Privacy Considerations with Connected Products

Curt Hall

When designing products and services for the Internet of Things (IoT), organizations should make defining procedures for ensuring customer privacy an initial priority to avoid embarrassing and potentially costly surprises down the road.


The Role of EA in the IoT

Charles Butler, Stephen Hayne

This Executive Update explores the impact of the IoT on traditional business and technology architectures and the role of EA as an effective methodology for developing and implementing IoT strategies. We examine business architecture and how it integrates IoT-driven processes with traditional processes. 


BPM and Cognitive Computing

Paul Harmon

Business process change and cognitive computing do not necessarily overlap, but in business environments, they often do. Put simply, we will increasingly use cognitive computing techniques to improve business processes.


Empowerment and Control in Agile Management

Murray Cantor

The key to Agile management is that the organization and analytics that implement the interlocking sense-and-respond loops up and down the organization enable overall organization agility.


Architecture Value is in the Eyes of the Beholder

Balaji Prasad

How do you compute the valuation of something that has no clear definition? There are a couple of ways to respond: accept that it is good enough to have a very general value proposition for activities that somewhat fit under an “architecture” umbrella, or delineate specific architecture strategies and initiatives whose value can be measured in a manner similar to other investments that enterprises are used to.


Essential Architecture Frameworks: A Practical Guide

Roger Evernden

Architects are moving from single frameworks to instead work with a set of frameworks -- each finely tuned to serve a particular purpose. This new report by Roger Evernden explores a simple and pragmatic approach to developing a set of architectural frameworks that can evolve and be used as a constant guide to direct and manage EA. (This report is complimentary for Cutter Members. To purchase, please click the button below.)


Driving Viable Business Models for Blockchains and the IoT

Pradipta Chakraborty, Nagendra Kumar

Successful IoT use cases can emerge only by moving away from a product-centric approach that focuses on one-time sales and toward enabling an ecosystem of collaborating devices and services working in concert to build a longer-term, value-based customer relationship.


What to Do About Roboethics

Paul Clermont

Roboethics owes its existence as a new discipline to robots and algorithms, but these are not themselves the real ethical threat. Rather, the threat comes from robotic and algorithmic approaches to situations where the human edge is critical to ensuring results that are fair and beneficial to individuals and society at large. Computers may or may not be involved; it’s the approach that matters. Addressing the threats needs to happen at multiple levels.


The Role of Architecture (Planning and Design) in Agile Development

Gustav Toppenberg

Traditional Agile does not consider enterprise architecture as a key part of the process but assumes that architecture guidance is being provided in the background. Traditional enterprise architecture (EA), however, has also failed to evolve and the majority of EA teams are under pressure due to the increased adoption of Agile within enterprises. Thus, the traditional role of EA has been under attack by the emergence of Agile within enterprises and its adoption beyond the IT domain.


The Rise of Data Management in the Cloud, Part I

Curt Hall

In this Executive Update, Part I of a two-part series, we examine cloud-based data warehousing and platform as a service (PaaS) offerings designed to support data management for analytical applications. Part II will cover the trends, developments, and considerations pertaining to the adoption of self-service business intelligence (BI) environments.


The Overdependence on Technology in EA

Kathie Sowell

In practice and training, we should use EA methodologies as a way to assist human thinking, not as a mechanical, technology-driven form of “box-checking.” Above all, we should understand that we create EA models so that we can use them as a basis for human analysis. The models are the beginning, not the goal.


Lessons in IoT Data Management

Pranav Shah, Suman Datta, Rekha Vaidyanathan, Sudhakara Poojary, Vidyut Navelkar

All that has been said and written about the challenges associated with the Internet of Things (IoT) does not quite prepare you for the practical difficulties that crop up as you start implementing and deploying IoT solutions.


Inspired Reading for Enterprise Architects

Roger Evernden

In this Executive Update, I recommend some books that I have found most inspiring in my life as an enterprise architect. It is a very personal list. It comprises the books that have had the most profound influence on my enterprise architecture (EA) ideas and practice. 


Building the Foundation for Service Leadership

Peter McGarahan

Establishing the organizational foundation for service leadership where everyone is the customer should be a high priority. In my leadership experience and interactions with service leaders around the world, I have learned that being an effective leader comes down to one thing: care and they will care.


