Process of Things: Ensuring a Successful Connection Between Things

You are here

Process of Things: Ensuring a Successful Connection Between Things

Posted January 17, 2017 in Data Analytics & Digital Technologies Cutter Business Technology Journal

Internet of Things (IoT), smart cities, wearable devices, and virtual reality are some information and communications technology (ICT) buzzwords that are making the boundaries between reality and fiction vanish. According to Mark Weiser, the father of ubiquitous computing:

The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.

While this weave is already happening through smart fabrics, for example, we expect that IoT (or “things” for short) will transparently blend with the know-how of enterprises commonly referred to as business processes (BPs). Although the ICT community considers the task the basic unit of work that implements a BP, the next trend is to allow things to be in charge of this implementation by forming ad hoc (i.e., on-the-fly/opportunistic) collaborative groups. This should happen through the concept of Process of Things (PoT), which will:

  • Guide the identification of things according to their capabilities

  • Allow things to take over new capabilities (i.e., mutation)

  • Facilitate the connection (and disconnection) of things through socially flavored relations

  • Incentivize or penalize things in response to their positive or negative participation in processes

PoT is the new way of tapping into the worlds of IoT and BP. PoT ensures that things will not function as silos but contribute collectively to offering value-added services to enterprises such as developing smart applications around connected things and reaching out to more customers through adaptable things. Predefined relations between things (e.g., parental, colocation, ownership) will support the development of networks of (privileged) contacts so that a thing can:

  1. Contact other things for possible connection in these networks

  2. Avoid conflicts with existing things in processes

  3. Recommend other things for either inclusion in or exclusion from processes based on past experiences

The ICT community is already building the Social Internet of Things (SIoT) using social relations among things (not among their owners) and is stressing the importance of exploiting these relations in developing smart applications. In a PoT, capabilities will prescribe a thing’s duties once it becomes activated and, thus, ready to form collaborative groups with other things. Capabilities would include sensing, storing, processing, diffusion, and reporting, with the option of combining them (e.g., sensing-and-processing).

Despite the ICT community’s interest in blending social computing with IoT, a good number of challenges and open issues that emerge out of this blend remain untackled. This includes defining a social-thing architecture, addressing the interoperability of things, discovering things, managing energy consumption of things, and handling the security, privacy, and trust of things, to cite just a few. On top of these challenges and issues, it is important to examine the on-the-fly com­bination of things, taking into account their dynamic capabilities and end users’ dynamic requirements. A PoT should have an operation model that inventories things according to a particular context (e.g., meeting room) and capitalizes on relations between things to expand this model.

Business Processes, Old and New

Enterprises and/or IT practitioners will raise the question of how a PoT compares to a regular process of tasks. There are some similarities:

  • Just as a process of tasks has a business logic defining who does what, when, and where, a PoT will have a “story” that defines the necessary things along with their capabilities and connections to other things. To develop such a story, enterprises will need a Thing Definition Language (TDL) and a Thing Connection Language (TCL). Both languages could be built upon the W3C semantic sensor network ontology after enrichment with additional properties that describe context-based social relations between things.

  • Like dependencies between tasks in processes, a PoT will count on capacity-driven relations between things, such as precedence (washing machine then dryer), complementarity (coffee machine and toaster), “antagonism” (VCR and DVD), and competition (a new fridge that could replace an existing one). Relations will be context-sensitive and based on the purpose of the future PoT.

And there are some differences:

  • Contrary to a process of tasks whose runtime instantiation leads into several process instances that could run concurrently, instantiating the same PoT several times could call for different things depending on their capabilities and availabilities.

  • Unlike a process of tasks whose tasks are known in advance, a PoT will have a set of core things (also known in advance) and a set of optional things that are part of these core things’ networks of contacts. Upon the recommendation of the core things, optional things can be added to a PoT, subject to the enterprise’s approval of the additional cost. Needless to say, dropping a core thing from a PoT results in dropping all of its optional things.

We believe it is necessary to differentiate between the social Internet of things and the Internet of social things. On the one hand, in the social Internet, things are configured and controlled in preparation for their integration into specialized networks built upon specific relations like those mentioned above. On the other hand, a social thing will be empowered with the capabilities needed for tapping into the opportunities of these networks, such as looking for partners, avoiding partners, forming alliances with partners, and so on, based on past experiences.

Capabilities in Context

To run a PoT, enterprises will have to define contextual boundaries of the future thing-based applications. These boundaries will identify the things that are willing to participate in these applications, taking into account their ongoing commitments and available capabilities. As stated above, each PoT execution can call for different things, since new things could emerge and existing things could, at any given moment, either cease to exist or change their priorities in supporting application development.

An example of a PoT could be a heating system that relies on sensors, actuators, and other devices to ensure comfortable living conditions for people. Mapping the heating system onto a PoT would require scanning the environment to detect things in terms of availabilities and capabilities, defining relations between things, and putting appropriate things together in response to specific requests such as maintaining a certain temperature level. Of course, it is vital to secure each PoT, as hacked things could lead to catastrophic consequences. In a PoT, things are parts of networks, and thus hacking one thing will give free access to the remaining things in these networks. The success of PoT will depend on enhancing things with the necessary capabilities to support them in securely building networks of contacts, responding to users’ needs proactively, and — last but not least — questioning our ways of thinking about things.

