IoT is the latest thing in embedded systems technology, and it’s not a fad. IT research firm Gartner Inc. projects installation of 26 billion IoT units by 2020, resulting in $1.8 trillion in revenue. IoT is not a consumer-only technology, either. Enterprise architects should plan now for the entrance of connected device technologies into their IT environments, according to experts quoted in SearchSOA’s feature, “The enterprise IoT wave rolls in: How to prepare”. Those who hesitate will soon be behind the curve. “It’s not a matter of where IoT is entering but where isn’t IoT going to push into the enterprise,” said Mike Walker, an analyst at Gartner, in this article.
In recent articles, SearchSOA contributors have provided a wealth of security tips and tricks for IoT development. This post links to those pieces, putting experts’ and users’ advice at your fingertips.
Developing IoT applications will require rethinking quality standards when building embedded and Internet of Things (IoT) applications. For example, enterprise executives release flawed software daily, a developer told me recently, in order to compare the cost of defects with the cost of delaying release. That luxury isn’t an option in these types of software releases, where failure and security breaches can put user safety at risk. That approach won’t work with IoT.
Failure is much less acceptable when it comes to embedded software. Unfortunately, people expect software and networks to fail or get hacked. Their expectations for mechanical devices are much higher, however. “You shouldn’t have to worry about a blue screen of death on your toaster oven,” said Carnegie Mellon University’s Philip Koopman, in the lead story of SearchSOA’s three-article handbook, “Embedded software, IOT development demand careful scrutiny”.
Likewise, people shouldn’t have to worry about a software hacker turning off his auto-ignition system. Billions of connected devices present a big target, so we’ve gathered advice on creating hack-breaking IoT approaches in this article, “How to cook up the right IoT security strategy for your enterprise”. A huge challenge in beating hackers is that IoT devices bypass firewalls and create ongoing connections to third party services, reported IT security consultant Mark Stanislav, Sr. of Rapid7. In this tip, he and other experts give advice on how to create outside-the-firewall security strategies.
Our sister site, SearchCloudApps, digs into the cloud side of IoT development. Asked how IoT will alter developers’ application strategies, resident expert Chris Moyer pointed to integration as a challenge. A sample of Moyer’s advice here is: “If you create APIs and integrate with popular IoT integration services like IFTTT, you’ll be better able to take advantage of all the devices in a user’s life.”
Watch SearchCloudApps for updates on cloud services and tools for IoT development and deployment, too. A recent report describes a new mobile and IoT application development toolset from Embarcadero, called RAD Studio XE8.
What do you need to know about IoT? Let us know. Our resident experts will address your questions.