15 posts categorized "M2M"


Community Development Critical for IoT Success

The IoT has democratized product engineering and innovation. Increasing device connectivity and open APIs are enabling new types of organizations and developers to innovate in a world previously confined to engineers with highly specialized skill sets. While the traditional embedded ecosystem and its engineers will remain at the heart of the IoT device movement, this new cadre of potential developers and entrepreneurs comprise an important part of the creative base designing future IoT systems.

And from giant conferences to local maker fairs, the technology ecosystem has recognized the importance fostering the growth of this “citizen developer” community. In fact, VDC is involved in an upcoming developer tournament focused catalyzing innovation for the IoT – the Global Mobile Innovators Tournament. I will be serving as one of the judges evaluating submissions.

What is the Global Mobile Innovators Tournament?

IBM, 4YFN (4 Years From Now) and four global telecommunications companies have joined forces to bring you the Global Mobile Innovators Tournament (www.glovators.io). In a worldwide global effort to foster innovation in technology, this tournament empowers developers and startups to create mobile and cloud applications that provide innovative solutions for how businesses and individuals operate and interact with the world around them.

Centered around three Internet of Things topics, the tournament includes fifteen virtual challenges and five regional demo days, culminating with a grand finale on stage at the 4YFN (“four years from now”) conference in Barcelona in February 2016 (http://www.4yfn.com/landing/attend.html). 4YFN, the global conference for mobile innovators, is affiliated with the Mobile World Congress, which takes places concurrently in Barcelona.

This tournament runs on Bluemix (https://console.ng.bluemix.net/home/), IBM’s platform as a service software. The tournament fosters industry innovation, world-class skill development, and mentorship programs for developers and entrepreneurs.

Registration opened on September 16 for the virtual challenges that kick off the Tournament. Demo days will happen December 9th – January 20th and winners will be announced February 22-24th at 4YFN 2016.

Please let me know if you have any questions about how to participate.


Lingering Thoughts from NIWeek 2015

VDC’s IoT and Embedded Technologies team recently attended NIWeek 2015 in Austin, TX. National Instruments (NI) put on an excellent conference and we had the opportunity to take in a great deal. There were inspiring and informative keynote presentations, great partner stories, the heat, interesting panel sessions, helpful one-on-one meetings with NI executives, the strange layout of the Austin Convention Center (it allegedly has a floor 2, but I’m not buying that), demos on the exhibit floor…and, well, did I mention the heat?

The IoT / IIoT Centric Focus of NIWeek

Regardless of the format – keynote, panels, demos, 1:1’s – much of the discussion tied into the Internet of Things, or the Industrial Internet of Things in NI parlance. This focus is well justified; with all due respect to Marc Andreessen, it is time to update his famous quote. Today, “IoT is eating the world.” In fact, a majority of engineers surveyed by VDC in 2014 were already leveraging the IoT. By 2017, 81% expect to use the IoT in their projects, which represents a truly remarkable shift in the engineering world!

Iot eating the word

National Instruments’ Position within the IoT

NI’s IIoT focus, and I believe it to be the right one for the company, is to provide their customers with distributed compute intelligence that would sit between the data generating nodes and the cloud or legacy enterprise systems in the IIoT architecture.

To date, media attention has focused disproportionally on greenfield IoT applications serving the home, business, and building automation. There’s a lot of innovation to be excited about in these devices, but they represent only a slice of the total available market for the IoT. NI is aiming at this broader IoT picture that includes countless applications in all of the traditionally embedded industries, like automotive, energy, medical, industrial, and others. Deployments into these markets will be brownfield opportunities needing to traverse complex environments and interact with a host of existing devices that vary in age and capability. Moreover, any new equipment will need to connect or integrate with numerous earlier M2M systems.

At NIWeek 2015, National Instruments demonstrated that their modular, platform-based portfolio has the functional capabilities, flexibility, and strong hardware/software integration necessary to support engineering organizations as they deploy the next generation of intelligent IIoT systems. The challenge however, is for NI to broaden the mindset held by many traditional customers. Engineers will need to more often consider their platforms as appropriate for deployed systems rather than only for development and test & measurement if NI is to advance their positioning in the IIoT ecosystem.


