SlideShare uma empresa Scribd logo
1 de 22
IoT Application
Development
Understand Your Options and Make
Sound Architectural Choices
Gordon Van Huizen
VP Platform Strategy
Topics
• IoT Scenarios
• Key Challenges and Architectural Concerns
• Selecting an IoT Application Development Approach
IoT Scenarios
Agriculture
Aviation
Pharma – Chain of Custody
Entertainment
Key Challenges and
Architectural Concerns
IoT Logical Architecture
Different Approaches for IoT Communication
The IoT Technology Stack
IoT Software
The Digital Twin: Not Just APIs
Class Instance DT — Digital Twin OT— Operational Technology
b
Digital Twin
To ITTo OT
Instance State
Instance Log of Events
ThingAPI
TwinAPI
Instance Context Data
Metadata (Rules, Models, Id)
Stream Analytics/Learning
Instance Graph References
Adapters, Quality, Integration
Security, Identity
Twin-to-Twin API
Management API
Custom Code
Physical
Things
Information
Systems
Source:Gartner
Making Sense of IoT Data
Selecting an IoT Application
Development Approach
IoT App Requirements
• Ingest IoT data and analyze
for trends
• Operate autonomously when
possible
• Associate IoT events with
business data and documents
• Support multi-channel plus
new interaction models
IoT Apps are Fundamentally Mode 2
Source:Gartner
What are the challenges of delivering IoT apps?
IoT requires rapid experimentation,
frequent iteration and close collaboration
between business and IT.
Lack of Agility
Teams often struggle to integrate the
heterogeneous mix of endpoints, IoT
services, and big data required.
Technical
Complexity
IoT requires hard-to-find skills spanning
multiple technology disciplines.Skills Shortage
Leverage a Low-Code Approach
Model-Driven Development
using shared communication
1-Click Deployment
of web & mobile applications
Agile Project Management
drives Business & IT collaboration
Central Application Governance
maintains IT control
Recommendations
Recommendations
1. Adopt a platform-based
approach to simplify IoT
development
2. Utilize best-of-breed IoT
and Big Data services as
needed
3. Create a Mode 2
organization if none exists
4. Begin experimenting today!
Download the on-demand webinar to
learn more about IoT application
development
Download Webinar

Mais conteúdo relacionado

Mais de Mendix

Practical Steps for Insurers to Get Started with Digital Execution
Practical Steps for Insurers to Get Started with Digital ExecutionPractical Steps for Insurers to Get Started with Digital Execution
Practical Steps for Insurers to Get Started with Digital ExecutionMendix
 
Building the Digital Insurer
Building the Digital InsurerBuilding the Digital Insurer
Building the Digital InsurerMendix
 
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)Mendix
 
Navigating the Road to Enterprise App Delivery Success [infographic]
Navigating the Road to Enterprise App Delivery Success [infographic]Navigating the Road to Enterprise App Delivery Success [infographic]
Navigating the Road to Enterprise App Delivery Success [infographic]Mendix
 
7 Principles of Agile Enterprises
7 Principles of Agile Enterprises7 Principles of Agile Enterprises
7 Principles of Agile EnterprisesMendix
 
11 Steps to Tune Your Enterprise App Machine
11 Steps to Tune Your Enterprise App Machine11 Steps to Tune Your Enterprise App Machine
11 Steps to Tune Your Enterprise App MachineMendix
 

Mais de Mendix (6)

Practical Steps for Insurers to Get Started with Digital Execution
Practical Steps for Insurers to Get Started with Digital ExecutionPractical Steps for Insurers to Get Started with Digital Execution
Practical Steps for Insurers to Get Started with Digital Execution
 
Building the Digital Insurer
Building the Digital InsurerBuilding the Digital Insurer
Building the Digital Insurer
 
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)
Infographic: The Rapid App Wars (The Story of a Warp Speed Digital Enterprise)
 
Navigating the Road to Enterprise App Delivery Success [infographic]
Navigating the Road to Enterprise App Delivery Success [infographic]Navigating the Road to Enterprise App Delivery Success [infographic]
Navigating the Road to Enterprise App Delivery Success [infographic]
 
7 Principles of Agile Enterprises
7 Principles of Agile Enterprises7 Principles of Agile Enterprises
7 Principles of Agile Enterprises
 
11 Steps to Tune Your Enterprise App Machine
11 Steps to Tune Your Enterprise App Machine11 Steps to Tune Your Enterprise App Machine
11 Steps to Tune Your Enterprise App Machine
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

IoT Application Development: Make Sound Architectural Choices

  • 1. IoT Application Development Understand Your Options and Make Sound Architectural Choices Gordon Van Huizen VP Platform Strategy
  • 2. Topics • IoT Scenarios • Key Challenges and Architectural Concerns • Selecting an IoT Application Development Approach
  • 6. Pharma – Chain of Custody
  • 10. Different Approaches for IoT Communication
  • 13. The Digital Twin: Not Just APIs Class Instance DT — Digital Twin OT— Operational Technology b Digital Twin To ITTo OT Instance State Instance Log of Events ThingAPI TwinAPI Instance Context Data Metadata (Rules, Models, Id) Stream Analytics/Learning Instance Graph References Adapters, Quality, Integration Security, Identity Twin-to-Twin API Management API Custom Code Physical Things Information Systems Source:Gartner
  • 14. Making Sense of IoT Data
  • 15. Selecting an IoT Application Development Approach
  • 16. IoT App Requirements • Ingest IoT data and analyze for trends • Operate autonomously when possible • Associate IoT events with business data and documents • Support multi-channel plus new interaction models
  • 17. IoT Apps are Fundamentally Mode 2 Source:Gartner
  • 18. What are the challenges of delivering IoT apps? IoT requires rapid experimentation, frequent iteration and close collaboration between business and IT. Lack of Agility Teams often struggle to integrate the heterogeneous mix of endpoints, IoT services, and big data required. Technical Complexity IoT requires hard-to-find skills spanning multiple technology disciplines.Skills Shortage
  • 19. Leverage a Low-Code Approach Model-Driven Development using shared communication 1-Click Deployment of web & mobile applications Agile Project Management drives Business & IT collaboration Central Application Governance maintains IT control
  • 21. Recommendations 1. Adopt a platform-based approach to simplify IoT development 2. Utilize best-of-breed IoT and Big Data services as needed 3. Create a Mode 2 organization if none exists 4. Begin experimenting today!
  • 22. Download the on-demand webinar to learn more about IoT application development Download Webinar