by Erik T. Heidt | October 14, 2016 | Comments Off on 10 Catalyst Presentations, 9 Reports and Now… The 2017 IoT Planning Guide !!
“2017 Planning Guide for the Internet of Things” published yesterday. The first Planning Guide to have a 100% IoT focus and summarizing our analysis and insights into this technology. This is the seventh in-depth IoT research report GTP has published this year – and there are still 78 days to go! (Yep, there is more to come!) While this was the second year of the Catalyst IoT Hackathon, this year saw Catalyst feature dedicated IoT tracks at both our San Diego and London events. And while 2016 has been a very productive year, our plan is to make 2017 even better.
Planning Guide Highlights
In 2017, the Internet of Things will move from “what” to “how” as organizations rapidly act to capitalize on new business opportunities. Technical professionals must have a plan ready to go — at a moment’s notice — to address IoT business value, architecture, technology, skill sets and governance.
Specific findings that are identified and addressed in the report include:
- Business interest will bring new urgency for Internet of Things (IoT) planning in 2017. Many organizations are already struggling with unmanaged adoption and shadow projects. IT must understand and proactively plan for the delivery of IoT solutions.
- The IoT architect is emerging as the central, linchpin role for planning, executing and governing IoT. Organizations are including IoT architecture, planning and execution roles in 2017 staffing and skills planning.
- Cloud IoT platforms continue to evolve rapidly. This market will segment in 2017, with general-purpose providers offering platforms that can cover commodity use cases, and specialty providers focusing on niche markets that have specific technology, industry or operational needs.
- Security and risk concerns will continue to be the greatest impediment to IoT adoption. The market for IoT-specific security solutions will dramatically expand in 2017 as existing security providers aggressively retool existing capabilities to address IoT security risks.
The Planning Guide is a great place to start, and will enable you to establish your 2017 IoT plan, we have a steady stream of in-depth GTP research to provide force multiplication to your IoT efforts.
Clients should keep Inquriy service mind, to enable direct discussions with myself or other members of the IoT research team. Your research assistant or relationship manager can provide all the details.
This year began with the release of “Preparing, Planning and Architecting for the Internet of Things” establishing an technical and architectural foundation to begin (or recalibrate) IoT efforts. Though the year and on into 2017 have a steady pace of additional research to address client questions and concerns. Here is a summary of our current body of research:
A Primer for Building Resilience and Security Into Internet of Things Solution Architecture
The scale and diversity of IoT technology pose a sizable security challenge. Strong practices and architecture, focusing on the IoT edge in particular, are critical to managing digital business risk. This document provides a primer for technical professionals who are new to IoT security.
Preparing, Planning and Architecting for the Internet of Things
IoT will be the most game-changing IT initiative since cloud computing in terms of both new business opportunities and its impact on IT. This IoT primer jump-starts technical professionals on IoT basics and helps them to create an adoption strategy and build reference architectures.
Exploit the Strengths of the Public Cloud for Your IoT Platform
Elasticity, global reach, scalable stream processing and data analytics features make cloud computing the ideal platform for Internet of Things solutions. IT architects should start now to assess cloud IoT platform suites for capabilities that will underpin IoT projects today and in the future.
Solution Path for Executing an Internet of Things Initiative
Successful IoT initiatives require sophisticated integration of diverse devices, data streams and processes to form an end-to-end system. This research provides a step-by-step methodology to envision, prepare, prototype, architect and implement an IoT initiative.
Leverage Intelligent Gateways in Your IoT Architecture
As many companies struggle with a flood of data from IoT devices, new intelligent gateways are emerging to move processing and analytics to the edge. This document aids technical professionals to enable IoT via intelligent gateways when other channels make cloud IoT platform adoption impractical.
Assessing Integration Architecture for Internet of Things Solutions
Digital business solutions, which combine the physical world with business systems, are the next major wave of new technology. These IoT solutions are inherently “connected” and require architects to prepare for integration from the physical “edge” to the enterprise and all points in between.
Molding Identity Into the Internet of Things
The diversity of the Internet of Things (IoT) makes Identities of Things (IDoT) hard to architect and manage for IoT solution architects. Users, devices, gateways, platforms, applications and services all have a part to play in IoT solutions and need identities to form a secure and trusted IoT.
PKI Is Gearing Up for the Internet of Things
PKI has been a quiet yet foundational security tool for identity professionals for two decades. The IoT, mobility, certificate life cycle handling, scale and new deployment options create resurgent interest in PKI, its potential disruptors and its vendors.
