Deloitte’s IoT “Information Value Loop”: critical attitudinal shift

Ever so often it’s good to step back from the day-to-day minutia of current Internet of Things projects, and get some perspective on the long-term prospects and challenges.

That’s what Deloitte did last December, when it held an “Internet of Things Grand Challenge Workshop,” with a focus on the all-important “forging the path to revenue generation.”

The attendees included two of my idols: John Seely Brown and John Hagel, of Deloitte’s “Center for the Edge” (love the pun in that title!).

The results were recently released, and bear close examination, especially the concept of how to foster what they call the “Information Value Loop”:

Deloitte IoT Information Value Loop

Deloitte IoT Information Value Loop

“The underlying asset that the IoT creates and exploits is information, yet we lack a well- developed, practical guide to understand how information creates value and how companies can effectively capture value. The ‘Information Value Loop’ describes how information creates value, how to increase that value, and how understanding the relevant technology is central to positioning an organization to capture value. The Information Value Loop is one way to begin making sense of the changes we face. The Loop consists of three interconnected elements: stages, value drivers, and technologies. Where the stages and value drivers are general principles defining if and how information creates value under any circumstances, it is the specifics of today’s technology that connect the Loop to the challenges and opportunities created by the IoT.”

This fits nicely with one of my IoT Esssential Truths,” that we need to turn linear information flows into cyclical ones to fully capitalize on the IoT.  No pussy-footin’ about this for these guys: “For information to create any value at all, it must pass through all the stages of the Loop. This is a binary outcome: should the flow of information be blocked completely at any stage, no value is created by that information.”

IMHO, this is also going to be one of the biggest challenges of the IoT for management: in the days when it was sooo difficult to gather and disseminate information, it made sense for those in the C-suite to control it, and parcel out what they felt was relevant, to whom and when they felt it was relevant. More often than not, the flow was linear and hierarchical, with one information silo in the company handing on the results to the next after they’d processed it. That didn’t allow any of the critical advantages the IoT brings, of allowing everyone who needs it to share real-time data instantly.  But saying we need to change those information management practices is one thing: actually having senior management give up their gatekeeper functions is another, and shouldn’t be understated as a challenge.

So here are some of the other key points in the conference proceedings:

  • In line with the multi-step strategy I outlined in Managing the Internet of Things Revolution, they concluded that incremental improvements to existing processes and products are important, but will only take you so far, at which point radical innovation will be crucial: “At first blush, the early IoT emphasis on sustaining innovation seems reasonable. Performance and cost improvement are seldom absent from the priorities of stakeholders; they are relatively easy to measure and their impact is likely more immediate than any investment that is truly disruptive. Put simply, the business case for an IoT application that focuses on operational efficiencies is relatively easy to make. Many decision makers are hard-wired to prefer the path of less resistance and, for many, truly innovative IoT applications seem too far-flung and abstract to risk pursuing. Still, organizations cannot innovate from the cost side forever.”
  • Melding the public and private, “Cities have inherent societal challenges in place to serve as natural incubators of IoT solutions.” Yeah!
  • As in everything else, those contrarian Millennials (who aren’t so hung up on buying stuff and often prefer to just use it)  are likely to save us when it comes to the IoT:  “From an innovation perspective … some of the new technologies are first marketed at the consumers. Thus, many believe that near-term innovation in IoT applications will come out of the consumer sector – spurred by the emergence of the tech-savvy Millennial consumers as a driving economic force.”
  • As I’ve written before, while some customers will still prefer to buy products outright, the IoT will probably bring a shift from selling products to marketing services based on those products, creating new revenue streams and long-term relationships with customers: “As IoT makes successful forays into the world of consumer and industrial products, it may radically change the producer—buyer transactional model from one based on capital expenditure to one based on operating expenditure. Specifically, in a widely adopted IoT world, buyers may be more apt to purchase product service outcomes on some kind of “per unit” basis, rather than the product itself and in so doing, render the physical product as something more of an afterthought. The manufacturer would then gradually transform into a service provider, operating on a complete awareness of each product’s need for replenishment, repair, replacement, etc.”