PubNub Taps IoT Niche with Real Time Data Streams

The tremendous growth potential of the IoT has created a market battle between many large, well-known companies such as Amazon, Cisco, Google, IBM, Microsoft, and Oracle. But how do smaller companies and startups become competitive in the race for IoT success? One answer: create or exploit a niche within the IoT. PubNub is a notable entrant in this respect.
Pubnub logoStreaming of real time data is useful in a variety of IoT applications, including finance, weather, traffic, communication, E-commerce, security, systems control, home and vehicle automation, advertising, and gaming. Since PubNub's founding in 2009, the company has firmly established itself in the market and claims to be the only global-scale network for real time data streaming for web, mobile, and IoT devices.
PubNub founder and CEO Todd Greene told VDC that the company uses 14 datacenters worldwide, connecting nearly 300 million devices, and processing over 350 billion messages per month at 1/4 second or less latency. Over 2,000 customers are responsible for that immense amount of data traffic. Greene said that PubNub has been able acquire an abundance of customers because it supplies consistent solutions to overcome some of the IoT’s most daunting obstacles: lack of security/privacy, demanding resource requirements, and complexity of use.
Though the IoT is growing rapidly, some customers are still hesitant to adopt connected products and solutions because of recent concerns about cyber security (or lack thereof). In addition, developers struggle to design and maintain secure systems while being fully transparent with their customers about the security measures that they are taking. PubNub reduces security risks by eliminating open network ports (by tunneling data through HTTPS), supplying authentication and access to data at a granular level (from both the server and user sides), and encrypting data with AES 256.
Developers often have limited resources and are constrained in the amounts of data that they can use. Energy saving is also a necessity as portable and mobile devices and communications services expand their capabilities. The desire to maintain an open connection for data streaming may lead developers to expect that considerable bandwidth and energy are required, however, PubNub is optimized for low bandwidth usage and low battery drain. For example, only 15 to 17 kilobytes of data per day are needed for a device to maintain a persistent two-way network connection. To conserve battery power, PubNub has a keep-alive verification that only occurs every 5 minutes. A typical 60 second ping notification, commonly used by Apple (APNS) and Android (GCM) devices, causes heavier battery drain. PubNub can further reduce its energy use via multiplexing, which allows data to be aggregated and streamed from multiple PubNub channels simultaneously over one TCP socket connection.
Similar to data streaming services such as Pusher, PubNub lets developers easily create apps through APIs. Greene said that PubNub sets itself apart by supporting over 70 SDKs which allows it to handle almost every type of connected device and protocol, and cater to a broad range of users. And because it keeps a persistent socket connection, users do not have to hassle with configuring firewalls, proxy servers, antivirus, or resolving double NAT. This significantly reduces the cost and complexity of building and maintaining infrastructure for products and services while also offering easy scalability.
In a broad sense, PubNub’s services are similar to content delivery networks such as Akamai and Limelight, but PubNub focuses on real time IoT data streams with device presence detection. PubNub’s Greene summarizes the service with the term RAFTA, short for routing, augmentation, filtration, transportation and aggregation.
PubNub’s unique position and foothold in the IoT market give it the potential to expand and further monetize its business (which is based 100% on recurring revenues). The company has already developed services targeted at vertical market applications, such as fleet vehicle dispatch and home automation, and will be adding more soon. For OEMs or prospective business partners seeking IoT services, PubNub is a company to keep in mind.
This article was written by Rodshell Fleurinord, VDC Research Assistant, with Steve Hoffenberg, Director.


Samsung Invests in Sigfox. Is the Race Over for Long-Range Low-Power Wireless Competitors?

A preliminary market battle has been brewing over the past year between technologies to connect IoT devices via wireless wide area networks. These cellular-type networks allow very low power battery devices to transmit small amounts of data over several miles, a solution highly suitable to many types of IoT devices such weather sensors and smart meters. Entrants in this market include Sigfox, LoRa, and Neul. (In addition, standards organization IEEE is developing the 802.11ah wireless networking protocol for distances up to a kilometer.)

Logo-sigfoxSigfox announced on June 15 that Samsung’s Artik IoT platform would integrate Sigfox support. Also, noted in the press release, but given less attention, was that Samsung’s venture capital arm is investing in Sigfox. The size of the investment was not disclosed. (See Sigfox press release here.) In February of 2015, Sigfox announced that it had secured from a variety of venture capital firms an investment round totaling $115M, reportedly the largest single VC investment round ever in France, Sigfox’s home country. (See Sigfox press release here .)

