Can someone do this final project

Running head: INTERNET OF THINGS 1








Internet of Things


Ideation Process

Innovation technology is mainly concerned with the introduction of a new idea into the market. Any basic innovation technology has an ideation process as its basis. Ideation becomes the most basic step. During this stage, a thought is generated. From this thought, an idea is analyzed and provided. The analysis process is done purposefully to determine the feasibility of the implementation of the developed idea. Analysis also establishes the market demand of the idea that has been developed. It determines the possible profit, and this such of an idea would bring to the organization upon its implementation. This explanation will be discussed on the aspect of a new technology known as Internet of Things, which was designed with a main reason of providing internet faculties to all locations on the surface of the earth on each scale.

When an analysis has been completed, what follows afterwards is the aspect of idea implementation. Implementation of the idea is always followed by the testing of the idea (Gubbi et al., 2013). Here, the idea is tested for its validity to be established. The validity here is trying to answer the question of whether the idea is trying to answer the problem that led to its establishment and implementation. Validity also gives the corrections and accuracy on the assessment of the set system. In case the assessment gives the right thing that the set idea was meant to provide, then the idea is valued and worth to be used in the market. If a contrary occurs, then it becomes advisable for the idea to be scripted. Every system needs to pass the validity test for it to be reliable, although some experts argues that not all valid systems are reliable.

Alternative Solutions

Most cases of the idealization process require alternatives to limit any possible risk or loss. Sometimes, it is evident that the innovative idea may bring some critical challenges in the implementation process. Some aspects that should be considered in the process include budget, and other critical resources that are required in the implementation process. For instance, the IoT can be used to supply internet connectivity in case the other alternative fails or vice versa. It is recommended that any form of learning and research should be done to control any possible discrepancies in the IoT technology. Any other technology can be implemented if it depicts the same functionality as the one described by the IoT.

Overview

The IoT refers to ever-growing technology that provides IP addresses to all objects and substances that one may imagine associating with. The assigned objects can promote communication amongst themselves. This technology tries to improve communication among individuals on a large scale by using the internet. The data grouping as well as digitizing the concept of IoT, calls for construction of four core basic models (Tukker et al., 2013). Namely, extend, manage, monetize and finally operate. These named models are the most common models that can be applied in the four internets. Any business should not believe that IoT has control over the four named basic models. For example, one should pay for usage of a model to function such services.

Some benefits of IoT is that it does not look at the size of an organization when providing its services. Internet of Things has improved efficiency at the workplace. It promotes rapid business improvement since it promotes effective advertising of its products. It promotes easy access of the business tools since they can be accessed from anywhere. But of course, whenever there are benefits, there are always some concerns. In this case, securities management in IoT with advancement in technology, the security issue has become the most critical concern. It is the one of the main factors that makes some businesses from accepting the use of IoT on their premises. Some of the security risk factor originates from authentication, access management and risk virtualization which could consist of identity and record management. IoT is trying to provide quick notifications for the internet service providers and content services providers. The named modification tends to present an aspect of data leakage, a fact that may lead to privacy compromising and thus insecurity. Distributed and outsourcing on the other hand can cause risk to the information security (Feki et al., 2013).

Quantitative Data

Most of the technologies on the internet is responsible for the interaction between the content and people forming the foundation for the modern internet usage. The active users of the web are based on the generation of materials and the downloading of things through smartphones and computers. The change in the internet by the clients may be passive if the projection for the rise in IoT becomes a reality, especially with objects like home appliances, car components, and the self-maintained machines. The devices are responsible for receiving and sending information on behalf of the user with or without the intervention of man. The shift may lead to the change of thoughts, if most of the internet connections and the derived data are transformed from the passive involvement of the connected objects in the wider environment (Perera, et al. 2014).

Potential Threats

There is a high level of trust for someone that utilizes a computer or any device that is connected to the internet. Some people would like to think the machines connected to the internet are safe and secure to conduct various activities that we conduct daily. The loss of trust may occur if the customers do not believe in the security of their devices and the information stored (Gubbi, et al. 2013). The provision of safety should be considered as the top priority. Inadequate security of the IoT services could give an opportunity for the entry of the cyber-crimes by enabling the malicious persons to re-program the device or cause a serious malfunctioning. The bad design of the devices can expose the data to theft due to the data streams inadequate protection. The malfunctioning machines can create the security vulnerability. The problem would appear internally in the computers connectivity that connects to the Internet. On the other hand, the technical constraints and the competitive cost of the IoT machines create barriers to the manufacturers to have adequate security design characteristics into these machines. Thus, creating security vulnerability and other maintenance threats as compared to the traditional computers (AFCEA, 2015).

Our capability to operate and conduct our daily activities is using the systems or devices that are internet enabled and on the rise. It is much harder to obtain individual machines that are not connected to the internet. Therefore, we become more dependent on the IoT devices for the substantial applications in the day to day use, which attracts more cyber-attacks. It makes the security of the IoT machines a significant threat and discussion point of all the component of the devices (AFCEA, 2015).

Success Factors

The IoT entails a broad range of items from the sensors, networks, all the way to the machinery. The most significant point in the communication are the processors speed in the communication. There are four critical aspects to consider in the foundation of the successful deployment of IoT. These include connectivity, security, interoperability/standards, and ecosystem. Connectivity, the advantages of the trending technological advancement while providing protection to the massive investment is the primary challenge to the industrial firms. The legacy created by the technology cannot be overlooked. The manageability of the systems is significantly increasing for the manufacturing business. Security is vital and is a necessity to ensure that the inviolability of the computer operates firmly. The consequences may spread beyond control. The value of the secret data is essential to the organization’s success (Gubbi, et al. 2013). Interoperability and the standards: the various components of the IoT should be able to interoperate and connect with the devices. The action can only be possible with the right and open industries that can provide reliable interconnections, secure information and share information in the IoT. Ecosystem, it plays a more vital role in the innovative thinking and advancements in the industry. It needs an extensive network of trusted partners for it to accomplish its full objectives (Gubbi, et al. 2013).