    Or, a hybrid model may emerge: “What may ultimately happen in a relatively connected product world is that many may accept the notion of the smartly connected product, but in a limited way. Such people will want to own the smartly connected product outright, but will also accept the idea of sharing the usage data to the limited extent that the sellers use such data in relatively benign ways, such as providing advice on more efficient usage, etc. The outcome here will also rely upon a long term total cost of ownership (TCO) perspective. With any fundamental purchasing model changes (as is taking place in owned vs. cloud resources in the network / IT world), not all suppliers will be able to reap additional economic benefit under the service model. Buyers will eventually recognize the increase in TCO and revert back to the more economical business model if the economic rents are too high.”

  • It’s likely that those players in the IoT ecosystem who create value-added data interpretation will be the most valuable and profitable: “…are certain building blocks of the IoT network “more equal” than others?

    “Some have argued that the holy grail of the IoT value loop resides in the data and that those in the IoT ecosystem who aggregate and transform massive amounts of raw data into commercially useful intelligence capture the real value in the IoT environment. This notion holds that commercially useful data provide insights that drive action and ultimately represent the reason that the end user pursues a smart solution in the first place. Put another way, the end customer is more apt to pay for a more comprehensive treatment of raw data than for a better sensor. Indeed, some even believe that as time passes, the gap in relative value captured by those who curate and analyze the data and the rest of the IoT ecosystem will only widen and that, on a long-term basis, players within the “non-data” part of the IoT ecosystem will need to develop some data analytics capabilities simply to differentiate themselves as something more than commodity providers. Of course, some think that the emphasis on data is overblown and argue that where the real value in the IoT ecosystem is captured depends on application. Time will tell of course. But there can be little doubt that the collection and enhancement of data is highly coveted, and analytics and the ability to make use of the vast quantities of information that is captured will serve as critical elements to virtually any IoT solution.”

I urge you to download and closely analyze the entire report. It’s one of the most thoughtful and visionary pieces of IoT theory I’ve seen (no doubt because of its roundtable origins: in keeping with the above-mentioned need for cyclical information flow for the IoT [and, IMHO, creativity in general], the more insights you can bring together on a real-time basis, the richer the outcome. Bravo!

 

comments: Comments Off on Deloitte’s IoT “Information Value Loop”: critical attitudinal shift tags: , , , , , ,

Outside the (Shoe) Box Internet of Things Thinking!

Posted on 30th March 2015 in design, Internet of Things, retail, strategy, wearables

Could someone please forward this to Carrie Bradshaw? I don’t think she reads this blog, but she’d definitely be interested!

I’ve got to confess that I’m usually oblivious to the world of fashion — or appalled by it (there’s a current ad by Gucci in one of my wife’s magazines that frankly scares me: not sure which looks more weird: the emaciated, heavily-made-up model or the dress!), but this one caught my eye as a way women can have a more versatile wardrobe that takes up less space and saves them money!  Neat, huh?

Equally important, it may be the precursor of a wide range of mass-customized Internet of Things devices of all types that are more personal, create new revenue streams, and provide valuable feedback to the manufacturer on customer tastes.

Ishuu, a Lithuanian startup, is creating a new line of très stylish women’s shoes, Volvorii, that include a strip of e-ink material (similar to a Kindle screen) that can be customized by the owner simply by opening an app on her phone! The requisite electronics are housed in the heels.

As of this writing, the Volvorii Indegogo campaign has raised $34,000 of its $50,000 target, with 14 days to go. If I didn’t send every spare dollar to Loyola University – Maryland for my son’s tuition, I think I’d drop a few on this one: it really intrigues me!

If Ishuu is smart, I’d suggest that they throw open the API for the shoes, and allow bright young fashion design students to submit new designs for the insert.

As for those IoT-based products that are more personal, create new revenue streams, and provide valuable feedback to the manufacturer on customer tastes, here are a few more exciting examples to get you noodling about how you might redesign your own products to capitalize on this potential:

What I love about this as a consumer is that we will no longer have to make difficult binary choices between products: instead of either/or, it will be this/and this (in the case of the Watch and these shoes, I love that there will be so many choices that you’ll be able to change your choice on the fly depending on your mood or other factors.  I’m going to choose toe-tapping Mickey when I’m with my grandchildren, the Utility to keep track of biz during the day, and the Simple for more dignified evening wear.