Recap 2016 Catalyst Sessions
While Catalyst has featured IoT sessions and Hackathons in the past, 2016 was the first year Gartner included dedicated tracks, greatly increasing the number of sessions and allowing us to tell a complete story. A story that began with exploring what IoT Strategy looks like for a technical professional and then examining all the elements required to fulfill that vision: delivery processes, Edge prototyping, Platform selection, analytics, security and application development. This enabled us to provide attendees with a content across the entire arc of IoT.
Note: If you attended Catalyst in San Diego or London but missed these sessions, they are available to attendees though Events on Demand. Gartner clients should keep in Inquiry in mind. While some of these topics do not yet have published research, analysts are available to speak with you about them.
Building the IoT Strategy: Integration Is the Key
Erik T. Heidt
The dawn of IoT is upon us. IoT is not one thing; it’s the integration of several things into a business solution. Therefore, a strong IoT strategy starts with an integration mindset. This session will lay out a pathway to IoT via the integration strategy. This session will address questions of how to leverage integration to maximize the business value of IoT solution components.
How Do I Launch and Drive an Internet of Things Program?
Gartner expects that the Internet of Things (IoT) will have as great an impact on business as mobile and cloud computing. But how should organizations implement their IoT program?
This session will answer these questions:
(1) What are the implementation steps from preparing to deploying for an IoT program?
(2) How should I prototype an IoT system?
(3) What are the key architectural decisions for an IoT system?
(4) How can I repeatedly use this IoT implementation guide for every IoT project?
Prototyping the IoT Edge for Fun and Profit
Erik T. Heidt
Want to get started making projects but not quite sure where to begin? Need to understand the pathway between prototype and fabrication? Here we will identify the needs of the “go to fabrication” moment and use these needs to sort through available prototyping and development options. Even if you only intend to tinker and explore, why not use the tools that can turn an experiment into innovation.
TechDemo: Assessing and Comparing Public Cloud IoT Suites
Public cloud services are the quintessential platform for hosting IoT solutions. Many major public cloud providers now offer IoT suites that address geographic dispersion, scalability and analytics benefits far beyond what on-premises IoT platforms can offer. What are the key criteria I should use when assessing an IoT cloud suite? Who are the major cloud IoT suite providers and how do they compare and contrast?
Delivering Digital Business Value With Integrated IoT Solutions
IoT is the result of integrating very diverse technologies. Low power and cost edge devices are so different from platforms — a water bottle versus an ocean of capacity. Yet, it is the integration and communication between these diverse components that unlocks IoT’s promise and power.
Securing IoT From Edge to Platform and Beyond
Erik T. Heidt
IoT solutions integrate diverse technologies — this is a source of strength but also results in complexity. Here we sort out the security and risk issues present in each IoT architectural components, identify and address the top security concerns.
IoT Architect: Developing Skills and Capabilities for the Internet of Things
How do I recruit or develop the talent needed to enable IoT in my organization? How do I position myself for a compelling role in IoT? This session will examine these questions and provide short and medium term actives to enable developing (or becoming) the IoT talent your organization needs.
Use Case: Cost Modeling in the IoT Business Case
Understanding cost is key to the credible business case. Regardless of role — innovator, architect, trusted business advisor — being able to model cost is critical to developing (or evaluating) the IoT business case.
IoT Analytics: The Secret Sauce
Carlton E. Sapp
No dish is complete without the right spice, and the spice for IoT is data. However, action is name of the IoT game, and action is enabled not by data alone, but by our analysis of it. Data analysis and resulting actions take place at every point in the IoT solution ecosystem. Learn how to balance the flavor of your IoT analytics capability between edge devices, IoT platforms and cloud solutions.
Securing Digital Access in IoT Solutions
Many edge devices will be constrained in terms such as compute capability, power and connectivity. IoT platforms require the ability to authenticate and authorize users, devices and services while dealing with new magnitudes of scale and new constraints. Here we will address authentication and authorization issues across your IoT solution, highlighting the special needs of constrained devices.
Read Complimentary Relevant Research
Securing the Internet of Things
IoT creates a pervasive digital presence connecting organizations and society as a whole. New actors include data scientists; external...
View Relevant Webinars
The IoT Roadmap for the Digital Business
Most executives have teams working on IoT initiatives in their enterprises. These teams are struggling with technology issues, vendor...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.