<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Thu, 16 Apr 2026 10:40:53 GMT</lastBuildDate>
        <link>https://www.techtarget.com/iotagenda</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/definition/5G"&gt;5G&lt;/a&gt; cellular represents a significant improvement over 4G for IoT applications because it provides a foundational network that can handle the unique and demanding requirements of a truly massive-scale, real-time connected world.&lt;/p&gt; 
&lt;p&gt;While 4G and its IoT-specific variants, such as long-term evolution for machines (LTE-M) and narrowband IoT (NB-IoT), have been successful in connecting millions of devices for simpler use cases, 5G's core design principles address and surpass the limitations of 4G, opening the door for new and more intricate capabilities and applications.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Top benefits of 5G for IoT"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top benefits of 5G for IoT&lt;/h2&gt;
 &lt;p&gt;The improvements to IoT primarily relate to latency, device density, energy efficiency and coverage, as well as network and ecosystem flexibility.&lt;/p&gt;
 &lt;p&gt;Here's a breakdown.&lt;/p&gt;
 &lt;h3&gt;Low latency&lt;/h3&gt;
 &lt;p&gt;The most critical improvement is extremely low latency, which is the near-instantaneous speed at which data travels between devices on the network. 4G networks have a typical latency of around 50-100 milliseconds (ms), which is fine for streaming video or browsing the web but unacceptable for applications that require immediate feedback. 5G can reduce latency to as low as 1 ms, a transformative leap that enables time-sensitive use cases such as industrial automation and smart infrastructure. This low latency is essential for creating a genuinely responsive and automated IoT ecosystem.&lt;/p&gt;
 &lt;h3&gt;Device density&lt;/h3&gt;
 &lt;p&gt;Beyond speed, 5G's architecture is designed to support a vastly greater number of devices. Where 4G can support around 100,000 devices per square kilometer, 5G is engineered to handle up to 1 million devices in the same area. This massive IoT capability is crucial for &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-city"&gt;smart city&lt;/a&gt; deployments, where countless sensors for traffic management, utility meters and environmental monitoring need to coexist on the same network without causing congestion.&lt;/p&gt;
 &lt;p&gt;The combination of low latency and massive device density enables real-time data transfer and analysis, which is crucial for applications such as industrial automation, remote control of assets and real-time video monitoring.&lt;/p&gt;
 &lt;h3&gt;Network slicing&lt;/h3&gt;
 &lt;p&gt;5G also introduces &lt;a href="https://www.techtarget.com/whatis/definition/network-slicing"&gt;network slicing&lt;/a&gt;, which allows mobile operators to create dedicated, virtual networks on a single physical infrastructure. This means an IoT application, such as a smart grid, can have its own customized slice of the network optimized for its specific needs, such as high reliability and low latency, without being affected by traffic from other applications. This flexibility ensures guaranteed quality of service for critical IoT uses.&lt;/p&gt;
 &lt;h3&gt;IoT network support&lt;/h3&gt;
 &lt;p&gt;5G cellular support of low-power wide area network (&lt;a href="https://www.techtarget.com/iotagenda/definition/LPWAN-low-power-wide-area-network"&gt;LPWAN&lt;/a&gt;) standards, including NB-IoT and LTE-M, delivers improvements over 4G by providing significantly better energy efficiency and deeper indoor and subterranean coverage, which are crucial for low-data, long-lifecycle IoT devices.&lt;/p&gt;
 &lt;p&gt;NB-IoT is a cellular-based LPWAN and a key component of 5G's massive machine type communications (mMTC) capabilities. It's designed for low-bandwidth, low-power IoT applications like smart meters, sensors and asset trackers.&lt;/p&gt;
 &lt;p&gt;LTE-M, which is also under the 5G mMTC umbrella, offers slightly higher bandwidth and supports mobility, making it suitable for things like fleet management and wearables. 5G networks deliver improved outcomes for LTE-M, not by replacing it but by enhancing its capabilities and integrating it into a more powerful and flexible ecosystem. Both NB-IoT and LTE-M operate on &lt;a href="https://www.techtarget.com/searchnetworking/answer/Whats-the-difference-between-licensed-and-unlicensed-wireless"&gt;licensed cellular spectrum&lt;/a&gt;, which means governments have allocated specific frequencies to them to guard against interference and ensure performance and reliability.&lt;/p&gt;
 &lt;h3&gt;Enhanced reliability&lt;/h3&gt;
 &lt;p&gt;5G provides a more stable and robust connection, ensuring that mission-critical IoT devices, such as those in healthcare or manufacturing, can operate with consistent, uninterrupted service.&lt;/p&gt;
 &lt;h3&gt;High-speed data&lt;/h3&gt;
 &lt;p&gt;With speeds up to 100 times faster than 4G, 5G enables rapid data transfer for bandwidth-intensive IoT applications like high-definition video applications and real-time data analysis.&lt;/p&gt;
 &lt;h3&gt;Improved energy efficiency&lt;/h3&gt;
 &lt;p&gt;5G networks offer improved energy efficiency, a key benefit for IoT devices that often rely on batteries. By using technologies such as LPWAN and advanced sleep modes, 5G can extend the battery life of IoT devices like sensors and smart meters, making long-term deployments more practical.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/iota-data_rates_and uses_iot_connectivity-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/iota-data_rates_and uses_iot_connectivity-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/iota-data_rates_and uses_iot_connectivity-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/iota-data_rates_and uses_iot_connectivity-f.png 1280w" alt="Graphic comparing data rates of IoT network standards" height="294" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                     
&lt;section class="section main-article-chapter" data-menu-title="5G powering IoT improvements"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G powering IoT improvements&lt;/h2&gt;
 &lt;p&gt;5G's mMTC capabilities are what enable it to support a significantly higher density of devices than 4G. They are essential for large-scale deployments such as smart cities and factories, where countless sensors and devices must communicate simultaneously without network congestion.&lt;/p&gt;
 &lt;p&gt;In addition, 5G's network slicing feature enables operators to create virtual, isolated networks tailored to the specific needs of an IoT application, ensuring guaranteed performance, security and bandwidth for specialized tasks, which is a significant step up from the one-size-fits-all approach of previous generations.&lt;/p&gt;
 &lt;p&gt;Here are the IoT use cases and applications that have gained substantially from 5G's capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Autonomous vehicles.&lt;/b&gt; The ultra-low latency and high-bandwidth capabilities of 5G enable &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/driverless-car"&gt;autonomous vehicles&lt;/a&gt; to communicate in real time with other vehicles (vehicle-to-vehicle, or V2V) and with infrastructure (V2I) and the cloud (V2C), allowing for instantaneous data exchange crucial for critical functions such as collision avoidance, cooperative maneuvering and dynamic route optimization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Manufacturing.&lt;/b&gt; 5G -- especially &lt;a href="https://www.techtarget.com/searchnetworking/definition/private-5G"&gt;private 5G&lt;/a&gt; -- enhances manufacturing operations by enabling rapid rearrangement of factory floors, improving worker safety and product quality, and facilitating reliable, real-time collaboration.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Mining, oil and gas.&lt;/b&gt; 5G networks enhance mining by enabling real-time remote control of heavy machinery, facilitating widespread deployment of &lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt; sensors for environmental and equipment monitoring, and improving worker safety through low-latency communication for autonomous vehicles and real-time location tracking.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Healthcare.&lt;/b&gt; 5G has transformed healthcare by enabling remote robotic surgeries, facilitating real-time patient monitoring through connected medical devices, and powering secure, high-definition telehealth consultations -- all of which expand access to specialized care, particularly in rural or underserved areas.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Robotics.&lt;/b&gt; IoT-enabled robotics benefit significantly from 5G connectivity due to its high bandwidth and low latency, which are essential for real-time data exchange. This enables robots to make instant, coordinated decisions and perform complex tasks such as autonomous navigation with greater precision and reliability.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Boa8srjKzCI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="New opportunities and applications 5G brings to IoT"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;New opportunities and applications 5G brings to IoT&lt;/h2&gt;
 &lt;p&gt;Bolstered by 5G connectivity, IoT is set for significant growth over the next three to five years as the integration of AI and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge computing&lt;/a&gt; fuels innovations across an expanding array of industries, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Smart cities.&lt;/b&gt; 5G can enable smart cities to deploy vast networks of interconnected IoT sensors and devices with more flexibility and intelligence, thereby augmenting real-time data collection and analysis to optimize traffic flow, manage energy grids, improve public safety and streamline waste management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Energy and utilities.&lt;/b&gt; The energy sector benefits from a smarter, more resilient grid through real-time monitoring and control, which allows for rapid detection and isolation of faults, efficient integration of renewable energy sources and dynamic demand-response programs that optimize energy use.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Private 5G networks.&lt;/b&gt; Private 5G networks can enable a new wave of IoT applications by providing dedicated, intelligent, highly secure and ultra-low-latency networks that are essential for mission-critical operations and real-time automation in industries such as manufacturing, logistics and healthcare.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Satellite coverage.&lt;/b&gt; The continued build-out of 5G networks, including low-band and satellite integration, can bring reliable IoT connectivity to remote and rural areas, unlocking new applications such as precision agriculture, environmental monitoring and asset tracking.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Precision agriculture.&lt;/b&gt; 5G allows for automated monitoring and management of crops and widespread use of drones that rely on instantaneous communication for safe operation.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Thanks to its many advantages over 4G -- especially its massive device density, along with extremely low latency that enables near-instantaneous communication -- 5G marks a fundamental leap forward for IoT to support a truly large-scale, real-time connected world.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ron Westfall is vice president and practice leader for infrastructure and networking at HyperFRAME Research, where he covers topics such as hybrid cloud, AI, security, edge computing, wired and wireless networking, 5G and IoT.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>5G's low latency, massive device density, energy efficiency and flexibility are tailor-made for the networking demands of a future IoT-connected world.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/iot_g1176495633.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/feature/5G-driving-IoT-innovation-Key-use-cases-and-applications</link>
            <pubDate>Wed, 12 Nov 2025 12:04:00 GMT</pubDate>
            <title>5G driving IoT innovation: Key use cases and applications</title>
        </item>
        <item>
            <body>&lt;p&gt;An intelligent agent is a program that can perceive its environment, make decisions, take action and perform services based on its environment, user input and previous experiences. Examples of such experiences include prior training and user feedback. An intelligent agent can be used to autonomously gather information on a regular schedule or when a user prompts it in real time. These agents are also referred to as a &lt;a href="https://www.techtarget.com/whatis/definition/bot-robot"&gt;bot&lt;/a&gt;, which is short for &lt;i&gt;robot&lt;/i&gt;.&lt;/p&gt; 
&lt;p&gt;Typically, an agent program &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/The-role-of-AI-parameters-in-the-enterprise"&gt;uses parameters the user provides&lt;/a&gt; and searches a trusted knowledge base, such as the internet or internal business data sources. It gathers information relevant to the user, processes data to perform analytics and make decisions or recommendations, and presents the results to users on a periodic or on-demand basis. Data intelligent agents can extract and categorize specific information, such as keywords or publication dates.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are agents in artificial intelligence?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are agents in artificial intelligence?&lt;/h2&gt;