Share This

About The Author

Noura Faci is Associate Professor in the Department of Computer Science of Claude Bernard Lyon 1 University, Lyon, France. Her research interests include service computing, social computing, and business process management. Dr. Faci has a PhD in computer science from URCA University, Reims, France. She can be reached at

Zakaria Maamar is Professor in the College of Technological Innovation at Zayed University, Dubai, UAE. His research interests include business processes, the Internet of Things, and Web 2.0. Dr. Maamar has a PhD in computer science from Laval University, Quebec City, Canada. He can be reached at

Mohamed Sellami is Associate Professor at ISEP (Institut Supérieur d’Electronique de Paris) and a member of the LISITE Laboratory, Paris, France. His current research interests revolve around service computing, cloud computing, and social computing. Dr. Sellami obtained his PhD from Telecom SudParis, Paris, France. He can be reached at

Emir Ugljanin is a PhD student at the University of Nis and a teaching assistant at the State University of Novi Pazar, both in Serbia. His current research interests are business process management, the Internet of Things, and the social Web. He can be reached at

Leave a reply

Your email address will not be published. Required fields are marked*

Philip O'Reilly

Beyond Fintech: New Frontiers — Opening Statement

by Philip OReilly

This issue focuses on key topics of interest for financial services organizations, namely equity crowdfunding, legacy systems migration, robo-advisors, test outsourcing, and refining the reconciliation process.

Bhardwaj Velamakanni

Implementing Design Thinking in Agile

by Bhardwaj Velamakanni

This Advisor presents an overview of improving Agile techniques and practices by using design thinking within the Agile space and describes three techniques from design thinking methodologies that tend to yield benefits to Agile practitioners.

Gustav Toppenberg
Executive Update

Data’s Story: An Enterprise Asset in the Digital Backbone

by Gustav Toppenberg

The existence of a digital backbone in an organization means that anyone aspiring and planning to transform different parts of the enterprise can leverage the digital backbone in a consistent and sustainable way, ensuring that each transformation effort connects and leverages a common platform. Digital transformation leaders are starting to realize that a powerful digital services backbone to facilitate rapid innovation and responsiveness is key to successfully executing on a digital strategy.

Effort score and priority rank for requirements in our sample project.
Executive Summary

Can We Measure Agile Performance with an Evolving Scope? An EVM Framework (Executive Summary)

by Alexandre Rodrigues

Can a method like EVM, developed to control projects with well-defined objectives, be applied to control product development initiatives that evolve continuously toward a “moving target”? In an Agile environment, we are faced with the dynamic evolution of a finite boundary of integrated scope, cost, time, and resources; this finiteness — essential for business management and decisions — is the cradle for project management techniques, tools, methods, and frameworks. The EVM method was first developed to help with managing complex R&D projects mostly characterized by an unstable, volatile, and evolving scope. It is therefore no surprise that EVM applies to Agile projects.


The Frontier of Fintech Innovation — Opening Statement

by Philip OReilly

It’s a pleasure for me to introduce the first of two special issues of Cutter Business Technology Journal (CBTJ) showcasing the thought leadership and cutting-edge research and development (R&D) being done in State Street Corporation’s Advanced Technology Centres in Europe, the Middle East, and Africa (EMEA) and Asia Pacific (APAC), in partnership with University College Cork (UCC) and Zhejiang University (ZJU), respectively. The articles in this issue represent a small sample of the output from the R&D undertaken in these centers, which combine academic excellence with real industry impact.

Executive Update

Business Architecture’s Role in Crisis, Risk, and Compliance Management

by William Ulrich

Every business must deal with crisis, risk, and compliance challenges. Teams chartered with addressing these challenges are often split across business units and regions, which fragments crisis, risk, and compliance management efforts. Business unit silos and related complexities obscure ecosystem transparency, which in turn constrain an organization’s ability to identify risks, assure compliance, and prevent and disarm crises. Business architecture delivers business ecosystem transparency as a basis for improving a business’s ability to collectively address challenges related to crisis, risk, and compliance. 

Curt Hall

Building New Business Models with Blockchain

by Curt Hall

Organizations are using blockchain to create new business models — exploiting its capabilities for optimizing contract management, financial transaction management, and identity management.

Nine Policy Recommendations for Managing Technical Debt
Executive Update

Managing Technical Debt: Nine Policy Recommendations

by Rick Brenner

For technology-dependent products, companies, institutions, and even societies, sustainability depends on learning how to manage technical debt. Like most transformations, incorporating new practices into our organizations will likely be an iterative process. We already recognize the problem, and researchers are making progress, albeit mostly on technical issues. This Executive Update proposes a policy-centered approach to the problem. It begins with a principle that can serve as a guide for constructing technical debt management policy, and then shows how to apply that principle to develop nine recommendations that enable organizations to manage technical debt effectively.

