustdar, S. (2015). Web-Based Management of the Internet of Things. IEEE Internet Computing, 19(4), pp.60-67

 An Introduction to the Internet of Thin(I)” 26 | P a g e