 &lt;p&gt;Agents that use artificial intelligence (AI) and machine learning can gather data through &lt;a href="https://www.techtarget.com/whatis/definition/sensor"&gt;sensors&lt;/a&gt;, such as microphones and cameras, to perceive the real-world environment. Their decisions can drive actuators, such as speakers and displays, to deliver output to the user. Output can be in the form of text-to-speech where users hear audible output. The practice of having an agent bring information to a user is called &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/push-notification"&gt;push notification&lt;/a&gt; technology.&lt;/p&gt;
 &lt;p&gt;A common characteristic of intelligent agents is adaptation through learning and optimization. This is based on experience, real-time problem-solving, analysis of error or success rates, and the use of memory-based storage and retrieval.&lt;/p&gt;
 &lt;p&gt;Enterprises often use intelligent agents in data science applications, such as &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/data-mining"&gt;data mining&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data-analytics"&gt;data analytics&lt;/a&gt;, as well as for &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/customer-service-and-support"&gt;customer service and support&lt;/a&gt;. Intelligent agents are a vital part of AI-driven business workflow automation. Consumers use them to compare the prices of similar products, receive purchase recommendations and get notifications when relevant events occur, such as a website update.&lt;/p&gt;
 &lt;p&gt;Intelligent agents are similar to software agents, which are autonomous computer programs.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_an_intelligent_agent_works-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_an_intelligent_agent_works-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_an_intelligent_agent_works-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_an_intelligent_agent_works-f.png 1280w" alt="Diagram of how an intelligent agent works and interacts with its environment
" height="252" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;An intelligent agent interacts with its environment through sensors and actuators.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Why intelligent agents matter for enterprises"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why intelligent agents matter for enterprises&lt;/h2&gt;
 &lt;p&gt;Intelligent agents have become vital for the enterprise, providing a range of benefits. Cloudera's &lt;i&gt;The Future of Enterprise AI Agents&lt;/i&gt; 2025 &lt;a target="_blank" href="https://www.cloudera.com/about/news-and-blogs/press-releases/2025-04-16-96-percent-of-enterprises-are-expanding-use-of-ai-agents-according-to-latest-data-from-cloudera.html" rel="noopener"&gt;report&lt;/a&gt; found that 96% of the 1,500 enterprise IT leaders it surveyed plan to expand the use of AI agents in the next 12 months. Specifically, they are aiming to develop performance optimization bots (66%), security monitoring capabilities (63%) and development assistants (62%).&lt;/p&gt;
 &lt;p&gt;Intelligent agents can help in the following areas:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Automate complex tasks.&lt;/b&gt; Business workflows are cumbersome and complex. Intelligent agents can automate many of these tasks. They provide faster outcomes with fewer errors, while maintaining data security, meeting compliance demands and establishing consistency that's &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Artificial-intelligence-vs-human-intelligence-How-are-they-different"&gt;difficult to maintain with human processes&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improve efficiency.&lt;/b&gt; Intelligent agents can operate around the clock, ensuring service anytime it's needed. By &lt;a href="https://www.techtarget.com/searchbusinessanalytics/tip/Generative-AI-capabilities-increase-data-analytics-value"&gt;tackling mundane tasks&lt;/a&gt;, it also frees human employees to operate at a more strategic level and focus on new opportunities that add business value.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Drive business decision-making.&lt;/b&gt; Traditional businesses rarely are able to make decisions based on all available data. Intelligent agents collect and analyze enormous amounts of data to make predictions, suggest new opportunities and guide business decisions in real-time. They can also respond quickly in dynamic and fast-moving business conditions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enhance user experience.&lt;/b&gt; Intelligent agents are effective analytical platforms able to assess and predict with startling accuracy. They're ideal for customer-facing tasks, such as product recommendations, &lt;a href="https://www.techtarget.com/whatis/definition/personalization-engine"&gt;personalization engines&lt;/a&gt; and personalized assistants. These capabilities improve user experience, drive revenue and build brand loyalty.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Connect siloed data sources.&lt;/b&gt; Businesses possess vast volumes of seemingly unrelated data that's often overlooked or ignored in everyday decision-making. By accessing and processing all this data, intelligent agents eliminate &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data-silo"&gt;data silos&lt;/a&gt; and identify information and trends that human analysts might overlook.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How intelligent agents work"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How intelligent agents work&lt;/h2&gt;
 &lt;p&gt;Intelligent AI agents use a recursive process of perception, planning, action and learning in the following ways:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Perception.&lt;/b&gt; This is the process of gathering information obtained from many sources, including user input, &lt;a href="https://www.techtarget.com/whatis/definition/knowledge-base"&gt;knowledge bases&lt;/a&gt;, internet content, business data sources, and internet-of-things, and real-world devices, such as cameras or microphones. Perception also can include preprocessing of input data, such as breaking down a user prompt into &lt;a href="https://www.techtarget.com/whatis/definition/token"&gt;tokens&lt;/a&gt; or analyzing a camera image to identify an object&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Planning.&lt;/b&gt; Also called &lt;i&gt;reasoning&lt;/i&gt;, planning is the use of &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithms&lt;/a&gt; and analytics to process collected data. The agent considers the user's intended goal and then plans a course of action to achieve it. This can involve finding answers to a user's question or determining a series of steps affecting devices in the real world, such as steering an &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/driverless-car"&gt;autonomous vehicle&lt;/a&gt;. To do this, the agent often will break a process into numerous subtasks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Action. &lt;/b&gt;This forms the execution phase of the agent's behavior where the planned steps are carried out. Actions include interfacing with data sources, collaborating with other agents, using application performance interfaces and interacting with systems or devices to complete each step. Errors or unforeseen results from a step must be &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/Real-world-agentic-AI-examples-and-use-cases"&gt;clarified or reinforced by a human&lt;/a&gt;. The action phase is finished when the agent renders a decision, yields requested data or completes a real-world action.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Learning.&lt;/b&gt; The agent determines the difference between the intended or requested outcome and the actual outcome. Ideally, the intended and actual outcomes are identical, and the agent yields an optimal result. However, there can be unexpected or suboptimal outcomes. By measuring the difference and understanding the underlying reasons, the agent learns and optimizes its performance for future iterations. In some cases, the difference is measured objectively. In other cases, human operators provide feedback on the results.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Types of intelligent agents"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of intelligent agents&lt;/h2&gt;
 &lt;p&gt;Intelligent agents are defined by their functions, capabilities and intelligence as follows:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Simple reflex agents. &lt;/b&gt;These agents function in a current state, ignoring past history. Responses are based on the event-condition-action or ECA rule, where a user initiates an event and the agent refers to a list of preset rules and preprogrammed outcomes. Simple reflex agents are often the basis of straightforward &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/chatbot"&gt;chatbots&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Model-based reflex agents.&lt;/b&gt; These agents work in the same way as reflex agents, but they have a more comprehensive view of their environments. A model of the world is programmed into the internal system that incorporates the agent's history. The agents typically have access to more comprehensive data and previous experience. They're used in more sophisticated AI environments, such as autonomous vehicles.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Goal-based agents.&lt;/b&gt; These agents, also referred to as &lt;i&gt;rational agents&lt;/i&gt;, expand on the information that model-based agents store by including goal information or information about desirable situations. This lets them formulate the steps or courses of action needed to accomplish a goal. They're frequently used in analytical AI, such as chess AI, business automation and optimization systems.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Utility-based agents.&lt;/strong&gt; These agents are similar to goal-based ones, but they provide an extra utility measurement that rates each possible scenario on its desired result and then chooses the action that maximizes the outcome. Rating criteria includes the probability of success and the resources required. These agents are typically used in vertical AI platforms, such as &lt;a href="https://www.techtarget.com/searcherp/tip/Use-cases-for-generative-AI-in-finance"&gt;financial trading&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/AI-in-medical-diagnostics-and-decision-making"&gt;healthcare diagnostics&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Learning agents.&lt;/b&gt; These agents can gradually improve and become more knowledgeable about an environment over time through a &lt;a href="https://www.techtarget.com/whatis/definition/machine-learning-algorithm"&gt;learning algorithm&lt;/a&gt;. The learning element utilizes feedback on performance measures to determine how performance elements should be adjusted to gradually improve the agent's performance. This concept describes how an AI system should operate. Most intelligent agents have some learning capabilities, but learning agents are tailored to optimize future behaviors to achieve better and more efficient outcomes.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Examples of intelligent agents"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Examples of intelligent agents&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/virtual-assistant-AI-assistant"&gt;AI assistants&lt;/a&gt; such as Alexa and Siri are examples of intelligent AI agents that use sensors to perceive a user request and automatically collect data from the internet without the user's help. They can gather information about their observable environments, such as weather and time.&lt;/p&gt;
 &lt;p&gt;Google Assistant is another example of an intelligent AI agent. It uses machine learning and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/natural-language-processing-NLP"&gt;natural language processing&lt;/a&gt; technology to answer users' questions and perform tasks, such as calling contacts stated in voice commands.&lt;/p&gt;
 &lt;p&gt;Autonomous vehicles can also be considered intelligent robotic agents. They use sensors, &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Global-Positioning-System"&gt;Global Positioning System&lt;/a&gt; navigation, weather and traffic conditions, and cameras for reactive decision-making in the real world to maneuver through traffic.&lt;/p&gt;
 &lt;p&gt;Tech vendors are developing &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/autonomous-artificial-intelligence-autonomous-AI"&gt;autonomous AI&lt;/a&gt; agents that require less human intervention and oversight, as OpenAI's release of GPT-4 and GPT-5 demonstrated. A fully autonomous agent would be considered &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/artificial-general-intelligence-AGI"&gt;artificial general intelligence&lt;/a&gt;, where the AI agents are sentient and don't require guidance from human agents at all, but it's a theoretical concept and not yet in use.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Enterprise use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Enterprise use cases&lt;/h2&gt;