Thus far, Sigfox has been the only long-range low-power wireless solution already deployed in commercial operations, with several hundred thousand devices connected. It has networks in place in France, as well as in Spain, Portugal, the Netherlands, parts of the UK, and a number of cities around the world, most recently, in the San Francisco Bay area of the US.

Lora logoLoRa—developed by Semtech—has the backing of IBM, Cisco, and Microchip among the members of the LoRa Alliance, and its initial deployments are imminent.

Neul-logoUK-based Neul is still in its demonstration phase, but the company was acquired for 15M British Pounds in September 2014 by Chinese telecommunications equipment giant Huawei.

VDC won’t attempt here to compare the relative technical merits of these long-range low-power wireless systems, but from a market standpoint, it is clear that Sigfox is leading the pack. And it’s tempting to think that an investment by Samsung will propel Sigfox into an insurmountable lead. But we’re not yet ready to draw that conclusion. Some points for consideration:

  • Although the Samsung name will undoubtedly give a significant shot in the arm to Sigfox’s marketing efforts, without knowing the size of Samsung’s investment, we can’t assess the extent of its impact on the ability of Sigfox to get its networks deployed more broadly.
  • Long-range wireless solutions face the chicken-and-egg problem of needing the network infrastructure (antennas and backhaul) in place to persuade manufacturers to develop products using the technology, while needing products coming to market to warrant investment in the infrastructure.
  • As one of the world’s largest makers of electronic products, Samsung has the potential to dramatically increase availability of Sigfox-compatible devices if it so chooses. Thus far, however, Samsung hasn’t committed to using Sigfox in anything other than its Artik IoT platform.
  • Samsung also makes cellular networking equipment, although that represents a relatively small part of its overall business. (Samsung does not publicly disclose revenue for the segment.) By contrast, two-thirds of Huawei’s entire business ($31B out of $46B in 2014) is derived from cellular networking equipment, mostly sold in China and the EMEA region. While either company could conceivably foster widespread installation of long-range low-power networks through technological investment and pricing strategies, it’s unclear which would have greater motivation to do so.
  • LoRa has some heavyweight backers as members of its Alliance, but such membership has not yet yielded investment that will produce meaningful numbers of either chickens or eggs. [Note: the day after this blog was posted, the competition has ramped up, as LoRa startup Actility announced that it had received a $25M round of VC funding led by Ginko Ventures, with participants including telcos KPN, Orange, and Swisscom, as well as Foxconn, the world's largest contract manufacturer. See Actility press release here.]

In the meantime, Samsung’s investment positions Sigfox with a larger lead in the race for long-range low-power wireless networks. But it’s a long way to the finish line.


Where To Next For PTC After ColdLight Analytics Acquisition?

PTC logoAt this month’s LiveWorx event put on by PTC (formerly known as Parametric Technology Corp.), the news highlight was the company’s acquisition of IoT analytics firm ColdLight. (See press release here.) ColdLight’s Neuron software for cloud or on-premise datacenters applies machine learning technology to M2M and IoT data, automating predictive analytics tasks. The ColdLight acquisition was a logical extension to PTC’s prior acquisition of ThingWorx and Axeda in the IoT space.

At the front end of the product development process, PTC has assembled software offerings for product lifecycle management (Windchill), computer-aided design (Creo), application lifecycle management and systems engineering (Integrity). Combined with service lifecycle management and the IoT pieces, PTC has essentially created a set of end-to-end solutions for IoT product development and deployment. However, VDC believes that PTC could do more to fill out the middle of its end-to-end portfolio.

Design of embedded devices generally consists of three major areas: mechanical engineering, electronic engineering, and software development. PTC has the first and last of those well covered, but it offers little in the way of electronic engineering tools, save for electronic design automation software for circuit boards, acquired with the company OHIO Design Automation back in 2004 (and since integrated into Windchill).

There are many types of electronic hardware system development tools, and it may be challenging for PTC to dip another toe into that market without diving in completely. Nevertheless, VDC believes that one particular type of electronic design tool would dovetail nicely with PTC’s software development offerings without necessarily getting the company in over its head in electronic design:  virtual prototyping/simulation. Such tools enable the simulation of electronic hardware systems. Although virtual prototyping is often used by semiconductor makers to simulate the behavior of their own chips prior to fabrication, a growing market for virtual prototyping is as a tool for software developers to get a head start on their development work prior to the existence of physical prototypes of the electronic hardware.

