Network Bandwidth — As mentioned above, IoT data packets are inherently small, but the
volume of messages can be huge, potentially overwhelming a corporate WAN, unless a plan is in
place.
Storage — The real value of all these IoT devices lies in the data they capture. All that data is
stored and kept for analysis in large data lakes that could seriously impact the storage plans of
a business. So the storage and archiving of that volume of IoT data must be addressed.
Don’t Panic, it’s Not the Robopocalypse
The Internet of Things, like any disruptive technology, can turn our viewpoints and paradigms
on their heads. When that happens, it requires good design and planning to be successful. We
understand the challenges of IoT, but we also see its tremendous benefits. And fortunately,
there are technologies and processes that can help address the challenges. Some examples
include:
• Public Cloud - One solution is moving to the cloud key applications and data stores which
are the final destinations of the volumes of data generated by the swarm of IoT devices.
Going to the cloud allows you to adapt and scale to varying data volumes in a timely and
cost effective fashion.
• Data Governance - Even without the challenges of IoT devices, data privacy is an ongoing
issue in today’s technology world. GDPR is a prime example of the forces in play and the
difficulties ahead. A critical component to any data privacy solution is understanding
what data you actually have, and where it is. This requires a solid data governance pro-
cess. Adding the data from IoT devices into that process puts you well on the road to
dealing with privacy challenges.
• Blockchain - Blockchain is a distributed ledger technology that by itself is disrupting
industries across the spectrum. An interesting area being explored is the melding of
blockchain with IoT to provide complementary capabilities. Given its distributed nature
and the immutability of the content, blockchain is an attractive platform for addressing
IoT security, provenance and privacy issues.
• Machine Learning - Machine learning can potentially help address part of the security
challenge. Using machine learning algorithms, the volume of data received can be exam-
ined, uncovering patterns that may identify data discrepancies that represent security
risks by imposter or hacked devices.
That Blip on the Radar Won’t Be Fading Anytime Soon
Our “lake flies” analogy goes only so far. The tiny insects sho w up just once a year, and disappear
from the radar in a few weeks. In contrast, based on analyst estimates and current trends, the
Internet of Things is here to stay, and growing at an incredible rate.
The big IoT radar blip outside your data center provides great value, but also many challenges
that need to be considered. As many of our readers have heard us say frequently, no technology
negates the need for good design and planning, and the Internet of Things veritably demands
them. And don’t bother trying to brush that fly away. He has lots of friends heading right at you.
SUMMER 2018 | THE DOPPLER | 75