Tel: +1-617-350-7550

Now for the hard part

Now for the hard part

August 02, 2016

The progress toward ubiquity Of the Internet of Things (IoT) can be described as consisting of three independent, converging movements: internet-enabled (edge) devices, aggregation of the data (cloud services), and analysis of the collected data. The first two movements have developed in predictable ways, given their states of realization before IoT arrived. The microcomputer industry has designed and manufactured ever smaller and cheaper devices, and the development tools to implement them. (Cimetrics has tracked this current closely for several years) Collection of the data (“in the cloud”) began later but has progressed quickly to a point where an IoT implementation has a variety of services available for the purpose. The remaining part is much the most difficult: understanding patterns in the data that make it comprehensible, and therefore useful. This task is by far the most difficult, both in length and in mental effort. An example of the effort that can be required to develop analytics to a useful level is Cimetrics' Analytika. This ongoing effort has taken over ten years, and continues as new insights are gained. The real value of the IoT will be realized when data models are mature enough to permit actionable decisions to be made.


Leave a comment

Comments will be approved before showing up.


Also in Cimetrics News

June 2020 News

June 30, 2020

Guidelines for COVID-19 Response, Services for Product Developers, ASHRAE Virtual Conference, MondayLive industry conversation, Cybersecurity news
and more...

Read More

Massachusetts Clean Energy Day June 30

June 26, 2020

June 30 is the Virtual Clean Energy Day, bringing together clean energy business leaders with legislators and policymakers to discuss the most pressing energy and climate policy issues facing Massachusetts.

Read More

Photo by Lewis Ngugi from Pexels
Cybersecurity Recap June 2020

June 23, 2020

Long-Term effects of COVID-19 on the Cybersecurity Industry, Cybersecurity Concerns about autonomous vehicles, Five Cybersecurity Books everyone should read and more...

Read More