These fall into my What Can You Do Now That You Couldn’t Do Before category. It’s going to take us a while to ditch our old, more limited mindsets, but the rest will be better for everyone.

comments: Comments Off on Outside the (Shoe) Box Internet of Things Thinking! tags: , , , , , , , ,

The Internet of Things’ Essential Truths

I’ve been writing about what I call the Internet of Things’ “Essential Truths” for three years now, and decided the time was long overview to codify them and present them in a single post to make them easy to refer to.

As I’ve said, the IoT really will bring about a total paradigm shift, because, for the the first time, it will be possible for everyone who needs it to share real-time information instantly. That really does change everything, obliterating the “Collective Blindness” that has hampered both daily operations and long-term strategy in the past. As a result, we must rethink a wide range of management shibboleths (OK, OK, that was gratuitous, but I’ve always wanted to use the word, and it seemed relevant here, LOL):

  1. First, we must share data. Tesla leads the way with its patent sharing. In the past, proprietary knowledge led to wealth: your win was my loss. Now, we must automatically ask “who else can use this information?” and, even in the case of competitors, “can we mutually profit from sharing this information?” Closed systems and proprietary standards are the biggest obstacle to the IoT.
  2. Second, we must use the Internet of Things to empower workers. With the IoT, it is technically possible for everyone who could do their job better because of access to real-time information to share it instantly, so management must begin with a new premise: information should be shared with the entire workforce. Limiting access must be justified.
  3. Third, we must close the loop. We must redesign our data management processes to capitalize on new information, creating continuous feedback loops.
  4. Fourth, we must rethink products’ roles. Rolls-Royce jet engines feed back a constant stream of real-time data on their operations. Real-time field data lets companies have a sustained dialogue with products and their customers, increasingly allowing them to market products as services, with benefits including new revenue streams.
  5. Fifth, we must develop new skills to listen to products and understand their signals. IBM scientists and medical experts jointly analyzed data from sick preemies’ bassinettes & realized they could diagnose infections a day before there was any visible sign. It’s not enough to have vast data streams: we need to understand them.
  6. Sixth, we must democratize innovation. The wildly-popular IFTTT web site allows anyone to create new “recipes” to exploit unforeseen aspects of IoT products – and doesn’t require any tech skills to use. By sharing IoT data, we empower everyone who has access to develop new ways to capitalize on that data, speading the IoT’s development.
  7. Seventh, and perhaps most important, we must take privacy and security seriously. What responsible parent would put an IoT baby monitor in their baby’s room after the highly-publicized incident when a hacker exploited the manufacturer’s disregard for privacy and spewed a string of obscenities at the baby? Unless everyone in the field takes privacy and security seriously, the public may lose faith in the IoT.

There you have ’em: my best analysis of how the Internet of Things will require a revolution not just in technology, but also management strategy and practices. What do you think?

FTC report provides good checklist to design in IoT security and privacy

FTC report on IoT

FTC report on IoT

SEC Chair Edith Ramirez has been pretty clear that the FTC plans to look closely at the IoT and takes IoT security and privacy seriously: most famously by fining IoT marketer TrendNet for non-existent security with its nanny cam.

Companies that want to avoid such actions — and avoid undermining fragile public trust in their products and the IoT as a whole — would do well to clip and refer to this checklist that I’ve prepared based on the recent FTC Report, Privacy and Security in a Connected World, compiled based on a workshop they held in 2013, and highlighting best practices that were shared at the workshop.

  1. Most important, “companies should build security into their devices at the outset, rather than as an afterthought.” I’ve referred before to the bright young things at the Wearables + Things conference who used their startup status as an excuse for deferring security and privacy until a later date. WRONG: both must be a priority from Day One.

  2. Conduct a privacy or security risk assessment during design phase.

  3. Minimize the data you collect and retain.  This is a tough one, because there’s always that chance that some retained data may be mashed up with some other data in future, yielding a dazzling insight that could help company and customer alike, BUT the more data just floating out there in “data lake” the more chance it will be misused.

  4. Test your security measures before launching your products. … then test them again…

  5. “..train all employees about good security, and ensure that security issues are addressed at the appropriate level of responsibility within the organization.” This one is sooo important and so often overlooked: how many times have we found that someone far down the corporate ladder has been at fault in a data breach because s/he wasn’t adequately trained and/or empowered?  Privacy and security are everyone’s job.