PTC already offers mechanical/CAD simulation for Creo. An electronic hardware simulation tool could enable earlier software development for customers using PTC’s Integrity, acting as a bridge between hardware and software development.

Wherever PTC chooses to aim next, its acquisition days aren't over.


IBM’s $3 Billion Stake into IoT: A Low-Risk Gamble

IBM has announced it is establishing a new Internet of Things business unit with more than 2,000 consultants, researchers, and developers, and will invest $3 billion in it over the next four years. Three business areas are being highlighted:

  • IoT Open Cloud Platform for Industries – vertical market oriented big data analytics services
  • Bluemix IoT Zone – expansion of IBM’s platform-as-a-service to improve development and deployment of IoT apps
  • IoT Ecosystem – additional partners for secure integration of IoT data and services (existing partners include AT&T and ARM)

(We won’t rehash all the details of the announcement, which you can read here.) Ibm_logo

VDC finds this IBM initiative particularly noteworthy, for several reasons:

  • By establishing a dedicated IoT group, IBM is putting in place structures to speed both technical and business development targeting IoT. It will be interesting to see how the unit: a) navigates a complex weave of horizontal and vertical technologies and markets; and b) intersects and overlaps (and perhaps clashes or not) with IBM’s enterprise IT services.
  • By announcing the size of its investment up front, IBM is communicating the degree of its commitment to IoT. However, considering the amounts of money being spent collectively by other major companies claiming turf in the IoT (Cisco, GE, Google, Intel, etc.), significant mid-size participants (e.g. ARM, PTC), and hundreds of minor players and wannabees, $3 billion might only equate to table stakes necessary to reserve a seat at the high rollers’ table.
  • IBM’s announcement makes no mention of any external investments, i.e. acquisitions or startup funding. Since the year 2000, IBM has acquired more than 125 companies, including more than a dozen for which the price exceeded $1 billion, so we have little doubt that IoT-related acquisitions are in the offing.
  • Unlike Google’s $3.2 billion acquisition of Nest, which has modest short term but substantial long term potential, IBM’s $3 billion to scale up and expand its existing IoT capabilities can go a long way to generating real IoT revenue in the short term. While most consumers are yet to be convinced of the need for a “smart home” (unaware that their cable TV boxes and electric meters are already part of the IoT), enterprises are already seeing the benefits of the IoT on many levels, including customer satisfaction, recurring revenue, cost savings on service parts and labor, and product refinement. Considering IBM’s position in the IT industry, $3 billion seems like a low risk bet.

To look at it another way: as IoT becomes further integrated into day-to-day business IT and operations, what would have been IBM’s risk if it didn’t invest big money in IoT?


QNX Ex-Owner Harman International Acquires Red Bend Software


Harman International is best known as an audio electronics maker, owning numerous brand names targeting consumers and professionals, including AKG, Crown, dbx, Harman Kardon, Infinity, JBL, Lexicon, Mark Levinson, and Revel. As old-school “car stereos” have evolved in recent years into multifunction “infotainment systems,” Harman has also become a major player in automotive electronics.

Red_Bend_Logo_HorizontalOn January 22, Harman announced its acquisition for $170 million of Red Bend Software, which is the leading provider of software and services for Firmware Over The Air (FOTA) updating for mobile devices and automobiles. (See press release here.) Harman simultaneously announced its acquisition of software services firm Symphony Teleca, although Red Bend has more interesting implications for IoT.

QNXBack in 2004, Harman had acquired for $138 million QNX Software Systems, developer of the real-time operating system QNX Neutrino, as well as a number of other embedded software solutions which have since become especially popular in the automotive market. Fast forward to 2010 when Harman sold off QNX for $200 million to Research In Motion (RIM, since re-named Blackberry Limited for its line of mobile phones). At the time, Harman said about its sale of QNX, “This move allows Harman to continue its relationship with QNX and the advanced software solutions it provides to Harman and our customers. At the same time, this deal achieves value for all stakeholders and is an important step in a new strengthened relationship with RIM.”