 &lt;p&gt;There are countless uses for intelligent agents across various industries and operations. A cross-section of uses for intelligent agents includes the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Customer experience (CX).&lt;/b&gt; Intelligent agents can provide a foundation for many types of automated services, such as IT service requests, ticketing, password resets and account access. Human agents use intelligent agents to speed access to customer data and prior interactions that can enhance &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/customer-experience-CX"&gt;CX&lt;/a&gt; with current requests.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Human resources (HR).&lt;/b&gt; Intelligent agents can streamline routine HR processes, such as &lt;a href="https://www.techtarget.com/searchhrsoftware/definition/employee-onboarding-and-offboarding"&gt;employee onboarding or offboarding&lt;/a&gt;. Agents can also automate the collection and processing of HR forms, help employees access HR policies and procedures, such as the vacation scheduling process, and answer questions about benefits.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Finance.&lt;/b&gt; Intelligent agents can process and analyze vast amounts of data to assist with financial tasks, such as fraud detection and financial compliance. Agents can assist with completing and filing tax and other business documents, aid employees in expense submissions and reconcile invoices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Procurement.&lt;/b&gt; Intelligent agents can enhance routine procurement processes, managing vendor agreements, contracts and licenses. Agents can help with logistics and supply chain management tasks as well.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Sales and Marketing.&lt;/b&gt; Intelligent agents can help sales staff schedule calls and manage lead and account information through &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/CRM-customer-relationship-management"&gt;customer relationship management&lt;/a&gt; platforms to ensure that sales staff can access leads quickly and accurately. Agents also use account histories and purchasing patterns to create targeted sales campaigns and perform customer satisfaction analytics.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Operations.&lt;/b&gt; Intelligent agents can help with different backend tasks, such as generating documents and reports, and analyzing data to provide business insights. They can identify potential risks, automate complex business workflows, flag suspicious network and system activities, and provide &lt;a href="https://www.techtarget.com/searcherp/feature/Predictive-maintenance-Definition-benefits-example-strategy"&gt;predictive maintenance&lt;/a&gt; for manufacturing equipment or vehicle fleets.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Benefits and challenges of intelligent agents"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits and challenges of intelligent agents&lt;/h2&gt;
 &lt;p&gt;Intelligent agents are powerful and complex AI entities capable of providing value to the enterprise. However, there are technical and business issues to consider before building and deploying agents. Some major benefits of intelligent agents can include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Better efficiency.&lt;/b&gt; Intelligent agents automate routine or repetitive tasks, speeding business processes that are faster and more accurate, compliant and consistent. This also lets human employees focus on more creative or strategic tasks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fewer errors.&lt;/b&gt; The consistency provided by intelligent agents can reduce the oversights and errors encountered with human interaction. This is important with complex, error-prone tasks that can have a significant effect on the business.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data-driven decisions.&lt;/b&gt; Business leaders want help making the best decisions, but it's easy to overlook, forget or dismiss data. Intelligent agents incorporate vast amounts of seemingly unrelated data to provide insights that humans might not recognize. This can yield faster and more accurate &lt;a href="https://www.techtarget.com/searchbusinessanalytics/tip/Key-steps-form-a-data-driven-decision-making-framework"&gt;business decision-making&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;More availability.&lt;/b&gt; Agents can operate 24/7, enabling continuous operation for some tasks, such as customer service, on a global scale.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cost savings.&lt;/b&gt; The efficiencies and capabilities intelligent agents provide can reduce business expenses, as well as reduce the costs associated with human oversights and mistakes.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Despite the benefits, intelligent agents can pose several formidable challenges that must be considered. The following are some of the challenges involved with intelligent agents:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Design complexity.&lt;/b&gt; Intelligent agents can be complex and costly to build and deploy. The design complexity and the nuances involved in their training add a level of uncertainty to their performance and reliability that can trouble business leaders.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integration complexity.&lt;/b&gt; Intelligent agents must be able to access an assortment of data sources, applications and systems. It can be difficult to design an agent with the necessary integrations and update the agent as new integrations are needed. This can result in inefficient or problematic data flows.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Potential bias.&lt;/b&gt; Intelligent agents are built from algorithms and trained on sample data. &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-bias-algorithm-bias-or-AI-bias"&gt;Machine learning bias&lt;/a&gt; in algorithms and poor-quality data, such as insufficient, incomplete or inaccurate data, can yield outcomes that are discriminatory or sub-optimal for some user groups. Bias mitigation and accuracy are critical for reliable AI operation, as well as appropriate &lt;a href="https://www.techtarget.com/searchsecurity/definition/corporate-governance"&gt;business governance&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Ethics and explainability.&lt;/b&gt; Organizations must ensure that intelligent agents are employed ethically -- accessing business data for acceptable business purposes -- and take concrete steps to prevent intelligent agents from being used improperly or illegally. Further, business governance often requires &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/How-to-audit-AI-systems-for-transparency-and-compliance"&gt;transparency into the agent's algorithms and training data&lt;/a&gt;, ensuring that intelligent agents perform and make decisions in ways that are predictable, repeatable and well-understood by business leaders and regulators.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security and data privacy.&lt;/b&gt; Intelligent agents can access and process enormous volumes of sensitive or &lt;a href="https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII"&gt;personally identifiable information&lt;/a&gt;. This raises the risk of data breaches because the agents can provide attackers with new and unproven vectors of attack. Similarly, the ways that agents process, store and render data also carries data privacy risks that can violate compliance regulations.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="The future of intelligent agents"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The future of intelligent agents&lt;/h2&gt;
 &lt;p&gt;Intelligent agents are evolving fast. They will become more autonomous and able to handle tasks faster and better. They will also get better at collaborating, integrating and learning. Some future developments to watch are expected to include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Greater autonomy.&lt;/b&gt; Automation isn't a new idea, and automated agents, such as chatbots, have been available for years. However, these older platforms relied on rules and guardrails, and often require constant human oversight. Future intelligent agents will be capable of startling autonomy and will learn, adapt and operate with greater levels of independence.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Task complexity.&lt;/b&gt; Intelligent agents can parse tasks into smaller executable actions or steps. This trend will continue to enable agents to perform ever larger and more complex tasks without the need for specific programming or modifications. This, in turn, will further facilitate greater agent autonomy.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Better collaboration.&lt;/b&gt; Agents are rarely ubiquitous and are often task specific. This requires multiple agents operating together to collaborate and share data to execute desirable actions. This capability will accelerate and offer highly specific and capable agents that are composed as needed to handle large, complex tasks.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Better integration.&lt;/b&gt; Agents require access to data, networks and systems through varied integration mechanisms. But integration can limit the data, applications and systems that an agent can interact with. Integrations will improve, possibly giving rise to new AI agent integration standards. This will enable more data and systems to interoperate and support more complex problem-solving and decision-making capabilities.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enhanced learning.&lt;/b&gt; Intelligent agents can learn from their outcomes to identify errors and optimize results. This ability will also become refined over time, giving agents more seamless abilities to gauge outcomes and adjust behaviors with great autonomy.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;&lt;u&gt;Stephen J. Bigelow, senior technology editor at TechTarget, has more than 30 years of technical writing experience in the PC and technology industry.&lt;/u&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>An intelligent agent is a program that can perceive its environment, make decisions, take action and perform services based on its environment, user input and previous experiences.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchenterpriseai/definition/agent-intelligent-agent</link>
            <pubDate>Tue, 04 Nov 2025 09:00:00 GMT</pubDate>
            <title>What is an intelligent agent? Definition, use cases and benefits</title>
        </item>
        <item>
            <body>&lt;p&gt;To understand the benefits and challenges of using &lt;a href="https://www.techtarget.com/iotagenda/Ultimate-IoT-implementation-guide-for-businesses"&gt;IoT&lt;/a&gt; in construction, consider the environmental sensors designed to monitor temperature and humidity. These sensors, which can be installed at job sites in a compact puck form, aim to improve worker safety by detecting conditions that might lead to heat exhaustion and other weather-related health issues. They also identify situations that could lead to equipment malfunction.&lt;/p&gt; 
&lt;p&gt;But the small, portable sensors also have a knack for disappearing when attached to a stud or a pillar. Tim Gaylord, corporate director of innovation at DPR Construction, based in Redwood City, Calif., said construction workers might seal off environmental pucks in walls as construction progresses.&lt;/p&gt; 
&lt;p&gt;"If it's not part of their scope, and they don't realize what it's for, and they need to close that wall up; it's getting closed up," he said. "It happens all the time."&lt;/p&gt; 
&lt;p&gt;IoT, however, has found a home in the construction industry in applications ranging from worker safety to asset management -- despite the rigors of an active job site.&lt;/p&gt; 
&lt;p&gt;The technology gives builders more visibility over job sites and a mechanism for tracking the machinery and vehicles of the trade. The data collected through IoT sensors, once analyzed, offers insights that can improve efficiency and scheduling, as well as enable preventive maintenance.&lt;/p&gt; 
&lt;p&gt;Such benefits are driving demand among construction companies. Grand View Research pegged the global market for IoT in construction at $11.46 billion in 2023 and forecast a 16.2% annual growth rate through 2030. That's a significant &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/How-businesses-are-using-AI-in-the-construction-industry"&gt;investment from an industry&lt;/a&gt; that has not traditionally been an early adopter of technology.&lt;/p&gt; 
&lt;p&gt;IoT adopters, however, face the aforementioned job site issues and must also learn to manage large-scale deployments effectively.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/4FxU-xpuCww?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Types of IoT in the construction industry"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of IoT in the construction industry&lt;/h2&gt;
