Internet of Things (IoT), smart cities, wearable devices, and virtual reality are some information and communications technology (ICT) buzzwords that are making the boundaries between reality and fiction vanish. According to Mark Weiser, the father of ubiquitous computing:
The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
While this weave is already happening through smart fabrics, for example, we expect that IoT (or “things” for short) will transparently blend with the know-how of enterprises commonly referred to as business processes (BPs). Although the ICT community considers the task the basic unit of work that implements a BP, the next trend is to allow things to be in charge of this implementation by forming ad hoc (i.e., on-the-fly/opportunistic) collaborative groups. This should happen through the concept of Process of Things (PoT), which will:
Guide the identification of things according to their capabilities
Allow things to take over new capabilities (i.e., mutation)
Facilitate the connection (and disconnection) of things through socially flavored relations
Incentivize or penalize things in response to their positive or negative participation in processes
PoT is the new way of tapping into the worlds of IoT and BP. PoT ensures that things will not function as silos but contribute collectively to offering value-added services to enterprises such as developing smart applications around connected things and reaching out to more customers through adaptable things. Predefined relations between things (e.g., parental, colocation, ownership) will support the development of networks of (privileged) contacts so that a thing can:
Contact other things for possible connection in these networks
Avoid conflicts with existing things in processes
Recommend other things for either inclusion in or exclusion from processes based on past experiences
The ICT community is already building the Social Internet of Things (SIoT) using social relations among things (not among their owners) and is stressing the importance of exploiting these relations in developing smart applications. In a PoT, capabilities will prescribe a thing’s duties once it becomes activated and, thus, ready to form collaborative groups with other things. Capabilities would include sensing, storing, processing, diffusion, and reporting, with the option of combining them (e.g., sensing-and-processing).
Despite the ICT community’s interest in blending social computing with IoT, a good number of challenges and open issues that emerge out of this blend remain untackled. This includes defining a social-thing architecture, addressing the interoperability of things, discovering things, managing energy consumption of things, and handling the security, privacy, and trust of things, to cite just a few. On top of these challenges and issues, it is important to examine the on-the-fly combination of things, taking into account their dynamic capabilities and end users’ dynamic requirements. A PoT should have an operation model that inventories things according to a particular context (e.g., meeting room) and capitalizes on relations between things to expand this model.
Business Processes, Old and New
Enterprises and/or IT practitioners will raise the question of how a PoT compares to a regular process of tasks. There are some similarities:
Just as a process of tasks has a business logic defining who does what, when, and where, a PoT will have a “story” that defines the necessary things along with their capabilities and connections to other things. To develop such a story, enterprises will need a Thing Definition Language (TDL) and a Thing Connection Language (TCL). Both languages could be built upon the W3C semantic sensor network ontology after enrichment with additional properties that describe context-based social relations between things.
Like dependencies between tasks in processes, a PoT will count on capacity-driven relations between things, such as precedence (washing machine then dryer), complementarity (coffee machine and toaster), “antagonism” (VCR and DVD), and competition (a new fridge that could replace an existing one). Relations will be context-sensitive and based on the purpose of the future PoT.
And there are some differences:
Contrary to a process of tasks whose runtime instantiation leads into several process instances that could run concurrently, instantiating the same PoT several times could call for different things depending on their capabilities and availabilities.
Unlike a process of tasks whose tasks are known in advance, a PoT will have a set of core things (also known in advance) and a set of optional things that are part of these core things’ networks of contacts. Upon the recommendation of the core things, optional things can be added to a PoT, subject to the enterprise’s approval of the additional cost. Needless to say, dropping a core thing from a PoT results in dropping all of its optional things.
We believe it is necessary to differentiate between the social Internet of things and the Internet of social things. On the one hand, in the social Internet, things are configured and controlled in preparation for their integration into specialized networks built upon specific relations like those mentioned above. On the other hand, a social thing will be empowered with the capabilities needed for tapping into the opportunities of these networks, such as looking for partners, avoiding partners, forming alliances with partners, and so on, based on past experiences.