IoT Data/Analytics Platforms and Services

Curt Hall

Connected consumer devices and Industrial Internet applications can generate incredible amounts of data from sensors and other operations — data that can be difficult to process using traditional data management and BI tools due to the diversity and size of the data sets involved. Achieving business value from this massive data stream requires the use of big data storage and analysis technologies that can scale to meet the ­constantly increasing demands placed on organizations.


How Enterprise Architects Can Enable Innovation Management

Gustav Toppenberg

For innovation to be valuable to an enterprise, it must have real tangible business impacts and be well positioned within the organization. Linking it to the underlying enterprise architecture (EA) demonstrates how ideas have evolved. Enterprise archi­tecture needs to be able to address real innovation. If the architecture changes, what effect does this have on innovation and its related strategies? Innovation management and enterprise architecture go hand in hand. Although each can be successful in their own right, it’s when they are used in conjunction with each other that the full benefits are realized.


Security and Privacy in the Internet of Things: How to Increase User Trust

Dimitrios G Kogias

In this article, the author focuses on the security and privacy challenges inherent in IoT implementations and proposes solutions to help build a feeling of trust between all parties. In doing so, he answers such questions as “How do we assess the security risks in IoT?” and “How can the distinct interests of the sources and the collectors of personal data be expressed in a way that satisfies both parties and increases privacy and access control?”


Securing the IoT: It Takes the Global Village

David Tayouri

IoT devices have many advantages, but also vulnerabil­ities and risks. Many smart household appliances are poorly protected (if at all) against cyberattacks. This means that any script kiddie with minimal hacking skills can use them to break into the home network. If, a few years ago, someone had said that TVs and refrigerators could be compromised by hackers to send malicious emails, you would have laughed at them. But such an attack indeed happened on January 2014 — the first known cyberattack to use smart household appliances.


Social Engineering in the Internet of Everything

Ryan Heartfield, Diane Gan

Historically, social engineering exploitations in computer systems were limited to traditional Internet communications such as email and website platforms. However, in the Internet of Things (IoT), the threat landscape includes vehicles, industrial control systems, and even smart home appliances. Add to this mix naive users and default passwords that are extremely weak and easily guessed, and the threat becomes greater. As a result, the effects of a deception-based attack will now no longer be limited to cyberspace (e.g., stealing information, compromising a system, crashing a Web service), but can also result in physical impacts.


Security Challenges and Approaches in the Industrial Internet

Claude Baudoin

In this article, Claude Baudoin provide examples of the risks and a ­discussion of the methods available for mutual identification, authorization, and access control between IoT devices and control systems, as well as protection of data and commands as they cross the network. He also discusses how policies and risk management, not just the technology, need to be components of the overall approach.


Cyber and Physical Threats to the Internet of Everything

George Loukas, Charalampos Patrikakis
  CUTTER IT JOURNAL VOL. 29, NO. 7

Prepare for the unknown by studying how others in the past have coped with the unforeseeable and the unpredictable.

George S. Patton

 


Security in the Internet of Everything -- Opening Statement

George Loukas, Charalampos Patrikakis

This edition of Cutter IT Journal features five articles that discuss existing and future (but not at all fictional) risks in what we currently call the Internet of Things and that in the very near future will evolve into the Internet of Everything (IoE). It presents examples of risks and attacks in the different domains of our personal life, commercial world, and industry in which IoT devices are used, and highlights the corresponding technological and managerial challenges for confronting — even anticipating and warding against — security attacks.


Chatbots and Intelligent Virtual Assistants

Curt Hall

Chatbots and intelligent virtual assistants are receiving a lot of interest from companies across various industries wanting to add capabilities to mobile apps and popular messaging systems that will enable customers to conduct common interactions in a conversational manner via speech and natural language-text-powered interfaces. This Advisor looks at the trends and developments in this area.


What Is the Effect of Digital Transformation?

Peter Kovari

Digital transformation occurs in economies, sectors, and industries. Businesses can choose to embark on a journey that makes them more than just mere observers of the transformative changes. So what happens on this journey? And how can the businesses transform?


Outdated Approaches to Change Management

Jason Little

Agile isn’t going to help if we continue applying outdated change models to how we transform; that is, a bunch of change people — either Agile coaches, change management folks, or the vendor — gather in a room and create the plan.