 &lt;p&gt;The construction industry uses several categories of IoT technology, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Wearable technology.&lt;/b&gt; Health monitors such as wrist bands and armbands keep track of body temperature, heart rate, hydration and other factors.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Environmental sensors.&lt;/b&gt; Devices installed at job sites monitor temperature, humidity and particulate matter.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Material monitors.&lt;/b&gt; Sensors embedded in concrete or other materials can keep tabs on curing and identify structures that need repair.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Asset trackers.&lt;/b&gt; Equipment outfitted with &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Global-Positioning-System"&gt;GPS&lt;/a&gt; and sensor devices helps organizations keep tabs on the location of construction tools and machinery.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fleet management technology. &lt;/b&gt;IoT devices can track construction vehicles, monitor fuel consumption and &lt;a href="https://www.computerweekly.com/news/366627978/AI-driven-predictive-maintenance-gaining-traction"&gt;support predictive maintenance&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Site monitoring systems.&lt;/b&gt; Cameras and drones are used for site surveillance and progress tracking.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What are the leading use cases for IoT in the construction industry?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the leading use cases for IoT in the construction industry?&lt;/h2&gt;
 &lt;p&gt;There are four major use cases of IoT in construction.&lt;/p&gt;
 &lt;h3&gt;Environmental monitoring&lt;/h3&gt;
 &lt;p&gt;Gaylord called environmental sensing a "no-brainer" IoT use case. His team tests emerging technologies and identifies those with the potential for scaling at the builder. This use case has proven out, he noted, adding that it's recommended for deployment at job sites.&lt;/p&gt;
 &lt;p&gt;Environmental sensors, which monitor temperature, humidity and dust, help keep workers safe and protect machinery from weather extremes and airborne particles that can lead to equipment failure.&lt;/p&gt;
 &lt;h3&gt;Worker health and safety&lt;/h3&gt;
 &lt;p&gt;Worker health and safety is also among the top use cases for IoT in construction, according to industry executives.&lt;/p&gt;
 &lt;p&gt;"Site safety is probably our biggest driver right now," said Dimitris Bountolos, chief information and innovation officer at Ferrovial, an infrastructure management and construction company based in Spain.&lt;/p&gt;
 &lt;p&gt;Ferrovial has developed pedestrian detection systems that use 3D vision and machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;) to identify people in real time. Bountolos said the application has proven a game-changer for preventing collisions between heavy machinery and workers on construction sites.&lt;/p&gt;
 &lt;p&gt;Bountolos said the construction company also uses &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/wearable-technology"&gt;wearable devices&lt;/a&gt; to monitor worker location, fatigue levels and exposure to hazards. The wearables-based system can trigger alerts if unsafe site conditions are developing.&lt;/p&gt;
 &lt;p&gt;Gaylord said the safety use case is a major focus for his team, particularly given the heat stress in markets such as Arizona, Southern California and the Southeast. DPR is testing sensors and wearables to prevent dehydration and heat exhaustion on job sites.&lt;/p&gt;
 &lt;p&gt;"Heat-related illnesses are a major problem, not just for DPR but the industry," Gaylord said.&lt;/p&gt;
 &lt;h3&gt;Operational efficiency: Asset and fleet management&lt;/h3&gt;
 &lt;p&gt;IoT use cases that promote higher job site efficiency are also popular in construction. The industry is tightly linked to macroeconomic and geopolitical trends across regions, noted Ajithkumar Nandakumar, vice president, global strategic delivery initiatives for Hitachi Digital Services' IoT practice. He said engineering, procurement and construction firms use technology to help manage economic booms and downcycles.&lt;/p&gt;
 &lt;p&gt;"The top priority is on operational efficiency, and this is where technology and, in particular, IoT play a key role," Nandakumar said.&lt;/p&gt;
 &lt;p&gt;Within that broad use case, Gaylord cited tool asset management as an important IoT focus. Large sites have loads of tools, power buggies and scissor lifts that can easily go missing or become underutilized. Identifying idle rental equipment results in cost savings.&lt;/p&gt;
 &lt;p&gt;"When we first deployed [tool asset management] on one of our large mega data centers, we quickly realized that several large pieces of machinery, which were pretty costly month to month, were sitting," Gaylord said.&lt;/p&gt;
 &lt;p&gt;Unused equipment can be sent back to the supplier before the rental renewal or redeployed at the construction site.&lt;/p&gt;
 &lt;p&gt;Bountolos, meanwhile, cited fleet management as a solid use case for construction IoT. He said Ferrovial focuses on equipment performance, fuel monitoring, usage analytics and predictive maintenance to manage heavy-equipment operations. The company has also begun using ML for demand forecasting and equipment utilization patterns, he added.&lt;/p&gt;
 &lt;p&gt;Nandakumar also cited fleet monitoring as an efficiency use case, along with asset maintenance, worker safety and energy management.&lt;/p&gt;
 &lt;h3&gt;Road monitoring&lt;/h3&gt;
 &lt;p&gt;The road monitoring use case combines GPS, LiDAR remote sensing and AI to create infrastructure heatmaps and risk maps, which Bountolos described as "centimeter-accurate." He added that Ferrovial's system detects and issues alerts on hazards, including potholes, debris and damaged guardrails.&lt;/p&gt;
&lt;/section&gt;                      
&lt;section class="section main-article-chapter" data-menu-title="Benefits of using IoT technology in construction"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of using IoT technology in construction&lt;/h2&gt;
 &lt;p&gt;Construction companies that invest in IoT can anticipate advantages that tend to cluster around a few areas.&lt;/p&gt;
 &lt;h3&gt;Improved visibility and management&lt;/h3&gt;
 &lt;p&gt;Smart badges and wearables, coupled with IoT-enabled access control, offer improved resource oversight at job sites featuring numerous trades such as carpenters, masons, electricians, drywall installers and machine operators.&lt;/p&gt;
 &lt;p&gt;The technology lets construction companies track resources once they badge in, said Ankoor Amin, innovation and sustainability leader at OES Equipment, part of the DPR family of companies. Sensors provide insight into head count for a given trade and a given location at the site, as well as whether those numbers match the construction schedule, he noted.&lt;/p&gt;
 &lt;p&gt;"That gives us a superpower these days in construction, if you can sense all of that without having to go out and send an army of supervisors to manage your trades," he said.&lt;/p&gt;
 &lt;h3&gt;Data-driven decision-making&lt;/h3&gt;
 &lt;p&gt;IoT captures and analyzes real-time data, providing actionable insights across the construction lifecycle, Bountolos said. This lets project managers "make much more informed decisions based on what's happening on-site, rather than relying on assumptions or delayed reports."&lt;/p&gt;
 &lt;h3&gt;Reduced downtime&lt;/h3&gt;
 &lt;p&gt;Real-time equipment monitoring and automation reduce manual intervention and minimize downtime, Bountolos said. In addition, predictive maintenance and resource optimization, which stem from continuous data collection and analysis from connected devices, provide project timeline and cost benefits, he added.&lt;/p&gt;
 &lt;h3&gt;Improved risk mitigation&lt;/h3&gt;
 &lt;p&gt;Better job site visibility, real-time data for decision-making and the ability to predict maintenance issues all contribute to managing risk and boosting safety.&lt;/p&gt;
 &lt;p&gt;"IoT performs extremely well on the safety front," Bountolos said. "Instead of reacting to incidents after they happen, we can actually prevent them."&lt;/p&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Challenges of implementing IoT in construction"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges of implementing IoT in construction&lt;/h2&gt;
 &lt;p&gt;Construction firms can expect to encounter several obstacles as they deploy IoT. Here are a few potential pitfalls:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;User adoption. &lt;/b&gt;Companies deploying IoT must show workers how it will benefit them without adding complexity. Training and change management programs can help introduce a new technology.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Harsh conditions. &lt;/b&gt;IoT devices must have sufficient ruggedization to function in a difficult environment. Battery life and on-site recharging options are also important issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Infrastructure. &lt;/b&gt;IoT devices require on-site connectivity, such as dependable internet access. Some IoT deployments require gateway units that collect data and transmit it for processing locally or in the cloud.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data management and analysis. &lt;/b&gt;IoT devices stream massive amounts of data. Technology adopters need to consider their ability to manage and analyze data effectively to get the most out of their investment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data privacy. &lt;/b&gt;Construction companies must consider &lt;a href="https://www.techtarget.com/searchcio/definition/data-privacy-information-privacy"&gt;data privacy&lt;/a&gt; issues when sharing worker data in the cloud, for example.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Ergonomics. &lt;/b&gt;Technology adopters must ensure wearables are light, comfortable and don't interfere with work.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Best practices for implementing IoT in construction"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices for implementing IoT in construction&lt;/h2&gt;
 &lt;p&gt;Against the backdrop of expected benefits and challenges, here are a few approaches to consider when deploying IoT.&lt;/p&gt;
 &lt;h3&gt;Select and pilot an appropriate IoT use case&lt;/h3&gt;
 &lt;p&gt;Choosing the right use case for deployment should be based on a comprehensive business value analysis rather than its perceived "coolness," Nandakumar stated.&lt;/p&gt;
 &lt;p&gt;He also recommended a fail-fast-to-scale-faster approach as critical for the construction industry, given the rugged conditions in which workers and assets operate. That means running pilots in field conditions to select the appropriate technology and devices for the selected IoT use case, he noted.&lt;/p&gt;
 &lt;h3&gt;Dedicate personnel to manage IoT sensor deployment&lt;/h3&gt;
 &lt;p&gt;"The biggest fail point with these IoT sensors is the management of the system," Gaylord said. "It's like a full-time job to make sure all the sensors are active, they are in the right spot and folks aren't moving them."&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    The biggest fail point with these IoT sensors is the management of the system.
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Tim Gaylord&lt;/strong&gt;Corporate director of innovation, DPR Construction
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Wearables also require oversight, especially on large projects with 1,000 or more people.&lt;/p&gt;
 &lt;p&gt;"How do you make sure that everyone on your site has one?" Gaylord said.&lt;/p&gt;
 &lt;h3&gt;Dedicate personnel to infrastructure management&lt;/h3&gt;
 &lt;p&gt;Amin emphasized the importance of a construction team's commitment to maintaining the infrastructure that an IoT implementation requires. That task includes making sure networking and connectivity expand as construction progresses. Gateways must be installed on additional floors as a building rises, for example.&lt;/p&gt;
 &lt;p&gt;"Somebody better be in charge of expanding the network, making sure the infrastructure scales as we build," Amin said.&lt;/p&gt;
 &lt;p&gt;He recommended assigning a resource, or resources, to maintain infrastructure. The challenge here is that managing IoT isn't a typical job function on a construction site: "You are adding something to somebody's plate," he said.&lt;/p&gt;
 &lt;h3&gt;Focus on cybersecurity&lt;/h3&gt;
 &lt;p&gt;Bountolos recommended investing in a strong &lt;a href="https://www.techtarget.com/searchsecurity/The-ultimate-guide-to-cybersecurity-planning-for-businesses"&gt;cybersecurity&lt;/a&gt; architecture from the outset to prevent breaches.&lt;/p&gt;
 &lt;p&gt;"Construction sites are already vulnerable environments -- you can't afford to add digital vulnerabilities on top of physical ones."&lt;/p&gt;
 &lt;div class="imagecaption alignLeft"&gt;
  &lt;a href="https://www.constructiondive.com/link/6395/?utm_medium=referral&amp;amp;utm_campaign=TTG-SearchCIOarticle29042025"&gt;&lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/want_more_construction_tech_news-h.jpg" alt="Constructive Dive image."&gt;&lt;/a&gt;Click the image above for more information on the construction industry.