Capabilities in Context
To run a PoT, enterprises will have to define contextual boundaries of the future thing-based applications. These boundaries will identify the things that are willing to participate in these applications, taking into account their ongoing commitments and available capabilities. As stated above, each PoT execution can call for different things, since new things could emerge and existing things could, at any given moment, either cease to exist or change their priorities in supporting application development.
An example of a PoT could be a heating system that relies on sensors, actuators, and other devices to ensure comfortable living conditions for people. Mapping the heating system onto a PoT would require scanning the environment to detect things in terms of availabilities and capabilities, defining relations between things, and putting appropriate things together in response to specific requests such as maintaining a certain temperature level. Of course, it is vital to secure each PoT, as hacked things could lead to catastrophic consequences. In a PoT, things are parts of networks, and thus hacking one thing will give free access to the remaining things in these networks. The success of PoT will depend on enhancing things with the necessary capabilities to support them in securely building networks of contacts, responding to users’ needs proactively, and — last but not least — questioning our ways of thinking about things.
More: Articles Like This
- Security and Privacy in the Internet of Things: How to Increase User Trust
- Connecting Through the Process of Things
- The Internet of Things: Automation Heaven or Security Hell?
- Social Engineering in the Internet of Everything
- Solving the Jigsaw Puzzle: An Analytics Framework for Context Awareness in the Internet of Things
This issue focuses on key topics of interest for financial services organizations, namely equity crowdfunding, legacy systems migration, robo-advisors, test outsourcing, and refining the reconciliation process.
This Advisor presents an overview of improving Agile techniques and practices by using design thinking within the Agile space and describes three techniques from design thinking methodologies that tend to yield benefits to Agile practitioners.
The existence of a digital backbone in an organization means that anyone aspiring and planning to transform different parts of the enterprise can leverage the digital backbone in a consistent and sustainable way, ensuring that each transformation effort connects and leverages a common platform. Digital transformation leaders are starting to realize that a powerful digital services backbone to facilitate rapid innovation and responsiveness is key to successfully executing on a digital strategy.
Can a method like EVM, developed to control projects with well-defined objectives, be applied to control product development initiatives that evolve continuously toward a “moving target”? In an Agile environment, we are faced with the dynamic evolution of a finite boundary of integrated scope, cost, time, and resources; this finiteness — essential for business management and decisions — is the cradle for project management techniques, tools, methods, and frameworks. The EVM method was first developed to help with managing complex R&D projects mostly characterized by an unstable, volatile, and evolving scope. It is therefore no surprise that EVM applies to Agile projects.
It’s a pleasure for me to introduce the first of two special issues of Cutter Business Technology Journal (CBTJ) showcasing the thought leadership and cutting-edge research and development (R&D) being done in State Street Corporation’s Advanced Technology Centres in Europe, the Middle East, and Africa (EMEA) and Asia Pacific (APAC), in partnership with University College Cork (UCC) and Zhejiang University (ZJU), respectively. The articles in this issue represent a small sample of the output from the R&D undertaken in these centers, which combine academic excellence with real industry impact.
Every business must deal with crisis, risk, and compliance challenges. Teams chartered with addressing these challenges are often split across business units and regions, which fragments crisis, risk, and compliance management efforts. Business unit silos and related complexities obscure ecosystem transparency, which in turn constrain an organization’s ability to identify risks, assure compliance, and prevent and disarm crises. Business architecture delivers business ecosystem transparency as a basis for improving a business’s ability to collectively address challenges related to crisis, risk, and compliance.
Organizations are using blockchain to create new business models — exploiting its capabilities for optimizing contract management, financial transaction management, and identity management.
For technology-dependent products, companies, institutions, and even societies, sustainability depends on learning how to manage technical debt. Like most transformations, incorporating new practices into our organizations will likely be an iterative process. We already recognize the problem, and researchers are making progress, albeit mostly on technical issues. This Executive Update proposes a policy-centered approach to the problem. It begins with a principle that can serve as a guide for constructing technical debt management policy, and then shows how to apply that principle to develop nine recommendations that enable organizations to manage technical debt effectively.