Perhaps Harman’s sale of QNX was influenced by economic conditions during the Great Recession, but it leads us back to Harman’s acquisition of Red Bend, and it raises a few questions:

  • Would Harman have been able to leverage synergy between Red Bend and QNX in the automotive market if it had retained ownership of both? If not, why not? If so, might the value of such synergy have outweighed the gains realized by selling QNX?

  • What value does Harman now see in Red Bend that it no longer saw in QNX?

  • Considering that much of Red Bend’s current business is in the mobile phone industry, does Harman view Red Bend as a stepping stone into that market?

  • What would it take for Harman to believe that a potential future sale of Red Bend might “achieve value” for stakeholders and produce “a new strengthened relationship”?

We‘ll leave these questions for readers to ponder for themselves


VDC Research is attending Embedded World 2015!

Contact us ASAP to schedule a meeting

VDC will be making the trip across the Atlantic again this year to visit the largest embedded technology tradeshow of the year, Embedded World in Nuremberg, Germany. Last year, the conference boasted 26,700 visitors and 856 exhibiting companies!.

While we are at the conference, we welcome the opportunity to meet with attending vendors to learn more about their embedded solutions and any show-related (or other recent) announcements.

You can arrange a meeting time with VDC by contacting us directly.

For meetings contact:

André Girard, Senior Analyst, IoT & Embedded Technology, agirard@vdcresearch.com, 508.653.9000 x153; or
Steve Hoffenberg, Director, IoT & Embedded Technology, shoffenberg@vdcresearch.com, 508.653.9000 x143.

Haven't decided if you're attending Embedded World yet?

Please check out the Embedded World website for more information on the conference program as well as information on all of the companies that will be exhibiting.

We look forward to seeing you at the show!


Intel’s IoT Platform Extends Security Toward Edges

At a press and analyst event in San Francisco on December 9, Intel announced its “IoT Platform” reference model. The model is horizontal in scope, encompassing numerous technologies applicable to everything from edge devices to gateways to the cloud. In addition, it is intended to be a modular approach, such that Intel’s hardware and software components (including those from subsidiaries Wind River and McAfee) can be mixed with those of other vendors. For example, a customer could deploy its preferred gateway devices not limited to those based on Intel’s Moon Island design, while remaining compatible with Intel’s reference model. We won’t attempt to describe the entire Intel IoT Platform in this blog post, but we’ll focus on a couple of security aspects announced. (Readers can find the full Intel press release here.)

  Intel-McAfee Security Execs

Intel executives discuss IoT Platform security: (left to right) Lorie Wigle, VP of IoT Security Solutions; Steve Grobman, Intel Fellow and CTO for Security Platforms and Solutions; and Luis Blando, SVP of Intel Security Group [McAfee].

As part of the latest announcement, McAfee’s ePolicy Orchestrator (ePO) is being extended into IoT gateways. ePO is software for security management, enabling centralized deployment and control of security policies, as well as monitoring of endpoint security status. Previously, ePO was intended for enterprise IT networks, but the announcement means that it can now encompass a much wider range of industrial and commercial IoT networks. In VDC’s opinion, this could help ease integration between IT and OT (operational technology) departments when transitioning standalone OT systems into IoT systems. OT could maintain functional control over the gateways and edge devices, while IT institutes improved access control between the gateways and enterprise network assets.

A second notable security announcement was that Intel Security will now license its Enhanced Privacy Identity (EPID) technology to other silicon vendors. EPID is a form of remote anonymous attestation using asymmetric (public key and private key) cryptography, through which central systems can confirm the integrity and authentication credentials of remote devices, without those devices having to reveal their identities or those of their owners. (One common use for anonymous attestation is digital rights management for content protection.) Anonymous attestation requires security hardware, such as a CPU with a Trusted Platform Module (TPM) or Trusted Execution Environment (TEE), for which Intel of course is a prime supplier.

EPID can create groups of devices, where a single public key can work with multiple private keys, i.e. one assigned to each device within the group. The mathematics behind EPID is complex, but for those interested, we suggest checking out the article, “Enhanced Privacy ID: A Remote Anonymous Attestation Scheme for Hardware Devices,” by Intel’s Ernie Brickell and Jiangtao Li (Intel Technology Journal, Volume 13, Issue 2, 2009, pp. 96-111). The chart below from that article summarizes how EPID differs from other attestation technologies, including Direct Anonymous Attestation (DAA).