  6. “.. retain service providers that are capable of maintaining reasonable security and provide reasonable oversight for these service providers.”

  7. ‘… when companies identify significant risks within their systems, they should implement a defense-in -depth approach, in which they consider implementing security measures at several levels.”

  8. “… consider implementing reasonable access control measures to limit the ability of an unauthorized person to access a consumer’s device, data, or even the consumer’s network.” Don’t forget: with the Target data breach, the bad guys got access to the corporate data through a local HVAC dealer. Everything’s linked — for better or worse!

  9. “.. companies should continue to monitor products throughout the life cycle and, to the extent feasible, patch known vulnerabilities.”  Privacy and security are moving targets, and require constant vigilance.

  10. Avoid enabling unauthorized access and misuse of personal information.

  11. Don’t facilitate attacks on other systems. The very strength of the IoT in creating linkages and synergies between various data sources can also allow backdoor attacks if one source has poor security.

  12. Don’t create risks to personal safety. If you doubt that’s an issue, look at Ed Markey’s recent report on connected car safety.

  13. Avoid creating a situation where companies might use this data to make credit, insurance, and employment decisions.  That’s the downside of cool tools like Progressive’s “Snapshot,” which can save us safe drivers on premiums: the same data on your actual driving behavior might some day be used become compulsory, and might be used to deny you coverage or increase your premium).

  14. Realize that FTC Fair Information Practice Principles will be extended to IoT. These “FIPPs, ” including “notice, choice, access, accuracy, data minimization, security, and accountability,” have been around for a long time, so it’s understandable the FTC will apply them to the IoT.  Most important ones?  Security, data minimization, notice, and choice.

Not all of these issues will apply to all companies, but it’s better to keep all of them in mind, because your situation may change. I hope you’ll share these guidelines with your entire workforce: they’re all part of the solution — or the problem.

comments: Comments Off on FTC report provides good checklist to design in IoT security and privacy tags: , , , ,

IBM picks for IoT trends to watch this year emphasize privacy & security

Last month Bill Chamberlin, the principal analyst for Emerging Tech Trends and Horizon Watch Community Leader for IBM Market Development (hmmm, must have an oversized biz card..) published a list of 20 IoT trends to watch this year that I think provide a pretty good checklist for evaluating what promises to be an important period in which the IoT becomes more mainstream.

It’s interesting to me, especially in light of my recent focus on the topics (and I’ll blog on the recent FTC report on the issue in several days), that he put privacy and security number one on the list, commenting that “Trust and authentication become critical across all elements of the IoT, including devices, the networks, the cloud and software apps.” Amen.

Most of the rest of the list was no surprise, with standards, hardware, software, and edge analytics rounding out the top five (even though it hasn’t gotten a lot of attention, I agree edge analytics are going to be crucial as the volume of sensor data increases dramatically: why pass along the vast majority of data, that is probably redundant, to the cloud, vs. just what’s a deviation from the norm and probably more important?).

Two dealing with sensors did strike my eye:

9.  Sensor fusion: Combining data from different sources can improve accuracy. Data from two sensors is better than data from one. Data from lots of sensors is even better.

10.  Sensor hubs: Developers will increasingly experiment with sensor hubs for IoT devices, which will be used to offload tasks from the application processor, cutting down on power consumption and improving battery life in the devices”

Both make a lot of sense.

One was particularly noteworthy in light of my last post, about the Gartner survey showing most companies were ill-prepared to plan and launch IoT strategies: “14.  Chief IoT Officer: Expect more senior level execs to be put in place to build the enterprise-wide IoT strategy.” Couldn’t agree more that this is vital!

Check out the whole list: I think you’ll find it helpful in tracking this year’s major IoT developments.

comments: Comments Off on IBM picks for IoT trends to watch this year emphasize privacy & security tags: , , , , , , , , ,

Gartner study confirms senior managers don’t understand IoT

Posted on 21st February 2015 in Internet of Things, M2M, management, manufacturing, marketing, strategy

The “Managing the Internet of Things Revolution” e-guide I wrote for SAP was aimed at C-level executives. Even though it’s proven popular enough that the company is translating it into several languages, it appears we need to redouble our efforts to Managing_the_Internet_of_Things_Revolutionbuild IoT awareness among executives.

