Gartner Blog Network


IoT Target Architecture | Webinar Replay Info

by Erik T. Heidt  |  September 12, 2017  |  Comments Off on IoT Target Architecture | Webinar Replay Info

First, I want to say thank you for everyone who participated in today’s webinar. Especially folks who responded to our polls, asked a question or left a comment behind.

If you weren’t able to participate today, here is a link (no paywall, just register).

During the Webinar, I asked three polling questions. There were several hundred folks participating live, but I do not have “n values” or demographic data – so please keep in mind these aren’t controlled study results. (BTW… foreshadowing, there are multiple IoT survey reports in the pipeline that were conducted with study controls…)

Question: What stage is your effort in?

Q:What stage is your effort in?

This result is not unexpected. This webinar cut across a wide range of vertical industries for public utilities to professional services firms. Industrial and asset intensive organizations tend to have easily identified IoT use cases, and as a result they are more aggressive about IoT adoption. While many organizations outside the industrials have executive mandates to explore IoT, many struggle to identify and clarify strong business cases or have their needs met by adopting turn-key IoT solutions. There was a question during the webinar, asking about IoT use cases for professional services firms. While these organizations have readily identifiable digital business innovation opportunities steaming from their heavy use of information, many of these companies do not have clear IoT business mandates.

Question: Where is the data that you need to drive insights and foresights with IoT?

Q2

IoT solutions are about enabling actions. Actions are directly liked to decisions. As a result there I focused on modeling and analysis of functional requirements expressed as the IoT business decision to be made. Decisions require data. Data resides throughout IoT: sourced, stored and analysed across the many points in the edge, platform, enterprise systems and third parties. Data requirements also have a temporal aspect to them also – some facts expire quickly others have long useful lives. These factors were reviewed during that portion of the presentation. Not surprising that most organizations felt that their Iot decisions would require a hybrid of the four options I identified.

Question: For your top-of-mind IoT efforts, which is the strongest edge compute driver?

Q: For your top-of-mind IoT efforts, which is the strongest edge compute driver?

The webinar examined each of the major architectural components of an IoT solution, beginning with the Edge-Platform-Enterprise model. During the review of edge architecture the emergence of edge compute was explored including a review of strong pro and con applications. It is not surprising to see data filtration and availability lead.

Thanks again to everyone who joined today.

And for those of you that didn’t, hopefully this little window into the content will spark your interest. Here is the link again.

Thanks,
Erik

Category: internet-of-things  

Erik T. Heidt
IoT Agenda Manager, Research VP
5 years at Gartner
25 years IT Industry

Erik Heidt is the Research Agenda Manager for Gartner for Technical Professionals (GTP). Mr. Heidt covers Internet of Things (IoT) architecture, IoT strategy as well as security and risk management within the IoT context. Mr. Heidt focuses on developing and delivering research related to the architecture, development and operation of IoT for both users and suppliers. Mr. Heidt has more than 25 years of industry experience, with a significant focus on information security and risk management. Read Full Bio




Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.