Chart source: Intel Technology Journal

Intel has not yet disclosed licensing terms for other chip makers to use EPID, and onerous or expensive terms could limit its acceptance. However, VDC believes that EPID could be applicable to many IoT scenarios where a central system needs to trust remote devices owned or operated by others. This type of function will become increasingly important as interested parties seek to extract shared or publicly provided data from private IoT devices.

Although numerous security technologies from many vendors are taking hold in the IoT, Intel is uniquely positioned in this market by virtue of its presence at both the network/system level (McAfee, Intel Server Systems) and the device level (Intel CPU hardware, Wind River software). Intel says, for example, that its existing McAfee Embedded Control software for application whitelisting is used by about 200 device manufacturers. Intel’s IoT Platform is the latest evidence that the company will remain a force to be reckoned with in IoT security.


Automotive Privacy Protection Principles Don't Go Far Enough

The Association of Global Automakers and the Alliance of Automobile Manufacturers jointly announced on November 13, 2014 a set of voluntary “Consumer Privacy Protection Principles.” (See the press release here, and download the principles PDF document here.)

The document is written in quasi-legalese, but in essence, it’s a pledge by automakers, beginning with the 2017 model year, to among other things:  ConsumerPrivacyProtectionPrinciples

  • inform consumers about how data collected from their vehicles will be used
  • obtain “affirmative consent” for certain ways that data might be used
  • anonymize aspects of the data under some circumstances

VDC applauds the auto industry for recognizing the importance to consumers of privacy for data collected by electronic and digital technologies, which are growing by leaps and bounds in new vehicles. However, the principles don't go far enough in several respects:

Security – The document states that participating members must “implement reasonable measures to protect Covered Information against loss and unauthorized access or use,” then says that “reasonable measures include standard industry practices.” The word reasonable is too wishy-washy in this context, so those statements in the privacy principles don’t inspire confidence that automakers and their partners will go the extra mile for data security. (Why don't the principles say the members must "implement strong measures" to protect the data?) Without defining any minimum security measures or committing to create or adhere to an ISO standard, it comes across as a nice way of saying, “We’ll make a good effort at security, but don't expect us to guarantee the data won't get breached.” In addition, security issues apply for data within vehicles' internal systems, for data during communications from vehicles to infrastructure, and for the databases where the manufacturers will aggregate and store the data. Security policies should specify minimum requirements for how data will be secured at each of these levels, as well as how authorized third parties with data access will be required to secure the data.

Consent – The document states that automakers need to obtain consent to “a clear, meaningful, and prominent notice disclosing the collection, use, and sharing of Covered Information.” However, the document includes no provision for a vehicle owner to deny such consent or revoke it afterwards. Why would that be important? Because the consent form is likely to be presented to consumers among a stack of numerous papers that they sign in a perfunctory manner when buying a car. In addition, consent ideally would provide vehicle owners with the ability to agree or not to agree to each type of data collected, rather than any blanket statement of consent to collection of all data. We’ll see how this plays out when the first consent forms hit the market.

Data Access – The document says that consumers will have “reasonable means to review and correct Personal Subscriber Information.” Such information may include name, address, telephone number, email address, and even credit card number. It’s fine that automakers will give consumers the right to access the data that they themselves provided in the first place, but what the document misses entirely is the basic principle that consumers should have the right to access data produced by their own vehicles. Although this isn't a data privacy issue, it is a data rights issue that automakers need to address. In VDC’s opinion, vehicle owners should have, for example, the ability to take diagnostic data to an independent mechanic, rather than manufacturers only providing such data to its dealers or third parties that have paid to access it. That concern is partly mitigated by "right to repair" laws, which are already in effect in the European Union and slated to take effect in the U.S. in the 2018 model year, although full data access would go beyond such laws. Vehicle owners also should have the ability to access geolocation and nearly all other data generated by their own vehicles. Certain types of data may need to be kept confidential, but the default should be to provide consumers access to data from their own vehicles unless there’s a legitimate safety reason not to make it available to the people whose vehicles generated it.

For further discussion of data rights issues related to the automotive industry and the Internet of Things, see the recent VDC View article entitled, Beyond "Who Owns the Data?" 

My Photo