I say that because Gartner has just come out with a survey confirming my suspicions: even though a lot of companies now think the IoT will have a major effect on them, they’re clueless about how to manage it and most have yet to launch major IoT initiatives.

In fact, “many survey respondents felt that the senior levels of their organizations don’t yet have a good understanding of the potential impact of the IoT.” (my emphasis)

 

That’s despite the fact that a key conclusion of my guide was that (even though the IoT is a long way from full maturity) companies can and should begin their IoT strategies and implementation now, because they can already achieve significant savings in operating costs, improve marketing, and create new revenue streams with the current early stage sensors and analytical tools. Getting started will also build their confidence and familiarity with IoT tools and strategy before they begin more dramatic transformational strategies.

Consider these findings from the survey of 463 business and IT leaders:

  • 40% of companies think the IoT will at least bring new short-term revenue and cost reduction opportunities in the next three years — or perhaps even transform them. More than 60% think that will be true over 5 years or more.
  • Fewer than 25% said their company had “established clear business leadership for the IoT,” — even among the companies predicting a significant  – this includes those who said they expect the IoT to have a significant or transformational impact, says Gartner (however, 35% of them came from this group).
  • Yet, few have delegated specific responsibility for IoT strategy and management: “… less than one-quarter of survey respondents has established clear business leadership for the IoT, either in the form of a single organizational unit owning the issue or multiple business units taking ownership of separate IoT efforts.”
  • “attitudes toward the IoT vary widely by industry. For example, board of directors’ understanding of the IoT was rated as particularly weak in government, education, banking and insurance, whereas the communications and services industries scored above-average ratings for senior executive understanding of the IoT.”

Gartner concluded most companies have yet to really create IoT strategies:

“‘The survey confirmed that the IoT is very immature, and many organizations have only just started experimenting with it,’ said Nick Jones, vice president and distinguished analyst at Gartner. ‘Only a small minority have deployed solutions in a production environment. However, the falling costs of networking and processing mean that there are few economic inhibitors to adding sensing and communications to products costing as little as a few tens of dollars. The real challenge of the IoT is less in making products ‘smart’ and more in understanding the business opportunities enabled by smart products and new ecosystems.’ However, a lack of clear business or technical leadership is holding back investment in the technology.” (my emphasis)

In line with my current preoccupation, privacy and security, the survey did show companies are concerned with both issues, as well as with finding talented new staff who understand the IoT and how to benefit from it. According to Steve Kleyhans, Gartner’s research vp:

 “While a single leader for the IoT is not essential, leadership and vision are important, even in the form of several leaders from different business units. We expect that over the next three years, more organizations will establish clear leadership, and more will recognize the value of some form of an IoT center of excellence because of the need to master a wide range of new technologies and skills.”

If you haven’t launched any IoT projects or begun to create a strategy, the writing’s on the wall: get going!


Carpe diem: I take this survey as an omen that there’s a desperate need for When Things Can Talk: profiting from the Internet of Things revolution,” my proposed full-length book on IoT corporate strategy. Let me know if you can suggest a possible publisher!

Management Challenge: Lifeguards in the IoT Data Lake

In their Harvard Business Review November cover story, How Smart, Connected Products Are Transforming Competition, PTC CEO Jim Heppelmann and Professor Michael Porter make a critical strategic point about the Internet of Things that’s obscured by just focusing on IoT technology: “…What makes smart, connected products fundamentally different is not the internet, but the changing nature of the “things.”

In the past, “things” were largely inscrutable. We couldn’t peer inside massive assembly line machinery or inside cars once they left the factory, forcing companies to base much of both strategy and daily operations on inferences about these things and their behavior from limited data (data which was also often gathered only after the fact).

Now that lack of information is being removed. The Internet of Things creates two unprecedented opportunities regarding data about things:

  • data will be available instantly, as it is generated by the things
  • it can also be shared instantly by everyone who needs it.

This real-time knowledge of things presents both real opportunities and significant management challenges.

Each opportunity carries with it the challenge of crafting new policies on how to manage access to the vast new amounts of data and the forms in which it can be accessed.