Bhardwaj Velamakanni

Emerging Agile Anti-Patterns

by Bhardwaj Velamakanni

Agile methodologies, however popular they are, bring their own sets of “smells” and anti-patterns to the table, sometimes causing irreparable damage to the team. While the sources of these smells are many, one of the primary culprits is the mindset that treats Agile as “yet another methodology,” totally ignoring the cultural aspect. This article throws light on some of the prominent smells that are emerging of late in the Agile world.

Jens Coldewey

Middle Management in Flux

by Jens Coldewey

If you start changing an organization toward an Agile mindset, there’s no real end. Agile is about creating an organization of continuous learning and the transformation is done when there is nothing new to learn, which will probably be never. This puts an enormous challenge on middle management.


Business Opportunities in the New Digital Age — Opening Statement

by San Murugesan

The articles in this issue present perspectives and ideas on business transformation in the digital age. We hope they will inspire and encourage you to visualize the likely future of business in your domain and to explore the opportunities it presents. Finally, we hope their insights will help you identify suitable transformation strategies and plans and, if needed, choose viable collaboration models for partnering with startups and other firms in your digital business efforts.


Unlocking Value from Digital Initiatives

by Joe Peppard, by John Thorp

Beyond buzzwords, what we are seeing is a seismic shift in the role of technology in organizations. Technology is more and more embedded in everything we do as we move into an increasingly hyper-connected digital world, a world in which technology is driving significant social, organizational, and industry change.

Digital Data Steams impact bottom line

Improve Customer Experience — Leverage Your Digital Data Streams

by Federico Pigni, by Gabriele Piccoli

In this on-demand webinar, you'll discover the strategic and tactical opportunities made possible by Digital Data Streams and the opportunities for improved customer experience made possible by DDS.

Lou Mazzucchelli

Why Are They Twittering? A Modest Proposal

by Lou Mazzucchelli

At the Cutter Digital Transformation & Innovation Bootcamp, Cutter Fellow and Harvard Business School Professor Karim Lakhani talked about digitally-driven disruption of traditional business models for value creation and capture, discussing platform models like Facebook and Twitter. To date, Twitter has clearly done a good job “creating value.” But unlike Facebook, it continues to struggle with the capture part of the equation.

social collaboration
Executive Update

Seven Ways to Gamify Social Collaboration

by Phaedra Boinodiris

Social collaboration is not about technology. It’s about connecting people, and it’s changing the way business is being conducted. Similarly, gamification is not about games. It’s about motivating the per­sonal and professional behaviors that drive business value. Together, social collaboration and gamifi­cation help companies reap great benefits — among them, the ability to deepen customer relationships, drive operational efficiencies, and optimize their workforce. 

Figure 1 — Tracing a roadmap to projects.

Using Roadmaps Strategically

by Roger Evernden

Roadmaps have two key functions in strategy planning. The first is to outline planned architectural changes that will deliver the required strategies; the second is to outline alternative ways to achieve the same results.


Technology Trends, Predictions, and Reflections 2017: Opening Statement

by Cutter Team

Just as recent global events have given us reason to pause and reflect, the pace of technology emergence and disruption is proving to be a source of inspiration and uncertainty. Transitioning to a digital world is front-of-mind for many business executives, yet finding the right path is an ongoing challenge. So we asked Cutter’s team of experts for their insights on some of the technologies, trends, and strategies that will be relevant in 2017 and beyond. In typical Cutter Business Technology Journal fashion, our call produced a wide range of opinions and reflections worthy of consideration as you chart your business technology journey for the new year.


AGI: A Threat, an Opportunity, or an Inevitable Unknown for 2017?

by Alexandre Rodrigues

Artificial general intelligence (AGI) is currently emerging as an area where recent developments are likely to have a major impact on the way organizations do business, societies organize themselves, and even on how we address values and ethics.

The fact is that AGI already exists in our daily life. A common example is the GPS systems present in many new cars manufactured today; and let’s not forget the drones being used to deliver pizzas and cars that drive themselves. While automatic pilots have been used in commercial planes for quite some time, what AGI is about to offer to general business and human activity is well beyond what most of us have seen so far.


The Tech-Driven Tech Backlash

by Carl Pritchard

2017 is going to be a year of strange winners, and perhaps the strangest of all will be a giant leap away from technology and back to solutions that don’t rely on 24/7 connectivity. With the onslaught of major hacks and Facebook embarrassment, the antitech crowd may have its best year in decades. 


Rapid Technology Innovation in Blockchain: Should You Be on the Front Lines?

by Nate OFarrell

One of the most prevalent blockchains in the world, Ethereum, is poised to switch from a proof-of-work (POW) algorithm to a proof-of-stake (POS) algorithm, likely in 2017, with the release of the Casper codebase. Why does this matter? Because blockchain technology is becoming increasingly relevant and prevalent in businesses across the globe. It holds great potential to disrupt how businesses perform basic transactions, from payments, to programmable, self-executing contracts, to identity verification.