Agile methodologies, however popular they are, bring their own sets of “smells” and anti-patterns to the table, sometimes causing irreparable damage to the team. While the sources of these smells are many, one of the primary culprits is the mindset that treats Agile as “yet another methodology,” totally ignoring the cultural aspect. This article throws light on some of the prominent smells that are emerging of late in the Agile world.
If you start changing an organization toward an Agile mindset, there’s no real end. Agile is about creating an organization of continuous learning and the transformation is done when there is nothing new to learn, which will probably be never. This puts an enormous challenge on middle management.
The articles in this issue present perspectives and ideas on business transformation in the digital age. We hope they will inspire and encourage you to visualize the likely future of business in your domain and to explore the opportunities it presents. Finally, we hope their insights will help you identify suitable transformation strategies and plans and, if needed, choose viable collaboration models for partnering with startups and other firms in your digital business efforts.
Beyond buzzwords, what we are seeing is a seismic shift in the role of technology in organizations. Technology is more and more embedded in everything we do as we move into an increasingly hyper-connected digital world, a world in which technology is driving significant social, organizational, and industry change.
In this on-demand webinar, you'll discover the strategic and tactical opportunities made possible by Digital Data Streams and the opportunities for improved customer experience made possible by DDS.
At the Cutter Digital Transformation & Innovation Bootcamp, Cutter Fellow and Harvard Business School Professor Karim Lakhani talked about digitally-driven disruption of traditional business models for value creation and capture, discussing platform models like Facebook and Twitter. To date, Twitter has clearly done a good job “creating value.” But unlike Facebook, it continues to struggle with the capture part of the equation.
Social collaboration is not about technology. It’s about connecting people, and it’s changing the way business is being conducted. Similarly, gamification is not about games. It’s about motivating the personal and professional behaviors that drive business value. Together, social collaboration and gamification help companies reap great benefits — among them, the ability to deepen customer relationships, drive operational efficiencies, and optimize their workforce.
Roadmaps have two key functions in strategy planning. The first is to outline planned architectural changes that will deliver the required strategies; the second is to outline alternative ways to achieve the same results.
Just as recent global events have given us reason to pause and reflect, the pace of technology emergence and disruption is proving to be a source of inspiration and uncertainty. Transitioning to a digital world is front-of-mind for many business executives, yet finding the right path is an ongoing challenge. So we asked Cutter’s team of experts for their insights on some of the technologies, trends, and strategies that will be relevant in 2017 and beyond. In typical Cutter Business Technology Journal fashion, our call produced a wide range of opinions and reflections worthy of consideration as you chart your business technology journey for the new year.
Artificial general intelligence (AGI) is currently emerging as an area where recent developments are likely to have a major impact on the way organizations do business, societies organize themselves, and even on how we address values and ethics.
The fact is that AGI already exists in our daily life. A common example is the GPS systems present in many new cars manufactured today; and let’s not forget the drones being used to deliver pizzas and cars that drive themselves. While automatic pilots have been used in commercial planes for quite some time, what AGI is about to offer to general business and human activity is well beyond what most of us have seen so far.
2017 is going to be a year of strange winners, and perhaps the strangest of all will be a giant leap away from technology and back to solutions that don’t rely on 24/7 connectivity. With the onslaught of major hacks and Facebook embarrassment, the antitech crowd may have its best year in decades.
One of the most prevalent blockchains in the world, Ethereum, is poised to switch from a proof-of-work (POW) algorithm to a proof-of-stake (POS) algorithm, likely in 2017, with the release of the Casper codebase. Why does this matter? Because blockchain technology is becoming increasingly relevant and prevalent in businesses across the globe. It holds great potential to disrupt how businesses perform basic transactions, from payments, to programmable, self-executing contracts, to identity verification.