For example: with the Internet of Things we will be able to bring about optimal manufacturing efficiency as well as unprecedented integration of supply chains and distribution networks. Why? Because we will now be able to “see” inside assembly line machinery, and the various parts of the assembly line will be able to automatically regulate each other without human intervention (M2M) to optimize each other’s efficiency, and/or workers will be able to fine-tune their operation based on this data.

Equally important, because of the second new opportunity, the exact same assembly line data can also be shared in real time with supply chain and distribution network partners. Each of them can use the data to trigger their own processes to optimize their efficiency and integration with the factory and its production schedule.

But that possibility also creates a challenge for management.

When data was hard to get, limited in scope, and largely gathered historically rather than in the moment, what data was available flowed in a linear, top-down fashion. Senior management had first access, then they passed on to individual departments only what they decided was relevant. Departments had no chance to simultaneously examine the raw data and have round-table discussions of its significance and improve decision-making. Everything was sequential. Relevant real-time data that they could use to do their jobs better almost never reached workers on the factory floor.

That all potentially changes with the IoT – but will it, or will the old tight control of data remain?

Managers must learn to ask a new question that’s so contrary to old top-down control of information: who else can use this data?

To answer that question they will have to consider the concept of a “data lake” created by the IoT.

“In broad terms, data lakes are marketed as enterprise wide data management platforms for analyzing disparate sources of data in its native format,” Nick Heudecker, research director at Gartner, says. “The idea is simple: instead of placing data in a purpose-built data store, you move it into a data lake in its original format. This eliminates the upfront costs of data ingestion, like transformation. Once data is placed into the lake, it’s available for analysis by everyone in the organization.”

Essentially, data that has been collected and stored in a data lake repository remains in the state it was gathered and is available to anyone, versus being structured, tagged with metadata, and having limited access.

That is a critical distinction and can make the data far more valuable, because the volume and variety will allow more cross-fertilization and serendipitous discovery.

At the same time, it’s also possible to “drown” in so much data, so C-level management must create new, deft policies – to serve as lifeguards, as it were. They must govern data lake access if we are to, on one hand, avoid drowning due to the sheer volume of data, and, on the other, to capitalize on its full value:

  • Senior management must resist the temptation to analyze the data first and then pass on only what they deem of value. They too will have a crack at the analysis, but the value of real-time data is getting it when it can still be acted on in the moment, rather than just in historical analyses (BTW, that’s not to say historical perspective won’t have value going forward: it will still provide valuable perspective).
  • There will need to be limits to data access, but they must be commonsense ones. For example, production line workers won’t need access to marketing data, just real-time data from the factory floor.
  • Perhaps most important, access shouldn’t be limited based on pre-conceptions of what might be relevant to a given function or department. For example, a prototype vending machine uses Near Field Communication to learn customers’ preferences over time, then offers them special deals based on those choices. However, by thinking inclusively about data from the machine, rather than just limiting access to the marketing department, the company shared the real-time information with its distribution network, so trucks were automatically rerouted to resupply machines that were running low due to factors such as summer heat.
  • Similarly, they will have to relax arbitrary boundaries between departments to encourage mutually-beneficial collaboration. When multiple departments not only share but also get to discuss the same data set, undoubtedly synergies will emerge among them (such as the vending machine ones) that no one department could have discovered on its own.
  • They will need to challenge their analytics software suppliers to create new software and dashboards specifically designed to make such a wide range of data easily digested and actionable.

Make no mistake about it: the simple creation of vast data lakes won’t automatically cure companies’ varied problems. But C-level managers who realize that if they are willing to give up control over data flow, real-time sharing of real-time data can create possibilities that were impossible to visualize in the past, will make data lakes safe, navigable – and profitable.

comments: Comments Off on Management Challenge: Lifeguards in the IoT Data Lake tags: , , , , , , , ,

Good Checklist for Creating #IoT Strategy

Still not ready to tackle an analysis of the November Harvard Business Review cover story, by PTC CEO Jim Heppelmann and Professor Michael Porter, on How Smart, Connected Products Are Transforming Competition, but I did want to do a shout-out to a companion piece, Digital Ubiquity: How Connections, Sensors, and Data Are Revolutionizing Business, by two HBS profs, Marco Iansiti and Karim R. Lakhani.

In particular, I wanted to suggest that you use the last section of the paper, “Approaching Digital Ubiquity,” as a checklist of priorities to create your own IoT strategy (I’d be remiss if I didn’t also mention my “Managing the Internet of Things Revolution” i-guide and this blog’s “Essential Truths” as references as well..).

