The Wayback Machine - https://web.archive.org/web/20180212104522/http://cloudcomputing.sys-con.com/node/4229244

Welcome!

@CloudExpo Authors: Elizabeth White, Jason Bloomberg, Jignesh Solanki, Dana Gardner, John Katrick

Related Topics: @DXWorldExpo, @CloudExpo, @ThingsExpo

@DXWorldExpo: Blog Post

The Profound, Surprising Future of the Internet of Things | @ExpoDX #IoT #IIoT #SmartCities

All the various disruptive trends impacting the IoT will combine to completely change how we perceive of the IoT

As the old Danish proverb says, it is difficult to make predictions, especially about the future. Add the exponential pattern of change familiar from Moore’s Law to the mix, multiply over a combination of dynamic trends, and such augury is fraught with peril.

Take, for example, the Internet of Things (IoT). Simply looking at the devices (sensors and actuators) themselves, we may extrapolate a number of such trends, many of which follow exponential curves.

Such devices are rapidly getting smaller. They’re consuming less and less power, so little that many such devices never require a battery replacement, if they have a battery at all. Simultaneously, the amount of processing power we can place on such tiny devices is also exploding.

Then there’s the somewhat discontinuous improvements in connectivity, as we move ever closer to – and finally take the leap to – 5G. And last but certainly not least, the cost of each device is also dropping to the point where we no longer will even need to think about the cost per unit, but rather the cost per thousands or even millions of units.

Today, we think of IoT devices in discrete terms: home automation products or factory devices or smart city sensors and the like.

Tomorrow, however, all the various disruptive trends impacting the IoT will combine to completely change how we perceive of the IoT and the uses we might wish to apply it toward. Here is a glimpse.

Sensors: Cheap, Small, and Plentiful

If we focus our attention solely on sensors for a moment, the trend is moving away from individually installed and configured sensors to fabrics of sensors – often literally. Manufacturers of everything from textiles to building materials to factory equipment will simply include sensors in their manufacturing processes, essentially putting them everywhere.

Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.

Today, connectivity is a limiting factor for such a vision, as wired connectivity would soon become impractical and Wi-fi is certainly not up to the task. However, 5G allows for far greater ‘densification’ of endpoints (that is, how many you can pack into a given volume) than ever before.

Yes, in our vision of IoT sensor fabric, every sensor is potentially its own 5G endpoint – its own self-contained cellphone as it were.

The Big Data challenges – and opportunities – from such fabric also boggle the mind. At some point, sensors will be so close together that neighboring ones will often deliver the same data. In other words, data from IoT sensor fabrics will have much higher redundancy than today’s IoT applications.

Your first reaction might be that such redundant data is useless data – but in fact, it serves a few vital purposes. First, it serves as a calibration check. When you have millions of sensors, some of them will be miscalibrated or otherwise giving you false readings.

If you only have a handful of such sensors, then it’s difficult to single out the bad ones. But if you have thousands of redundant sensors, the anomalous data from the bad ones will stand out like sore thumbs.

As a result, you’ll never want to bother fixing or replacing miscalibrated sensors. You’ll simply ignore their telemetry – regardless of whether their errors are accidental or malicious.

Malicious miscalibrations – what we call calibration attacks – are a little known, but dangerous attack vector for the IoT (the VW emissions scandal from a few years back is the best-known example. See my Cortex from the time for a discussion).

However, while tampering with a small number of sensors may give an attacker a means for achieving their goals, vast numbers of sensors will be prohibitively difficult to compromise.

Intelligent Actuators and Swarm Behavior

Sensors require little or no processing power, as their role is simply to collect and then deliver data upstream. Actuators, in contrast, have a reason to leverage their own processors, as they must take action.

Today’s basic actuators may do little more than respond to control signals from elsewhere, but as processors get smaller, cheaper, and more powerful, we’ll be seeing actuators become increasingly intelligent.

In fact, the word ‘actuator’ is a mechanical term that denotes motion, as in triggering a switch on a piece of equipment. However, if we couple the actuator with a transceiver (that is, with bidirectional connectivity), then the action it takes may simply be to send a signal – either upstream to a gateway or controller, or to other IoT devices.

When we envision smart IoT devices being able to communicate with each other in large numbers, a fascinating development results: emergent behaviors.

Emergent behaviors are behaviors of complex systems of systems (in our case, IoT devices) that only appear at the aggregate level, but not at the level of the devices (see my discussion of emergence from 2015).

In other words, the coded behavior in each device might be quite simple, but the behavior of large numbers of communicating devices might be entirely different from the original intentions of the coders.

In some circles, people call such behavior swarm behavior – although the word swarm is used in similar, but different ways that can be needlessly confusing, like the notions of a Docker Swarm or an Ethereum Swarm.

Emergent behaviors are quite common in the natural world, and explain much of its complexity. For example, bees in a beehive follow simple, instinctive behaviors individually, while collectively they can build the honeycomb structure of the hive.

The problem we face today is that the techniques for programming IoT actuators so that the resulting emergent behaviors are desirable are largely unknown, or at best experimental. That doesn’t mean, however, that we should throw in the towel.

On the contrary, such behaviors will emerge whether we want them or not. If we don’t get a handle on how to direct them in useful ways, we’ll end up with alarmingly bad results.

On the plus side, our best bet for providing adequate comprehensive security for the IoT is via programming the right emergent behaviors. IoT swarms must behave as though they have their own immune systems, identifying and counteracting malicious behavior regardless of the form it takes.

Our only hope of getting a handle on such security, therefore, is to figure out how to program such emergent immune system behavior.