 &lt;/div&gt;
&lt;/section&gt;                  
&lt;section class="section main-article-chapter" data-menu-title="What is the future of IoT in the construction industry?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the future of IoT in the construction industry?&lt;/h2&gt;
 &lt;p&gt;Industry executives see IoT evolving to incorporate AI. Nandakumar pointed to autonomous operations through &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/cognitive-computing"&gt;cognitive computing&lt;/a&gt; and human-in-the-loop approaches as the way forward in the construction industry. He said the trend is already taking shape, amid the &lt;a href="https://www.computerweekly.com/feature/Industry-50-What-is-it-and-what-does-its-future-hold"&gt;transition to Industry 5.0&lt;/a&gt; and the arrival of generative AI models.&lt;/p&gt;
 &lt;p&gt;The "agentification" of processes will also rapidly proliferate into all aspects of construction, he added. AI agents will result in safer and better operations, as well as a sustainable way of working.&lt;/p&gt;
 &lt;p&gt;Amin, meanwhile, added robotics to &lt;a href="https://www.techtarget.com/iotagenda/tip/AI-and-IoT-How-do-the-internet-of-things-and-AI-work-together"&gt;AI and IoT&lt;/a&gt; in the emerging technology mix, noting that they enable each other. He noted that AI helps generate more insight from cameras and other data-capture devices, while IoT lends location and contextual awareness to robotics.&lt;/p&gt;
 &lt;p&gt;"That evolution is happening in parallel," Amin said.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;John Moore is a writer for Informa TechTarget covering the CIO role, economic trends and the IT services industry.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The use of IoT in the construction industry aims to improve safety, efficiency and decision-making. However, construction companies should carefully manage deployments.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/iot_g1157534820.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/IoT-in-construction-Use-cases-benefits-and-challenges</link>
            <pubDate>Fri, 01 Aug 2025 13:32:00 GMT</pubDate>
            <title>IoT in construction: Use cases, benefits and challenges</title>
        </item>
        <item>
            <body>&lt;p&gt;A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.&lt;/p&gt; 
&lt;p&gt;Smart home technology -- also often referred to as &lt;em&gt;home automation&lt;/em&gt; or &lt;i&gt;domotics &lt;/i&gt;from the Latin word "domus&lt;i&gt;,&lt;/i&gt;"&lt;i&gt; &lt;/i&gt;meaning home -- provides homeowners security, comfort, convenience and energy efficiency by letting them control smart devices, often using a &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-home-app-home-automation-app"&gt;smart home app&lt;/a&gt; on their smartphone or another networked device.&lt;/p&gt; 
&lt;p&gt;A part of the internet of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt;), smart home systems and devices often operate together, sharing consumer usage data among themselves and automating actions based on the homeowners' preferences.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/IC0mkHh7MaA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does smart home technology work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does smart home technology work?&lt;/h2&gt;
 &lt;p&gt;A smart home isn't a collection of disparate smart devices and appliances, but rather ones that work together to create a remotely controllable network.&lt;/p&gt;
 &lt;p&gt;All devices -- such as lights, thermostats, security systems and appliances -- are controlled by a primary home automation controller, often called a &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-home-hub-home-automation-hub"&gt;smart home hub&lt;/a&gt;. This hub is a hardware device that acts as the central point of the smart home system and can sense, process data and communicate wirelessly. It combines all the disparate apps into a single smart home app that homeowners can control remotely.&lt;/p&gt;
 &lt;p&gt;Examples of smart home hubs include Amazon Echo, Google Home and Wink Hub. While many smart home products use &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Wi-Fi"&gt;Wi-Fi&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Bluetooth"&gt;Bluetooth&lt;/a&gt; to connect to the smart home network, others depend on wireless protocols such as Zigbee or &lt;a href="https://www.techtarget.com/iotagenda/definition/Z-Wave"&gt;Z-Wave&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The figure below presents a basic smart home, using either a smart home gateway or a wireless base system, to link devices together and to the Internet.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/configuring_a_smart_home-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/configuring_a_smart_home-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/configuring_a_smart_home-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/configuring_a_smart_home-f.png 1280w" alt="Basic smart home configuration diagram." height="324" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Basic smart home configuration.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Smart home devices can be programmed to follow specific schedules or commands or set to respond to voice commands through home assistants such as Amazon Alexa or &lt;a href="https://www.techtarget.com/whatis/definition/Google-Assistant"&gt;Google Assistant&lt;/a&gt;. For example, a smart thermostat can learn the homeowner's habits and automatically adjust the temperature based on their specific schedule.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Examples of smart home technologies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Examples of smart home technologies&lt;/h2&gt;
 &lt;p&gt;Nearly every aspect of life where technology has entered the domestic space -- including lightbulbs, dishwashers and other appliances -- has seen the introduction of a smart home alternative. The next figure depicts the many types of activities that can be addressed by a smart home system. This section will look at smart home systems and devices:&lt;/p&gt;
 &lt;h3&gt;Smart home devices&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Smart TVs.&lt;/b&gt; These TVs connect to the internet to access content through applications, such as on-demand video and music. Some smart TVs also include voice or gesture recognition.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart thermostats.&lt;/b&gt; Smart thermostats, such as Google Nest, come with integrated Wi-Fi, letting users schedule, monitor and remotely control home temperatures. These devices also learn homeowners' behaviors and automatically modify settings to provide them with maximum comfort and efficiency. Smart thermostats can also report energy use and remind users to change filters.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart door locks and garage door openers.&lt;/b&gt; Homeowners can use smart locks and garage-door openers to grant or deny access to visitors. Smart locks can also detect when residents are near and unlock the doors for them.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart kitchen appliances.&lt;/b&gt; Brands such as LG, GE and Samsung offer smart kitchen appliances of all sorts. These appliances include smart coffee makers that can brew a fresh cup automatically at a programmed time; smart refrigerators that keep track of expiration dates, make shopping lists or even create recipes based on ingredients currently on hand; slow cookers and toasters; and, in the laundry room, washing machines and dryers&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart plugs.&lt;/b&gt; These connect to wall sockets to transform simple home devices, such as lamps and ceiling fans, into remote-controlled devices that can be controlled using mobile apps and voice assistants such as Alexa.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Smart home systems&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Smart lighting systems.&lt;/b&gt; In addition to being able to be controlled remotely and customized, smart lighting systems can detect when occupants are in the room and adjust lighting as needed. &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-bulb-smart-light-bulb"&gt;Smart lightbulbs&lt;/a&gt; can also regulate themselves based on daylight availability.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart security cameras and systems.&lt;/b&gt; With smart security cameras and doorbells, such as Ring, residents can monitor their homes when they're away. Smart motion sensors can identify the difference between residents, visitors, pets and burglars and can send notifications to authorities if suspicious behavior is detected.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart pet and lawn care.&lt;/b&gt; Pet care can be automated with connected feeders. Houseplants and lawns can be watered using connected timers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Smart household monitors.&lt;/b&gt; Household system monitors can, for example, sense a power surge and turn off appliances, sense water failures or freezing pipes and turn off the water so the home doesn't flood.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Amazon Echo, Google Home and Wink Hub.&lt;/b&gt; As noted earlier, these systems provide a foundation for a smart home. They also link with smart assistants like Amazon Alexa or Google Assistant&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/iota-smart_home.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/iota-smart_home_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/iota-smart_home_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/iota-smart_home.jpg 1280w" alt="Components of a smart home." height="364" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A multitude of devices and appliances can be seamlessly integrated into a smart home system.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Smart home pros and cons"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Smart home pros and cons&lt;/h2&gt;
 &lt;p&gt;Smart technology offers numerous advantages, ranging from the convenience of running household appliances such as the washing machine while at work to the comfort of remotely adjusting the thermostat on a chilly winter day.&lt;/p&gt;
 &lt;h3&gt;Pros of a smart home&lt;/h3&gt;
 &lt;p&gt;Advantages of smart home technology are many, and the technology has been proven over many years. The following are some key benefits:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Provides assurance.&lt;/b&gt; Homeowners can monitor their homes remotely, countering dangers such as a coffee maker left on or a front door left unlocked.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Accommodates user preferences for convenience.&lt;/b&gt; For example, users can program their garage door to open, the lights to go on, the fireplace to turn on and their favorite music to play once they arrive home.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Offers peace of mind.&lt;/b&gt; IoT devices enable family members or caregivers to remotely monitor the health and well-being of seniors, allowing them to safely remain at home without moving to an assisted residence.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improves efficiency. &lt;/b&gt;Instead of leaving the air conditioning on all day, a smart home system can learn homeowner behaviors to ensure the house is cooled down by the time they return home.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Saves resources and money.&lt;/b&gt; With a smart irrigation system, the lawn is watered only when needed and with the exact amount of water necessary. With home automation devices and a smart system setup, energy, water and other resources are used more efficiently, which helps save both natural resources and money for the consumer.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Manages tasks.&lt;/b&gt; Smart &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/virtual-assistant-AI-assistant"&gt;virtual assistants&lt;/a&gt;, such as Google Home or Amazon Echo, can accomplish tasks through &lt;a href="https://www.techtarget.com/searchunifiedcommunications/tip/3-use-cases-highlight-AI-and-speech-recognition-evolution"&gt;speech recognition and voice commands&lt;/a&gt;. For example, homeowners can use voice commands to turn on music, search the web and control their household smart devices.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Cons of a smart home"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cons of a smart home&lt;/h2&gt;
 &lt;p&gt;However, home automation systems have struggled to become mainstream, in part due to their technical nature. Common drawbacks of a smart home include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Requires a reliable internet connection.&lt;/b&gt; An unreliable internet connection or a network going down in the event of an outage can leave the devices and gadgets connected to a smart home inoperable.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Perceived complexity.&lt;/b&gt; Some people have difficulties or a lack of patience with technology. Smart home manufacturers and alliances are working on reducing complexity and improving the user experience to make it enjoyable and beneficial for users of all technical levels.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lack of standards.&lt;/b&gt; For home automation systems to be truly effective, devices must be interoperable regardless of manufacturer and use the same protocol or, at least, complementary ones. As it's a relatively new market, there's no gold standard for home automation yet. However, standard alliances are partnering with manufacturers and protocols to ensure interoperability and a seamless user experience.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Questionable security.&lt;/b&gt; &lt;a href="https://www.techtarget.com/iotagenda/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to-consider"&gt;IoT devices introduce security&amp;nbsp;&lt;/a&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to-consider" target="_blank" rel="noopener"&gt;challenges&lt;/a&gt; because most of them lack built-in encryption. In addition, they can serve as access points for the broader network's sensitive data, increasing the attack surface. If hackers can infiltrate a smart device, they could potentially turn off the lights and alarms and unlock the doors, leaving a home defenseless to a break-in.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lack of data privacy.&lt;/b&gt; Many smart homeowners also worry about data privacy. There is a growing concern regarding the security of their personal data collected and transmitted by smart home systems and devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Unauthorized access to systems and devices.&lt;/b&gt; Likewise, smart homeowners are just as concerned about the potential unauthorized access or control of smart devices without their permission. While smart home device and platform manufacturers collect consumer data to better tailor their products or offer new and improved services to customers, trust and transparency are critical to manufacturers looking to gain new customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Expense.&lt;/b&gt; Even though prices are coming down, many smart home devices are still expensive, and an entire house makeover could cost thousands of dollars.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to set up a smart home"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to set up a smart home&lt;/h2&gt;