Here are their points, and my reflections on them:

  1. Apply the digital lens to existing products and services.
    This is a profound transformation, because we’ve become so accustomed to working around the gaps in our knowledge that were the reality in an analog world.As Iasanti and Lakhani say, you now need to ask:
    “What cumbersome processes in your business or industry are amenable to instrumentation and connectivity?
    Which ones are most challenging to you or your customers?”
  2. Connect your existing assets across companies.
    We “get” competition, but collaboration, especially with competitors, is a little less instinctive.

    “If you work in a traditional analog setting, examine your assets for new opportunities and look at other industries and the start-up world for new synergies. Your customer connections are especially valuable, as are your knowledge of customers’ needs and the capabilities you built to meet knowledge of customers’ needs and the capabilities you built to meet them. Nest is connecting with public utilities to share data and optimize overall energy usage. If you work in a start-up, don’t just focus on driving the obsolescence of established companies. Look at how you can connect with and enhance their value and extract some of it for yourself.knowledge of customers’ needs and the capabilities you built to meet them. Nest is connecting with public utilities to share data and optimize overall energy usage. [my note: this is a great example of thinking expansively: even though your product is installed in individual homes, if data can be aggregated from many homes, it can be of real value on a macro scale as well. The smart grid is a great example of bringing all components of energy production, distribution, and use together into an integrated system.]  If you work in a start-up, don’t just focus on driving the obsolescence of established companies. Look at how you can connect with and enhance their value and extract some of it for yourself.”

  3. Examine new modes of value creation.
    Just because you make tangible products doesn’t mean that you’re limited to just selling those products to make money in the future. You’ll be able to make money by selling customers actionable data that will allow them to improve productivity and reduce maintenance. Perhaps you’ll stop selling altogether, and make money instead by making your products the cornerstone of profitable services.

    Begin to ask:
    “What new data could you accumulate, and where could you derive value from new analytics?”
    “How could the data you generate enable old and new customers to add value?”

  4. Consider new value-capture modes.
    “Could you do a better job of tracking the actual value your business creates for others?”
    “Could you do a better job of monetizing that value, through either value-based pricing or outcomes-based models?”
  5. Use software to extend the boundaries of what you do.
    You will still make products, as in the past, and that gives you a tangible basis for the future. But you’ll need a digital component as well.

    “Digital transformation does not mean that your company will only sell software, but it will shift the capability base so that expertise in software development becomes increasingly important. And it won’t render all traditional skills obsolete. Your existing capabilities and customer relationships are the foundations for new opportunities. Invest in software-related skills that complement what you have, but make sure you retain those critical foundations. Don’t jettison your mechanical engineering wizards—couple them with some bright software developers so that you can do a better job of creating and extracting value.”

    What do you think?  Any more questions you’d add? Let me know!

comments: Comments Off on Good Checklist for Creating #IoT Strategy tags: , , , ,

Resolved: That 2015 Is When Privacy & Security Become #IoT Priority!

I’m a right-brained, intuitive type (ENFP, if you’re keeping Myers-Briggs score…), and sometimes that pays off on issues involving technology & the general public, especially when the decidedly non-technical, primal issue of FEAR comes into the equation.

I used to do a lot of crisis management work with Fortune 100 companies, and usually worked with engineers, 95% of whom are my direct opposite: ISTJ.  Because they are so left-brained, rational and analytical, it used to drive them crazy that the public would be so fearful of various situations, because peoples’ reaction was just so darned irrational!

I’m convinced that same split is a looming, and extremely dangerous problem for the Internet of Things: the brilliant engineers who bring us all these great platforms, devices and apps just can’t believe that people could be fraidy cats.

Let me be blunt about it, IOT colleagues: get used dealing with peoples’ fears. Wise up, because that fear might just screw the IoT before it really gains traction. Just because a reaction is irrational doesn’t mean it isn’t very, very real to those who feel it, and they might just shun your technology and/or demand draconian regulations to enforce privacy and security standards. 

That’s why I was so upset at a remark by some bright young things at the recent Wearables + Things conference. When asked about privacy and security precautions (a VERY big thing with people, since it’s their very personal bodily data that’s at risk) for their gee-whiz device, they blithely said that they were just a start-up, and they’d get to security issues after they had the device technology squared away.

