After reading an IBM article, this spurred the idea to discuss blockchain for business applications, as well as how blockchain might impact IoT. Blockchain continues to enter the mainstream business market at a fast pace while moving into other industries outside of the financial services and banking industries. In addition to core business applications, blockchain is also being explored as a possible security solution for the broken and unsecured connected devices and IoT market space. In this opinion piece, we will explore blockchain from a business aspect and explore how this is expected to impact businesses, as well as emerge as a tool to secure the Internet of Things.
Blockchain for business
Before we dive in, let’s get our arms around what blockchain is and discuss this in simple-to-understand terms. Blockchain allows the secure sharing of business processes (contracts, business records, business activities, or other records) between companies and partners (business peer network) in an encrypted manner. As information or records from a business or partner is created...
Are you at CES? So much to look at, explore, and so many exciting announcements. We have captured some we believe are the most beneficial, exciting and newsworthy for the Enterprise and IoT landscape. Check out the summary and links below:
Compass Intelligence has covered the traditional device lifecycle market trends (smartphones, tablets, PCs, laptops), research, and intelligence for more than a decade, and now we are finally entering into real discussions around IoT device lifecycle management. What happens to the repair, maintenance, insurance, warranty, replacement, and end of life services that need to be provided for the billions of connected devices being managed globally, and who will be responsible for providing those services. When thinking about connected devices, let's just focus in on industrial and machine-to-machine connected devices. These may include devices used for tracking, monitoring, alerting, diagnostics, distribution, logistics management, digital content display, surveillance, inspection, safety response, machine communications, and many other core applications. Each of these applications will have common and unique IoT device lifecycle patterns and processes that start from the R&D/manufacturing stage and move to end of life and recycling stage.
A depiction of Compass Intelligence's IoT device lifecycle view is shown below:
Research & Development
The R&D phase includes areas such as testing, trial and error, refinement, embedded security, and other requirements, along with production runs for review and improvements. This phase is where many of the engineers work their magic, and this is also the area we are hearing needs to increase their review and processes for embedded security for supporting improved security of the device once it is deployed and operational.
This phase includes the production of connected devices.
Install and Deploy
This phase includes installation, integration, set-up, kitting, dispatching, and other services to get the connected devices working and communicating with other systems, software, and business tools.
Service and Maintain
This phase is where we expect to see a need for additional services. As devices malfunction, breakdown, become compromised (security, weather, aged), we will need better options for fast and reliable repair, warranty, and even insurance to cover business loss in case of short-term or long-term disruption of business or operations. Just as we have warranty, repair, and insurance related services for the devices we carry, we will have a growing need (especially in business or corporate) to have assurances for zero to little down-time of operations and business services. This phase is also important as it is focused on the management of all IoT and connected devices including providing physical and network security of the device, providing visibility of the devices (platform, portal, moves-adds-changes, troubleshooting), configuration, software updates management, and much more. As this phase becomes the longest phase and the most vital to operations, we expect to see services rolled out by the carriers, IoT vendors, integrators, and other tech companies, as well as see future IoT companies launch or evolve that are dedicated solely to IoT device lifecycle management.
End of Life
This phase is also an area that I believe is under-looked but will present huge opportunities for the market. What happens to older versions, retired models, aging equipment, and end of life connected devices. Just as we have a secondary market for smartphones and tablets, we will also see an opportunity for secondary markets for connected devices. This may be in both consumer and commercial application areas. In addition, as we deem equipment as not suitable for the secondary market, there will also be a market for recycling precious metals, parts, batteries, and other materials. Again, we are talking billions of devices that will need to be recycled to protect our resources.
For more research and information on the IoT Market, please visit our IoT Store. For more information on our advisory services, please visit our IoT Advisory page.
Written by Stephanie Atkinson, @stephatkins
Compass Intelligence CEO
AT&T and T-Mobile top the list based on overall subscriber gains, while Sprint and T-Mobile merger comes to an end.
Compass Intelligence just completed the final assessment of Q3 2017 and also compared this quarter’s results to Q3 2017. We do this each quarter to understand the subscriber and share changes, as well as evaluate the key trends taking place in the wireless industry for both consumer and B2B. We have been tracking the quarterly metrics since 2007, and have extensive models in B2B, market share, Share of Gross Adds, and other deep dive analysis. Some metrics are our own internal modeling and estimates, as the market does not report in all categories. A snapshot of Q2 2017 is below.
Compass Intelligence compared last quarter’s results to this quarter to show which metrics showed improvement over others (denoted by + or -).
Below are additional thoughts and insights based on the quarter and comparison to Q2 2016:
Learn more about Compass Intelligence tracking data.
The cloud platform and data storage are worthless without hardware to provide connectivity and deliver the data of the Internet of Things (IoT).