Lifecycle Model & Cost

With regards to the time and cost of development and research of the model, it is important that the costs be offset by the profits which are realized once the product is released to the market for the customers to use it. Therefore, the varying product should also be understood that its lifespan imply that the business should accurately project their returns on their research, development and costs associated with the investments is based on the potential longevity of the product in the chosen market. The amounts of time which can be taken to recover the costs mainly depend on various factors. This includes the availability of the market for the products produced by the company using such technological model (Williams et al., 2015). This implies that when the market is available, then more goods will be sold, resulting in an increase in revenue making the organization to recover its costs of setting up as well as any other relevant costs.

The elasticity of demand of the product as well will determine the time which will be taken to recover the costs of setting up and development costs. This is because if the product is more elastic, then it implies that any slight increase in the price will make all the customers decrease their demand for the product. However, if the product is inelastic, then the company can increase its price and the demand will be the same making them recover their costs within a short span of time. Consequently, the return on investment basing mainly on the development costs together with the risks of the product life cycle model as well depend on various factors such as the utilization of the available technology into producing the products which are very appealing to the customers. The timing will depend on the demand of the produced product which can, in turn, lead to an immediate return on investment.

Marketing Measures

The marketing measures are undertaken so that the product can get accepted in the market by the customers, as well as determine the time the return on investment will be realized. By carrying out rigorous marketing to enable the customers and the prospective customers to understand more about the product and its usefulness, it is coherent that the sales will increase and in turn ensuring that the organizations realize its return on investment (Bertin et al., 2013).

Cost Associated

The costs associated with the life of the product of the IoT are the research and development costs which are incurred in ensuring that the product, which is being developed is acceptable and most importantly, appealing to the customers. Furthermore, the advertising and marketing costs can be incurred as well to ensure that the products produced are well known to the customers. Delivery costs, which can be incurred when transporting the product to the customer's location, can as well be experienced. Such costs will be recovered in the profit made for such activities carried out.

Acceptance Process

The acceptance process relating to the IoT as well as the IoT lifecycle is that it is coherent that most of the devices, which surround an individual, will be connected to the internet. This can be achieved through the cell phones or the wearable technology. This implies that the IoT will connect each of the individuals in any way possible. Such activities have been found to mainly be acceptable so that the operations of any organizations can work efficiently. It is coherent that there has been a various dramatic increase in the innovation activities where there is a potential improvement of activities in the cyber-physical systems (Miller et al., 2015).

Engineering and Manufacturing Processes & Planning for Development

The convergence facilitated by the IoT has eliminated the so-called silo walls. These existed between information technology and operational technology. Currently, there is an allowance that allows unstructured data to be sorted and analyzed for availing insights which drive improvements. Computers do not have to be solely dependent on the input of humans, and this has resolved major challenges with the deficiency of human inputs (Orsino et al., 2016).

Human beings tend to have limited attention, accuracy, and time. It follows that they have inadequacies when capturing data on things (Jung et al., 2016). Having computers which can record and analyze everything, what there is to know as far as things (people, animals, as well as inanimate natural and manmade things) are concerned means that human beings are then able to count and track everything. This ends-up with a great reduction in cost, waste, as well as losses. The use of the IoT would facilitate accurate estimation of when things need replacing, recalling, or even repairs (Li et al., 2016).

Defects & Causes of Deviations during Development

The biggest challenge with the IoT is that with the increase in the smart nodes, the amount of the upstream data is bound to match-up with an unprecedented amplification. This is because most of the nodes will be actively generating data and new security concerns are bound to be raised. They will be particularly with respect to data sovereignty and data privacy. Even if some due diligence has been exercised to make communication secure and safe, trends have indicated that the stakeholders may not be certain about this (Li et al., 2016).

It is bound to be important to avoid interruptions and operational failures, as more enterprises continue to use the technology. Now, the physical attacks on remotely located devices have not been a matter of significant concern. With time, organizations will have to do more to strengthen their physical security to avert unauthorized access. This is particularly since the complexity of the vulnerabilities has not yet been understood (Orsino et al., 2016).

Using Internet of Things to Maximize Productivity

The IoT technology is among one of the most notable applications in many industries. It came in handy in building management, precision agriculture, energy, transportation as well as healthcare (Orsino et al., 2016). There have been a remarkable number of connectivity options, which application developers as well as electronic engineers, may utilize while working with the various systems. If effective vulnerability, patching and management is put in place, the rapidly increasing demand in the bandwidth will always be met in time (Chung et al., 2016).

Among the stakeholders who are bound to find the IoT being valuable include technology enthusiasts and marketers. Entrepreneurs are impressed when they get data on customers. IoT is facilitating better connection and access to clients. With smart devices, it will be possible to track and even record important patterns relating to consumer purchasing behaviors. This will ultimately facilitate the making of impactful product recommendations.

The IoT will also facilitate remote work, or telecommuting, as well as revolutionize inventory management and tracking. Nonetheless, it will always depend on the kind of business and the activity one wishes to speed-up and expand. Even if some businesses and industries may disappear, i.e. unless they change in a radical manner, those which integrate IoT in their operations will have a remarkable increase in productivity.