The Intellyx Take

There’s one important trend I have yet to mention: blockchain. If you attempt to apply ‘true’ blockchain to the IoT, however, you quickly run into the challenges of how to handle blockchain nodes within the context of an IoT fabric.

If you extend your view beyond what is already being thought of as ‘first generation’ blockchain to the broader application of distributed ledger technologies, then the light at the end of this tunnel suddenly brightens.

One particularly promising effort: IOTA. IOTA bills itself as a ‘blockless distributed ledger,’ and is thus technically not a blockchain-based technology at all.

While blockchain-based systems require a consensus of transaction processing nodes (aka ‘miners’) to complete transactions, IOTA drives consensus into the peer-to-peer endpoints themselves – no miners needed.

The IOTA architecture, therefore, is well-suited to the IoT fabric this article discusses – at least in theory. IOTA is still a work in progress, and today the effort is focused on transactions of value (for example, one device ‘paying’ another device to take an action).

Such transactionality will undoubtedly be a part of the IoT in years to come, but in my opinion, will be but one use case among many.

Will IOTA or some other post-blockchain innovation drive the dominant architecture of next-generation IoT? Your guess is as good as mine.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. Image credit: Emma Jane Hogbin Westby.

 

More Stories By Jason Bloomberg

Jason Bloomberg is the leading expert on architecting agility for the enterprise. As president of Intellyx, Mr. Bloomberg brings his years of thought leadership in the areas of Cloud Computing, Enterprise Architecture, and Service-Oriented Architecture to a global clientele of business executives, architects, software vendors, and Cloud service providers looking to achieve technology-enabled business agility across their organizations and for their customers. His latest book, The Agile Architecture Revolution (John Wiley & Sons, 2013), sets the stage for Mr. Bloomberg’s groundbreaking Agile Architecture vision.

Mr. Bloomberg is perhaps best known for his twelve years at ZapThink, where he created and delivered the Licensed ZapThink Architect (LZA) SOA course and associated credential, certifying over 1,700 professionals worldwide. He is one of the original Managing Partners of ZapThink LLC, the leading SOA advisory and analysis firm, which was acquired by Dovel Technologies in 2011. He now runs the successor to the LZA program, the Bloomberg Agile Architecture Course, around the world.

Mr. Bloomberg is a frequent conference speaker and prolific writer. He has published over 500 articles, spoken at over 300 conferences, Webinars, and other events, and has been quoted in the press over 1,400 times as the leading expert on agile approaches to architecture in the enterprise.

Mr. Bloomberg’s previous book, Service Orient or Be Doomed! How Service Orientation Will Change Your Business (John Wiley & Sons, 2006, coauthored with Ron Schmelzer), is recognized as the leading business book on Service Orientation. He also co-authored the books XML and Web Services Unleashed (SAMS Publishing, 2002), and Web Page Scripting Techniques (Hayden Books, 1996).

Prior to ZapThink, Mr. Bloomberg built a diverse background in eBusiness technology management and industry analysis, including serving as a senior analyst in IDC’s eBusiness Advisory group, as well as holding eBusiness management positions at USWeb/CKS (later marchFIRST) and WaveBend Solutions (now Hitachi Consulting).

@CloudExpo Stories
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
The need in agility and scalibility neccecisited the evolution on software development from monolithic to microservices to serverless architecture.
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation," he said in making the announcement.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Every year about this time, we gaze into crystal balls to divine the future of our industry – or at least where it’s headed over the next 365 days. The result is often a triumph of incrementalism: we predict that we will get more of what we already have. The truth is, technology isn’t as revolutionary as we often think – and commenting on incremental changes alone may not help us understand what lies ahead. Along with a few near-term predictions – so hard to resist – I’d also like to make some ...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
Digital Transformation (DX) is not a "one-size-fits all" strategy. Each organization needs to develop its own unique, long-term DX plan. It must do so by realizing that we now live in a data-driven age, and that technologies such as Cloud Computing, Big Data, the IoT, Cognitive Computing, and Blockchain are only tools. In her general session at 21st Cloud Expo, Rebecca Wanta explained how the strategy must focus on DX and include a commitment from top management to create great IT jobs, monitor ...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
The word polymorphism is used in various contexts and describes situations in which something occurs in several different forms. In computer science, it describes the concept that objects of different types can be accessed through the same interface. Each type can provide its own, independent implementation of this interface. It is one of the core concepts of object-oriented programming (OOP).
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
Let's do a visualization exercise. Imagine it's December 31, 2018, and you're ringing in the New Year with your friends and family. You think back on everything that you accomplished in the last year: your company's revenue is through the roof thanks to the success of your product, and you were promoted to Lead Developer. 2019 is poised to be an even bigger year for your company because you have the tools and insight to scale as quickly as demand requires. You're a happy human, and it's not just...
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
Quick quiz! What’s the first thing that comes to mind when you hear the following phrases? Artificial grass Artificial sweeteners Artificial flavors Artificial plants
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
A few years ago – in the early days of Blockchain – a lot of people were taken with the idea of a multifunctional chain on which all transactions could be handled. After Ethereum was launched in 2014, its advocates were talking themselves hoarse about the transformative opportunities the platform introduced. Decentralized applications, they predicted, along with all sorts of value transfers would be executed exclusively on Ethereum from that point on, and no other networks would ever be needed....
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to close th...
Augmented reality (AR) and virtual reality (VR) have been the subject of much discourse in the last several years. They were widely anticipated in the gaming and entertainment industries, but in marketing and corporate settings, the benefits were murky at best. Today, these technologies are becoming more of a reality in all areas of business. For example, the new IKEA® shopping app leverages augmented reality to help shoppers determine how certain popular items will look in their homes – no tr...