Compass Intelligence thanks Zach Supalla, CEO of Particle for contributing to Inside the Transforming Enterprise, CIO.com blog.
"Welcome to the world of IoT “solutions” without hardware. While a cloud platform and data storage are important parts of the IoT stack, they’re worthless without hardware to actually provide connectivity and deliver data. IoT platforms that don’t include hardware typically wave this away by telling their customers that they can develop their own hardware solutions. Many even try to sell their absence of hardware as a plus. They use the (admittedly clever) marketing term, “hardware agnostic”, to suggest that the lack of hardware “frees” their customers to use whatever hardware solutions they want." READ MORE (the full article)
About Zach Supalla
Zach is the founder and CEO of Particle, an IoT startup that’s making it easier to build, connect and manage internet-connected hardware on an enterprise scale.
Zach launched Particle on Kickstarter in 2013 with the vision of making the Internet of Things easy and accessible. Particle has grown to have the largest developer community in the Internet of Things with over 125,000 engineers. Particle devices are used at 50% of the Fortune 500 and ship to more than 100 countries. Particle has been featured in WSJ, Forbes, Wired, Engadget, Fast Company, TechCrunch, the Discovery Channel, and many other publications. Zach has spoken as an authority on Agile Hardware and the Internet of Things at prominent events such as OSCon, GMIC, and Launch.
Zach earned an MBA from the Kellogg School of Management and an MEM (masters in engineering management) from the McCormick School of Engineering at Northwestern. Before Particle, Zach worked as a management consultant with McKinsey & Company, advising Fortune 500 companies on strategy, operations, and product development. He is a graduate of HAX, the world's first and most prolific hardware accelerator.
The current U.S. smartphone market reached 331K total smartphones by the middle of this year. While the market continues to grow, there remains an entire black market that the industry continues to fight against. The OEMs, carriers, insurance providers, resellers, and trade-in companies much continue to evaluate the common practices taking place in the black or underground market. Consumers continue to seek ways to get their devices at a lower cost, which has given even more growth to the secondary device marketplace. The secondary marketplace is where you can go buy a new, used, or refurbished device from a person (private seller) or local shop (Craig's List, Facebook Exchange group, eBay, Pawn Shop, local 'mom and pop' reseller, etc.), an online vendor (Gazelle, Amazon, Gamestop, Bestbuy), and through your manufacturer or carrier. When buying through an individual and or online site (one of the more obscure ones), you are more likely to open the door for problems.
Factory Unlocked Devices or Unlocking of Devices
Before factory unlocked devices, there were 3rd parties you could pay to unlock your device and make it "ready" to be used with a given carrier. You could essentially take the SIM card out of your old phone and pop it into your new used phone and have the ability to choose your carrier of choice as opposed to being "locked" into the one carriers. Keeping in mind, not all unlocked phones work with your carrier of choice and many came with other issues and problems that made it more of a hassle. Consumers would pay for this service, before the carriers and the OEMs began offering the factory unlocked devices into the marketplace. Today, carriers offer factory unlocked devices. This means you can buy a Verizon phone and possibly use that phone on a Sprint network. The carriers actually have customer service representatives that can help answer questions about which models will work and the steps needed for a seamless experience. Sprint and Verizon use a CDMA network while T-Mobile and AT&T use GSM. Because not all phones will work on another carrier's network (due to network technology, versions, etc.), it is always best to call the carrier or look up the list of approved devices on their website.
Stolen and Black Market Phones
The market also put measures in place to help protect consumers and devices that were stolen or made available in the black market. If a user purchases a stolen phone from someone on Craig's List or other private seller market, buyer beware. Many of these secondary market devices are at risk of being included on the "blacklist" that carriers are responsible for blocking. This is done by performing a database search for the IMEI (International Mobile Equipment Identity) or ESN, and if the IMEI/ESN on the purchased device is included on the list of devices that are stolen or still on a device payment plan, then the carrier is responsible for blocking all calls and services. According to Kim Komando, "You can check to see if a phone has been reported as lost or stolen. Follow the instructions from the free international IMEI blacklist checker."
However, hackers will always have the upper hand. In these cases, you can pay up to $100 for example to have a 3rd party go out and assign a new IMEI to your device (both Apple and Android), therefore giving it a clean IMEI to be used with the carrier. These 3rd party hackers guarantee their services as well. PLEASE NOTE, changing an IMEI number is illegal. Essentially the hacker remotely takes access of your smartphone and downloads the operating system, performs the magic and replaces the IMEI with a working one. Also, these hackers are able to get into cloud accounts and even password protected smartphones.
For more information about protecting your smartphone, contact your carrier.
AT&T and Verizon pick up some steam, while T-Mobile Makes Adjustment in Wholesale Numbers
Welcome to the Compass Intelligence blog, where we cover hot topics in the industry, comment on latest news, and share recent research!