WRONG, KIDS: security and privacy protections have to be a key priority from the get-go.

That’s why I was pleased to see that CES asked FTC Chair Edith Ramirez to give opening remarks at a panel on security last week, and she specifically focused on “privacy by design,” where privacy protections are baked into the product from the get-go. She emphasized that start-ups can’t get off the hook:

“‘Any device that is connected to the Internet is at risk of being hijacked,’ said Ms. Ramirez, who added that the large number of Internet-connected devices would ‘increase the number of access points’ for hackers.

Ms. Ramirez seemed to be directing her remarks at the start-ups that are making most of the products — like fitness trackers and glucose monitors — driving the so-called Internet of Things.

She said that some of these developers, in contrast to traditional hardware and software makers, ‘have not spent decades thinking about how to secure their products and services from hackers.'”

I yield to no one in my love of serendipitous discoveries of data’s value (such as the breakthrough in early diagnosis of infections in neonates by researchers from IBM and Toronto’s Hospital for Sick Children, but I think Ms. Ramirez was on target about IoT developers forcing themselves to emphasize minimization of data collection, especially when it comes to personal data:

“Beyond security, Ms. Ramirez said that technology companies needed to pay more attention to so-called data minimization, in which they collect only the personal data they need for a specific purpose and delete it permanently afterward. She directly challenged the widespread contention in the technology industry that it is necessary to collect large volumes of data because new uses might be uncovered.

‘I question the notion that we must put sensitive consumer data at risk on the off chance a company might someday discover a valuable use for the information,’ she said.

She also said that technology companies should be more transparent about the way they use personal data and should simplify their terms of use.”

Watch for a major IoT privacy pronouncement soon from the FTC.

It’s gratifying that, in addition to the panel Ms. Ramirez introduced, that CES also had an (albeit small…) area for privacy vendors.  As the WaPo reported, part of the reasons for this area is that the devices and apps are aimed at you and me, because “consumers are finding — thanks to the rise in identity theft, hacks and massive data breaches — that companies aren’t always good stewards for their information.” Dealing with privacy breaches is everyone’s business: companies, government, and you and me!

As WaPo reporter   concluded: “The whole point of the privacy area, and of many of the products being shown there, is that technology and privacy don’t have to fight. They can actually help each other. And these exhibitors — the few, the proud, the private — are happy to be here, preaching that message.”

So, let’s all resolve that 2015 when privacy and security become as big an IoT priority as innovation!


Oh, before I forget, its time for my gratuitous reference whenever I discuss IoT privacy and security, to Gen. David Petraeus (yes, the very General “Do As I Say, Not As I Do” Petraeus who faces possible federal felony charges for leaking classified documents to his lover/biographer.), who was quite enamored of the IoT when he directed the CIA. That should give you pause, no matter whether you’re an IoT user, producer, or regulator!

I’ll be on SAP Radio Again Today: the IoT and Big Data

I’ll be on SAP’s “Coffee Breaks With Game Changers” radio again today, live @ 2 EST, appearing again with SAP’s David Jonker, again talking about the IoT and Big Data.  This time I plan to speak about:

  • Integrating real-time and historic data in decision-making:  in the past, it was so hard to glean real-time operating data that we had to operate on the basis of inferring about how to manage the future based on analysis of past data.  Now we have a more difficult challenge: learn to balance past and real-time data.
  • Sharing data in real-time: In the past, data trickled down from top management and might (or might not) eventually get to operators on the shop floor.  Now, everyone can get immediate access to it. Will senior managers continue to be the gatekeepers, or will everyone have real-time access to the data that might allow them to do their jobs more effectively (for example, fine-tuning production processes).

  • Revolutionizing decision-making: Decision-making will also change, because of everyone being able to have simultaneous access to data. Does it really make sense any more for sequential decision-making by various siloed departments when they might all benefit by making the decisions simultaneously and collaboratively, based on the data?

Tune in!

comments: Comments Off on I’ll be on SAP Radio Again Today: the IoT and Big Data tags: , , ,
http://www.stephensonstrategies.com/">Stephenson blogs on Internet of Things Internet of Things strategy, breakthroughs and management