 &lt;p&gt;Newly built homes are often constructed with a smart home infrastructure in place. Older homes, on the other hand, can be retrofitted with smart technologies.&lt;/p&gt;
 &lt;p&gt;Zigbee and Z-Wave are two of the most common smart home communications protocols in use today. Both use &lt;a href="https://www.techtarget.com/iotagenda/definition/mesh-network-topology-mesh-network"&gt;mesh network&lt;/a&gt; technologies and short-range, low-power radio signals to connect smart home systems. Though both target the same smart home applications, Z-Wave has a range of 30 meters versus Zigbee's 10 meters, with Zigbee often perceived as the more complex of the two. Zigbee chips are available from multiple companies, while Z-Wave chips are only available from Sigma Designs.&lt;/p&gt;
 &lt;p&gt;Also, Matter, a smart home standard that launched in 2022, continues to gain momentum. Developed by the Connectivity Standards Alliance -- previously the Zigbee Alliance -- Matter is supported by major smart home manufacturers including Amazon, Apple and Google. This &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/Internet-Protocol"&gt;IP&lt;/a&gt;-based protocol is specifically designed to solve the compatibility challenges of smart homes, providing a framework that facilitates seamless communication across devices, apps and cloud services.&lt;/p&gt;
 &lt;p&gt;Thread is another interoperability standard for smart homes. Developed in 2014, it is similar to Zigbee, operating as a low-power mesh network in the 2.4 GHz band with a service range of 20-30 meters. It is internet addressable, using the IPv6 and TCP protocols, as well as self-healing.&lt;/p&gt;
 &lt;p&gt;Some smart home systems can be created from scratch, for example, using a &lt;a href="https://www.techtarget.com/whatis/definition/Raspberry-Pi-35-computer"&gt;Raspberry Pi&lt;/a&gt; or other prototyping board. Other systems can be purchased as a bundled &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-home-kit-home-automation-kit"&gt;smart home kit&lt;/a&gt; (e.g., Apple's HomeKit) -- also known as a smart home platform -- that contains the pieces needed to start a home automation project.&lt;/p&gt;
 &lt;p&gt;While setting up a smart home can sometimes be complex, homeowners should consider the following general steps:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Invest in a strong, reliable internet connection. &lt;/b&gt;Because smart home connectivity relies heavily on an internet connection, it's important to ensure the homeowner has reliable and fast internet service.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Select the hub.&lt;/b&gt; It's important to decide which hub to use for a smart home. For example, if the homeowner wants a fully automated smart home, a hub that can centrally control every device is most likely required. However, in other cases, a virtual assistant that can link to other devices on the same network could suffice. Most average hubs might not include extra capabilities such as built-in voice control, even if they're compatible with a wide range of devices. On the other hand, smart speaker hubs, such as Amazon Echo, let users provide voice commands and accomplish various tasks, such as inquiring about the weather or requesting a grocery list.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Start with the basics.&lt;/b&gt; Start with basic items such as smart plugs, smart bulbs and switches for the smart home, as they're quick to set up and can easily automate many different things around the house. For example, smart plugs can automate fans, lights, lamps, slow cookers, curling irons and space heaters.&lt;/li&gt; 
  &lt;li&gt;Secure the devices. Because most IoT and smart home devices don't have built-in security or encryption, it's important to set up &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-5-password-hygiene-tips-and-best-practices"&gt;strong passwords and multifactor authentication&lt;/a&gt; to prevent unauthorized access to these devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Add more devices.&lt;/b&gt; As the homeowner becomes more comfortable with creating a smart home, they can add more devices, such as security systems, cameras and video doorbells, to the mix.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;In simple smart home scenarios, events can be timed or triggered. Timed events are based on a clock, for example, lowering the blinds at 6 p.m., while triggered events depend on actions in the automated system; for example, when the owner's smartphone approaches the door, the smart lock unlocks and the smart lights go on.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;Machine learning&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt; are becoming increasingly popular in smart home systems, enabling home automation applications to adapt to their environments. For example, voice-activated systems, such as Amazon Echo or Google Home, contain virtual assistants that learn and personalize the smart home to the residents' preferences and patterns.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Smart buildings"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Smart buildings&lt;/h2&gt;
 &lt;p&gt;Enterprise, commercial, industrial and residential buildings of all shapes and sizes -- including offices, skyscrapers, apartment buildings and multi-tenant offices and residences -- are deploying IoT technologies to improve building efficiency, reduce energy costs and environmental damage, ensure security and improve occupant satisfaction. The image below depicts a smart building architecture.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iota-smart_building_architect.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iota-smart_building_architect_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iota-smart_building_architect_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iota-smart_building_architect.png 1280w" alt="Smart building framework" height="387" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;AI and machine learning are increasingly being used to set up smart home systems and buildings.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Many of the same smart technologies used in the smart home are also deployed in smart building technology, including lighting, energy, heating and air conditioning, and security and building access systems.&lt;/p&gt;
 &lt;p&gt;For example, a &lt;a href="https://www.techtarget.com/iotagenda/post/Transforming-buildings-to-be-smart-and-sustainable"&gt;smart building can reduce energy costs&lt;/a&gt; using sensors that detect how many occupants are in a room. The temperature can automatically adjust, turning on cool air if sensors detect a full conference room, or turning the heat down if everyone in the office has gone home for the day. Such systems can also use light and heat sensors to raise or lower sunshades in sun-facing rooms, especially conference rooms where many people can gather.&lt;/p&gt;
 &lt;p&gt;Smart buildings can also connect to the smart grid. Here, smart building components and the electric grid can &lt;i&gt;talk&lt;/i&gt; and &lt;i&gt;listen&lt;/i&gt; to each other. This technology can manage energy distribution more efficiently, handle maintenance proactively and power outages can be responded to more quickly.&lt;/p&gt;
 &lt;p&gt;Beyond these benefits, smart buildings can provide building owners and managers with predictive maintenance. Janitors, for example, can refill restroom supplies when usage sensors monitoring the soap or paper towel dispensers indicate they are low. Maintenance and failures can also be predicted in building refrigeration, elevators and lighting systems.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="The origins of the smart home"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The origins of the smart home&lt;/h2&gt;
 &lt;p&gt;Smart home technology has come a long way in the past few decades. The following timeline shows significant events in the history of smart home technology:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;1975.&lt;/b&gt; With the release of X10, a communication protocol for home automation, the smart home, once a pipe dream a la &lt;i&gt;The Jetsons&lt;/i&gt;, came to life. X10 sends 120 kHz &lt;a href="https://www.techtarget.com/searchnetworking/definition/radio-frequency"&gt;radio frequency&lt;/a&gt; bursts of digital information onto a home's existing electric wiring to programmable outlets or switches. These signals convey commands to corresponding devices, controlling how and when the devices operate. A transmitter could, for example, send a signal along the house's electric wiring, telling a device to turn on at a specific time. However, because electrical wiring isn't designed to be free from radio-band &lt;i&gt;noise&lt;/i&gt;, X10 wasn't always fully reliable. Signals would be lost and, in some cases, signals wouldn't cross circuits that were wired on different polarities, created when 220-volt service is split into a pair of 100-volt feeds, as is common in the U.S. Additionally, X10 was initially a one-way technology, so while smart devices can take commands, they can't send data back to a central network. Later, however, two-way X10 devices became available, albeit at a higher cost.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;1984.&lt;/b&gt; The American Association of Home Builders coined the term &lt;i&gt;smart house&lt;/i&gt; to promote the concept of technology in home design.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2005.&lt;/b&gt; Home automation company Insteon introduced technology that combined electric wiring with wireless signals. Other protocols, including Zigbee and Z-Wave, have since emerged to counter the problems associated with X10.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2007.&lt;/b&gt; The first smart TVs were released. They offered integrated internet-connected services, such as streaming and access to user-generated content.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2011.&lt;/b&gt; Newly founded &lt;a href="https://www.techtarget.com/iotagenda/definition/Nest-Labs"&gt;Nest Labs&lt;/a&gt; released its first smart product, the Nest Learning Thermostat. The company also created smart smoke and carbon monoxide detectors and security cameras. After being acquired by Google in 2015, Nest became a subsidiary of Alphabet Inc.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2012.&lt;/b&gt; SmartThings Inc. launched a Kickstarter campaign, raising $1.2 million to fund its smart home system. Following additional funding, the company entered the market in August 2013 and was acquired by Samsung in 2014.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2014.&lt;/b&gt; Amazon Echo, Amazon Alexa and Apple HomeKit were introduced, making a giant leap in voice-enabled smart devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2016-2018.&lt;/b&gt; The arrival of smart speakers, such as Google Home, Google Nest, Apple HomePod and Sonos, signaled a significant shift in how users interacted with smart home devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Today.&lt;/b&gt; Home automation trends continue to evolve, with more connectivity options and features.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="The future of smart homes"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The future of smart homes&lt;/h2&gt;
 &lt;p&gt;Future developments in smart device technology will combine language models and virtual assistants, such as &lt;a href="https://www.techtarget.com/whatis/definition/ChatGPT"&gt;ChatGPT&lt;/a&gt;. Some companies are already using this technology to build their own personal assistants, while Amazon is currently working on a large language model (&lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM"&gt;LLM&lt;/a&gt;) to improve Alexa.&lt;/p&gt;
 &lt;p&gt;Further developments in smart home technology in the coming years are expected to include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Use of AI will personalize the smart home experience by learning homeowner routines, automating various functions, and keeping devices operating properly through predictive analytics to optimize energy, facilitate maintenance and protect the environment&lt;/li&gt; 
  &lt;li&gt;Look-ahead security capabilities will analyze a variety of metrics, such as physical movements, locking and unlocking the home, driving into and out of a garage, and internal and external surveillance data to ensure that the home is secure&lt;/li&gt; 
  &lt;li&gt;Systems will improve livability through monitoring air quality, stress and sleep activities; kitchens might even recommend specific dietary changes to improve health.&lt;/li&gt; 
  &lt;li&gt;Future infrastructures will be able to connect virtually any device, regardless of the vendor, using advanced protocols like Matter and Thread.&lt;/li&gt; 
  &lt;li&gt;Aging populations might benefit from homes that monitor their health, mobility and dietary needs.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Smart home ecosystems of the future will be able to adapt to just about any requirement a homeowner needs while protecting privacy and the environment.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;When selecting the appropriate IoT communication protocol, it's important to recognize that not all protocols fit every device or deployment. Explore &lt;/i&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/Top-12-most-commonly-used-IoT-protocols-and-standards"&gt;&lt;i&gt;top IoT protocols and standards&lt;/i&gt;&lt;/a&gt;&lt;i&gt; to find the best one for your needs.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/4.jpg</image>
