Intelligent CIO Middle East Issue 15 | Page 24

COMMENT
as corporate networking shifts to an open model . A digital ready network provides automation , real-time analytics , virtualisation and the limitless scalability of the cloud . An open , software-driven network helps digital transformation by providing insights , automation and threat protection . For example , in the digital age , network devices can detect and shut down a pipeline spill automatically , or enable preventive maintenance in manufacturing plants .
The Internet of Things gets into higher gear The race to connect the unconnected will continue , enabling the Internet of Things ( IoT ) where billions of sensors will soon change the way we live our lives . IoT in consumer and business life will accelerate , connecting data , things , processes and people .
More things will become intelligent and connected to address the range of business needs . Medical devices , appliances , performance monitors , connected vehicles and smart grids are some of the early areas of adoption . For consumers , wearable devices will continue to grow and mesh with healthcare and big data . Intelligent systems will grow at a quick pace in
THE INCREASING INVESTMENT IN SMART CITY APPLICATIONS WILL DRIVE INTELLIGENCE TO THE EDGE OF THE NETWORK . COMPUTE , STORAGE AND NETWORKING CAPABILITIES WILL MOVE TO THE MOST REMOTE DEVICES , ALLOWING DATA FROM SENSORS TO BE CONVERTED INTO INTELLIGENT COMMANDS
2017 , as more applications and products become available . New products will by default have connected networks and WiFi built into them , opening the door for new use cases and innovative business models .
Security becomes even more paramount The growth of IoT will place even greater emphasis on security . The growth of connected devices and networks will largely depend on the success of being able to secure them successfully . The current generation of security technologies and architectures will not be sufficient to protect billions of devices in exponentially more complex connections . Inadequate security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications . Simply extending existing IT security architectures to the IoT will not be sufficient . Solving the security challenges being raised through the adoption of IoT requires disruptive and innovative solutions .
Couple this with the life cycle of devices without the possibility of physical upgrades . A starting point is likely to be cloud-based security services , with resource-efficient , thing-to-cloud interactions .
We also see a shift toward a cyberphysical paradigm , where we closely integrate computing and communication with the connected things , including the ability to control their operations . In such systems , many security vulnerabilities and threats come from the interactions between the cyber and physical domains . An approach to holistically integrate security vulnerability analysis and protections in both domains will become increasingly necessary .
Plug and play will be the new norm Other than the challenges of security and privacy being raised by the adoption of IoT , lack of interoperability between different products and different solutions is also currently limiting its growth . Going
MIKE WESTON , VICE PRESIDENT , CISCO MIDDLE EAST
forward solution vendors of IoT will focus less on setting their own standards and instead build their products on the basis of being able to complement and align with others .
This will allow us to enjoy fantastic applications that fully unleash the power of IoT . An immediate use-case will be the successful integration of the smart home including solutions like automated lighting and window blinds , energy management , movement sensors , face recognition and smart home appliances .
Changing the way we work According to 2016 research by Harvard Business Review , while individual workforce members are becoming more connected on their own , effective team communication has become more important over the past two years . Work collaboration with partners , suppliers , customers , consultants , as well as colleagues in dispersed locations has increased in importance . However , not all collaboration tools are equally effective . Tools that are not aligned with business processes and mismatched with work styles tend to be used less . Cloud , file sharing , video conferencing and content management have become highly effective . The next generation of collaboration tools will be cloud-based , mobile-first and capable of integrating various workflows .
24 INTELLIGENTCIO www . intelligentcio . com