            <link>https://www.techtarget.com/iotagenda/definition/smart-home-or-building</link>
            <pubDate>Thu, 31 Jul 2025 12:00:00 GMT</pubDate>
            <title>What is a smart home? Everything you need to know</title>
        </item>
        <item>
            <body>&lt;p&gt;The use of &lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt; technologies in healthcare has grown significantly over the past decade and is expected to keep growing in the years ahead.&lt;/p&gt; 
&lt;p&gt;One report from The Business Research Company put the healthcare IoT market at $231.71 billion in 2024 and predicted it will hit $282.23 billion in 2025 and then $616.29 billion in 2029. That's a compound annual growth rate of 21.6%.&lt;/p&gt; 
&lt;p&gt;The transformative power of IoT in healthcare, the demonstrative benefits IoT offers to patients and the overall digital transformation happening in the medical industry all contribute to significant growth.&lt;/p&gt; 
&lt;p&gt;IoT in the healthcare sector, also called the internet of medical things (&lt;a href="https://www.techtarget.com/iotagenda/definition/IoMT-Internet-of-Medical-Things"&gt;IoMT&lt;/a&gt;), includes various technologies: sensors that collect patient biometric data, networks that transmit data and computers that process the data.&lt;/p&gt; 
&lt;p&gt;When those technologies come together in an IoT environment, they enable patients and their healthcare providers to analyze and respond to data in near real time. This offers a level of accuracy and speed that was impossible without that technology.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Top applications of IoT in healthcare"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top applications of IoT in healthcare&lt;/h2&gt;
 &lt;p&gt;Healthcare entities use IoMT in myriad ways to improve clinical operations, patient experiences and patient outcomes. Here are nine use cases of IoT in healthcare.&lt;/p&gt;
 &lt;h3&gt;1. Remote patient monitoring&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/virtualhealthcare/feature/Common-remote-patient-monitoring-tools"&gt;RPM is among the most common&lt;/a&gt; and visible examples of IoT in healthcare. Patients use devices to measure or monitor one or more vital signs -- i.e., heart rate, blood pressure, glucose levels and temperature.&lt;/p&gt;
 &lt;p&gt;The device can send the metrics to a care team's computer systems for review and analysis at regular intervals, or the metrics can only be sent outside of preset parameters, which could indicate medical issues requiring attention.&lt;/p&gt;
 &lt;p&gt;For example, IoT-enabled monitoring can be set up to alert clinicians if a smart thermometer detects a fever in a patient recovering from surgery at home, as a rise in temperature could signal an infection. Patients and their healthcare teams can also analyze collected data to help diagnose conditions or gain insights into existing ones.&lt;/p&gt;
 &lt;p&gt;All these uses aim to help keep patients as healthy as possible and ensure timely treatment of acute issues if they occur.&lt;/p&gt;
 &lt;h3&gt;2. Telehealth enablement&lt;/h3&gt;
 &lt;p&gt;IoMT is also essential for many virtual medical visits and &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/How-AI-has-cemented-its-role-in-telemedicine"&gt;telehealth capabilities&lt;/a&gt;. Using connected medical devices -- from consumer-grade wearable health trackers to connected imaging systems -- for monitoring, collecting and transmitting patient data in real time enables more effective virtual consultations and telehealth care.&lt;/p&gt;
 &lt;p&gt;This speeds up the delivery of care and treatment to homebound and rural patients and reduces costly hospital visits.&lt;/p&gt;
 &lt;h3&gt;3. Medication management and adherence&lt;/h3&gt;
 &lt;p&gt;Connected medical dispensers, such as inhalers, insulin pens and pill containers, can be programmed to remind patients when to take their medicine and to dispense the proper dosage at the right time. Moreover, these connected dispensers can &lt;a href="https://www.techtarget.com/pharmalifesciences/feature/Formulating-a-specialty-drug-management-playbook-using-expert-insights"&gt;track whether patients took their medication&lt;/a&gt; and send reports to the care team.&lt;/p&gt;
 &lt;p&gt;This real-world data is more accurate than self-reporting from patients, and it helps both patients and clinical teams manage even complex medication schedules, ensure adherence to treatment plans and prevent errors -- all of which improve patient outcomes.&lt;/p&gt;
 &lt;h3&gt;4. Ingestible sensors&lt;/h3&gt;
 &lt;p&gt;These are small IoMT-enabled devices that patients swallow. The devices enter and pass through the gastrointestinal tract, where they measure temperature, pH levels and other health indicators using biosensors.&lt;/p&gt;
 &lt;p&gt;They are typically powered by microbatteries, biofuel cells or energy harvested from the body's environment. &lt;a href="https://www.techtarget.com/searchnetworking/answer/Telemetry-vs-SNMP-Is-one-better-for-network-management"&gt;Wireless telemetry transmits data&lt;/a&gt; clinicians can use to diagnose conditions without performing more invasive procedures, such as endoscopy.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/top_9_applications_of_iot_in_healthcare-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/top_9_applications_of_iot_in_healthcare-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/top_9_applications_of_iot_in_healthcare-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/top_9_applications_of_iot_in_healthcare-f.png 1280w" alt="Visual list of key IoT applications in healthcare" height="403" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;5. Mood monitoring&lt;/h3&gt;
 &lt;p&gt;Healthcare providers also use connected devices for mood monitoring and management, finding that IoMT can provide accurate, real-time information about a patient's feelings.&lt;/p&gt;
 &lt;p&gt;The use of IoMT here involves wearable devices, biosensors, mobile apps and AI programs designed to recognize emotions and physiological signals indicating certain moods.&lt;/p&gt;
 &lt;p&gt;IoMT for mood monitoring and management can detect subtle changes in mental health, alert patients and caregivers of those changes and help determine whether and what interventions are needed -- ideally before patients experience a crisis.&lt;/p&gt;
 &lt;h3&gt;6. Enforcing safety policies and best practices, including hand hygiene monitoring&lt;/h3&gt;
 &lt;p&gt;IoMT is also used to ensure that personnel follow safety protocols, policies and best practices. For example, a &lt;a href="https://www.techtarget.com/virtualhealthcare/feature/5-elements-of-smart-hospital-rooms"&gt;hospital can use RFID tags&lt;/a&gt;, wearable badges and sensors to track staff movements to confirm they adhere to infectious disease control measures or mandated hand hygiene procedures.&lt;/p&gt;
 &lt;p&gt;A doctor's office can use environmental sensors to monitor temperature and humidity to ensure proper medication storage. In such cases, medical institutions can use wireless communication technology, such as Bluetooth Low Energy (BLE), to transmit data from endpoints to central compute resources like the cloud, where systems analyze data and produce reports on compliance levels.&lt;/p&gt;
 &lt;h3&gt;7. Equipment and asset tracking, monitoring and maintenance&lt;/h3&gt;
 &lt;p&gt;The healthcare industry uses IoT technologies to monitor equipment and assets, too, mirroring the use of IoT in other sectors such as manufacturing and logistics.&lt;/p&gt;
 &lt;p&gt;Healthcare institutions can attach &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-sensor"&gt;smart sensors&lt;/a&gt;, RFID tags or BLE beacons to medical equipment, such as portable X-ray machines or wheelchairs, enabling real-time location tracking from centralized dashboards. This use of IoT reduces equipment loss and optimizes inventory management.&lt;/p&gt;
 &lt;h3&gt;8. Predictive maintenance&lt;/h3&gt;
 &lt;p&gt;Like many others, the healthcare industry also uses IoT technologies to enable a proactive approach to maintaining its equipment and assets.&lt;/p&gt;
 &lt;p&gt;Sensors on medical equipment and other assets gather data about the usage and condition of the machines. The sensors then send this data to computers, which combine it with information from different sources -- such as those provided by the machine manufacturers -- to determine the precise timing for maintenance.&lt;/p&gt;
 &lt;p&gt;This enables healthcare institutions to &lt;a href="https://www.gehealthcare.com/insights/article/beyond-downtime-redefining-predictive-medical-equipment-maintenance?" target="_blank" rel="noopener"&gt;optimize&lt;/a&gt; maintenance schedules, keep equipment operating at peak performance and prevent breakdowns that could affect patient care.&lt;/p&gt;
 &lt;h3&gt;9. Robotic surgery&lt;/h3&gt;
 &lt;p&gt;Surgeons are harnessing the power of IoMT to perform operations more efficiently and effectively. For example, they use monitoring devices and analytics programs for advanced real-time monitoring during surgeries.&lt;/p&gt;
 &lt;p&gt;They also use connected surgical devices with AI-enabled computer vision and robotic capabilities for improved visualization and precision. These technologies automatically adjust to changing conditions, increasing the chances for positive patient outcomes.&lt;/p&gt;
&lt;/section&gt;                                  
&lt;section class="section main-article-chapter" data-menu-title="Future of IoT in healthcare"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future of IoT in healthcare&lt;/h2&gt;
 &lt;p&gt;The healthcare industry is at the early stages of using IoT to transform its care delivery, with researchers and healthcare leaders reporting that advances in connected systems, &lt;a href="https://www.techtarget.com/healthtechanalytics/feature/Top-12-ways-artificial-intelligence-will-impact-healthcare"&gt;AI and robotics are poised to revolutionize the sector&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;These technologies could help lower costs while further improving patient engagement, the patient experience, the clinician experience and -- most importantly -- patient outcomes.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Mary K. Pratt is an award-winning freelance journalist with a focus on covering enterprise IT and cybersecurity management.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>IoT in healthcare powers remote monitoring, telehealth, smart medication, mood tracking, safety compliance, robotic surgery and predictive maintenance for better care.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/health_g1202231901.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/Top-9-applications-of-IoT-in-healthcare</link>
            <pubDate>Mon, 28 Jul 2025 15:17:00 GMT</pubDate>
            <title>Top 9 applications of IoT in healthcare</title>
        </item>
        <item>
            <body>&lt;p&gt;Manufacturers are adopting various technologies to transform their operations, with the collection of technologies that make up the internet of things being some of the most crucial digital components driving their transformations.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt; enables organizations to collect and analyze data for more accurate, faster and automated decision-making; often, the goal is to have that decision-making occur in near real time without human intervention.&lt;/p&gt; 
&lt;p&gt;IoT comprises the following key technologies:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Sensors and other endpoint devices that collect data, such as temperature and vibration readings.&lt;/li&gt; 
 &lt;li&gt;Networks that transmit data from those endpoints to computing resources that can analyze, act on and store that data for further analysis.&lt;/li&gt; 
 &lt;li&gt;Compute power, including on-premises servers, cloud computing and &lt;a href="https://www.techtarget.com/searchnetworking/definition/edge-device"&gt;edge devices&lt;/a&gt;, which are specifically designed to process data close to the endpoints.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;IoT is often referred to as &lt;i&gt;industrial IoT&lt;/i&gt; (&lt;a href="https://www.techtarget.com/iotagenda/definition/Industrial-Internet-of-Things-IIoT"&gt;IIoT&lt;/a&gt;) when used in manufacturing.&lt;/p&gt; 
&lt;p&gt;The "2025 Smart Manufacturing and Operations Survey" from professional services firm Deloitte, which surveyed 600 executives from large manufacturing companies with headquarters or operations in the U.S, found that 46% of respondents use IIoT.&lt;/p&gt; 
&lt;p&gt;Many more, however, plan to adopt IIoT: A survey report titled "Expanding Industrial IoT Systems in 2025" from tech company HiveMQ, in collaboration with IIoT World, found that 70% of organizations were actively developing or deploying IIoT strategies.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Examples and use cases of IoT in manufacturing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Examples and use cases of IoT in manufacturing&lt;/h2&gt;
 &lt;p&gt;Here are 10 top &lt;a href="https://www.techtarget.com/iotagenda/tip/Top-8-IoT-applications-and-examples-in-business"&gt;IoT use cases&lt;/a&gt; in manufacturing, with examples of how manufacturers use IoT to transform their operations.&lt;/p&gt;
 &lt;h3&gt;1. Predictive maintenance of assets&lt;/h3&gt;
 &lt;p&gt;This is one of the oldest and most common uses of IoT in the industrial sector, including manufacturing.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/How-IoT-data-collection-works"&gt;Sensors on equipment collect data&lt;/a&gt; about machine usage and health and send that data to computing resources, which then analyze the data along with other information -- such as data provided by the machine manufacturers -- to accurately determine when the machines need servicing before problems or breakdowns occur.&lt;/p&gt;
 &lt;p&gt;This use of IoT helps manufacturers schedule maintenance at optimal times.&lt;/p&gt;
 &lt;h3&gt;2. Remote control of production processes&lt;/h3&gt;
 &lt;p&gt;Similarly, manufacturers can remotely monitor operations by analyzing data taken from sensors on machinery. Manufacturers then can use that analysis not only to make adjustments as operations are happening but to do so remotely, too.&lt;/p&gt;
 &lt;p&gt;For example, when the analysis indicates a problem with a specific machine, the manufacturer can use the interconnected devices to shift work away from that machine and distribute it to others instead. This capability helps manufacturers prevent or &lt;a href="https://www.techtarget.com/iotagenda/post/5-ways-IoT-can-improve-manufacturing-downtime"&gt;limit production downtime&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;3. Operational efficiency through automation&lt;/h3&gt;
 &lt;p&gt;Manufacturers can add automation to their IIoT environment by programming devices to take action when specific predetermined measurements and/or preset thresholds are hit.&lt;/p&gt;
 &lt;p&gt;For example, manufacturers can program machines to automatically shut down if video sensors detect an object or human getting too close to them or if a connected temperature gauge hits a certain reading indicating dangerously high heat.&lt;/p&gt;
 &lt;h3&gt;4. Safety enforcement and improvements&lt;/h3&gt;
 &lt;p&gt;The automation examples show how IIoT also improves safety in manufacturing facilities. Manufacturers can use sensors to measure and monitor the environment in numerous ways, &lt;a href="https://www.techtarget.com/searchdatacenter/tip/Data-center-temperature-and-humidity-guidelines"&gt;gathering data on temperatures&lt;/a&gt;, air quality, humidity and noise volume.&lt;/p&gt;
 &lt;p&gt;Analytics programs can then determine whether that data indicates a potential safety problem and, if automated, trigger remediations, alarms or shutdowns -- and it can typically do all that in mere fractions of a second.&lt;/p&gt;
 &lt;h3&gt;5. Inventory management improvements&lt;/h3&gt;
 &lt;p&gt;RFID tags and other endpoint devices can help track inventory as it moves from receiving to storage and into production, giving a manufacturer real-time visibility into current inventory levels as well as what inventory is where and in what stages of production.&lt;/p&gt;
 &lt;p&gt;Such data can then be combined with data from other endpoints in the manufacturing facility, such as data indicating production line capacity, as well as with data from corporate management systems, such as order management systems, to more effectively &lt;a href="https://www.techtarget.com/searcherp/tip/Best-practices-for-inventory-management"&gt;manage inventory levels&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;IIoT also helps with loss and theft prevention by giving manufacturers accurate, real-time visibility into their inventory.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/10_top_iot_use_cases_in_manufacturing-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/10_top_iot_use_cases_in_manufacturing-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/10_top_iot_use_cases_in_manufacturing-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/10_top_iot_use_cases_in_manufacturing-f.png 1280w" alt="Chart of 10 top IoT use cases in manufacturing." height="347" width="560"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;6. Supply chain optimization&lt;/h3&gt;
 &lt;p&gt;Manufacturers use real-time inventory tracking, IoT-enabled production line monitoring and data from demand forecasting systems to optimize their supply chains.&lt;/p&gt;
 &lt;p&gt;This lets them more accurately determine what supplies will be needed when, preventing overordering or excess inventory, as well as ordering too little or too late to meet demand -- all of which can be costly mistakes.&lt;/p&gt;
 &lt;h3&gt;7. Asset tracking, including fleet management&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searcherp/tip/RFID-vs-IoT-What-are-the-differences"&gt;RFID tags and sensors can track more&lt;/a&gt; than inventory: They can also track various assets, including fleets of vehicles, and provide real-time visibility into their locations, use patterns and conditions.&lt;/p&gt;
 &lt;p&gt;This data enables manufacturers to manage their assets more effectively and efficiently.&lt;/p&gt;
 &lt;h3&gt;8. Improved energy management and sustainability&lt;/h3&gt;
 &lt;p&gt;Endpoint devices can measure various resources, including energy, water and waste. Analyzing data from these devices also offers a detailed view of consumption patterns, such as whether one machine uses more energy than another of the same type, so that adjustments can be made to improve energy efficiency.&lt;/p&gt;
 &lt;p&gt;Manufacturers use data gathered from the various points in their connected environment to identify inefficiencies, determine the reasons for those inefficiencies and implement remediations to cut waste and &lt;a href="https://www.techtarget.com/iotagenda/feature/How-IoT-helps-support-sustainable-manufacturing"&gt;improve their sustainability&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;9. Quality control&lt;/h3&gt;
 &lt;p&gt;Sensors that measure a product's dimensions and technologies, such as computer vision systems, can gather data for analytics and machine learning programs to identify defects in real time as part of automated inspection systems.&lt;/p&gt;
 &lt;p&gt;These systems can work at a scale, speed and accuracy level that humans can't match, giving manufacturers a huge boost in their quality control capabilities.&lt;/p&gt;
 &lt;h3&gt;10. Digital twin enablement&lt;/h3&gt;
 &lt;p&gt;A &lt;a href="https://www.techtarget.com/searcherp/definition/digital-twin"&gt;digital twin&lt;/a&gt; is a virtual representation of a real entity, such as a manufacturing production environment or the actual physical product the manufacturer makes. Organizations use digital twins to monitor, control and optimize systems; run simulations that show how changes in one part of the environment can affect other areas; innovate; and more.&lt;/p&gt;
 &lt;p&gt;According to the 2024 article "Digital twins: The next frontier of factory optimization" from McKinsey &amp;amp; Company, a global management consulting firm, "In fast-paced, continuous operations, factory digital twins -- real-time virtual representations of the factory -- provide manufacturers with the ability to support faster, smarter and more cost-effective decision making. They can deepen manufacturers' understanding of complex physical systems and production operations, optimize production scheduling, or simulate 'what-if' scenarios to understand the impact of new product introductions, for example."&lt;/p&gt;
 &lt;p&gt;To create and use digital twins, organizations need vast amounts of data from their environments and a connected real-world environment to implement the changes tested in them -- which is &lt;a href="https://www.techtarget.com/iotagenda/feature/IoT-and-digital-twins-How-they-work-together-with-examples"&gt;why IIoT is integral for digital twin enablement&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;                                    
&lt;section class="section main-article-chapter" data-menu-title="Future of IoT in manufacturing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future of IoT in manufacturing&lt;/h2&gt;
 &lt;p&gt;At its core, IIoT gives manufacturers increased visibility into their environments -- no matter how large or dispersed they might be -- and enables them to make real-time, often automated decisions. Those decisions enable more efficient, more sustainable and safer operations as well as higher-quality output.&lt;/p&gt;
 &lt;p&gt;According to the "2024 State of IoT Adoption Report" from IoT services provider Eseye, manufacturers identified the top benefits of their IIoT investments as increased revenue, support in achieving sustainability goals and a competitive advantage.&lt;/p&gt;
 &lt;p&gt;Now manufacturers are &lt;a href="https://www.techtarget.com/iotagenda/tip/AI-and-IoT-How-do-the-internet-of-things-and-AI-work-together"&gt;incorporating AI into more of their operations&lt;/a&gt; and IIoT environments, creating smart factories that are expected to become increasingly more efficient and effective.&lt;/p&gt;
 &lt;p&gt;As Deloitte noted in its "2025 Smart Manufacturing and Operations Survey," manufacturers are showing "widespread and growing confidence that smart manufacturing and operations will be an indispensable factor in productivity and enterprise growth." The survey found that 92% of respondents "believe smart manufacturing will be the main driver for competitiveness over the next three years."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Mary K. Pratt is an award-winning freelance journalist with a focus on covering enterprise IT and cybersecurity management.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Industrial IoT enables real-time automated decision-making in manufacturing, transforming operations using predictive maintenance and digital twins for greater efficiency.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/toolGearArrow_g1159416182.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/Examples-and-use-cases-of-IoT-in-manufacturing</link>
            <pubDate>Thu, 24 Jul 2025 15:37:00 GMT</pubDate>
            <title>Top 10 examples and use cases of IoT in manufacturing</title>
        </item>
        <item>
            <body>&lt;p&gt;IoT consists of a vast and rapidly growing array of devices in the environment. IoT sensors measure or record physical properties of phenomena, such as temperature, air pressure and electrical charge. IoT actuators modify the environment, for example, by turning on heat or air conditioning. IoT cameras capture pictures and videos, while IoT microphones pick up sounds. IoT GPS endpoints enable the pinpointing of a device's location. These connected devices are central to systems like smart factories or smart cities.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-device"&gt;IoT devices&lt;/a&gt; can generate enormous amounts of data. Interpreting the data just by looking at columns of numbers in a spreadsheet can be slow and difficult. So, as with big data, people mainly interact with it through visualizations. People must be able to visualize IoT data to make informed decisions. Visualizing data helps humans identify patterns, such as a trucking company tracking trends in freezer trailer temperatures over time.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="IoT data visualization: A process, not an action"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IoT data visualization: A process, not an action&lt;/h2&gt;
 &lt;p&gt;Some practical knowledge can be gained from IoT networks through a one-time analysis of the data available. For instance, a tire manufacturer might learn a lot by analyzing tire temperature and pressure data for a specific plane's landing gear from the hours before a catastrophic tire failure.&lt;/p&gt;
 &lt;p&gt;However, it's typical for &lt;a href="https://www.techtarget.com/iotagenda/definition/What-is-IoT-data-analytics"&gt;IoT data analysis&lt;/a&gt; to be ongoing, either continuous or cyclical. As long as a device isn't destroyed or taken offline, sensors and actuators will keep returning data, so analysis needs to be constant. For example, that tire maker might monitor a tire's status daily or after each flight. Therefore, IoT data visualization should be managed as an ongoing process, not a one-time task.&lt;/p&gt;
 &lt;p&gt;A data visualization process should be integrated with the organization's overall IoT architecture and data lifecycle management. The architecture should -- among other things -- define all the different data sources that can feed IoT analytics and visualization, as well as how they can communicate the data they collect. The data lifecycle should specify the characteristics of the database or data lake from which IoT data points can be pulled.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is the process of data visualization in IoT?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the process of data visualization in IoT?&lt;/h2&gt;
 &lt;p&gt;The five phases of the IoT data visualization process are capture, preparation, modeling, visualization and interpretation.&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Capture.&lt;/b&gt; Sensors and actuators gather data on what they observe or report on their state. The data can be cached on the device until tapped by the network or collected in a controller within an edge data center, primary data center or cloud platform.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Preparation.&lt;/b&gt; &lt;a href="https://www.techtarget.com/iotagenda/tip/How-IoT-data-collection-works"&gt;Data is aggregated from multiple devices&lt;/a&gt;, normalized as needed -- which might include adding metadata or synthetic data derived from the captured information -- and stored in a database or data lake.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Modeling.&lt;/b&gt; Analysts decide which data to pull together and how to structure it for visualization. This includes determining which data points to incorporate into the visualized data set.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Visualization.&lt;/b&gt; Depending on the model, different visualizations are prepared. This can be as simple as a scatterplot or as complex as a set of interrelated 3D projections of a complex 4D surface.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Interpretation.&lt;/b&gt; Interpretation uses visualization to extract valuable knowledge from the data.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Key IoT data visualization best practices"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key IoT data visualization best practices&lt;/h2&gt;
 &lt;p&gt;Besides connecting a visualization process to a solid IoT architecture and &lt;a href="https://www.techtarget.com/searchstorage/definition/data-life-cycle-management"&gt;data management lifecycle&lt;/a&gt;, some best practices to remember include the following:&lt;/p&gt;
 &lt;h3&gt;Know the data&lt;/h3&gt;
 &lt;p&gt;Analysts should understand the source of the data and its limitations when developing visualizations for IoT data sets. They should avoid making assumptions about its accuracy that aren't supported by the realities of the devices providing it.&lt;/p&gt;
 &lt;p&gt;For example, tire manufacturer analysts shouldn't create visualizations showing tire pressures to the ten-thousandth of a pascal if the sensors are only accurate to the hundredth. That could lead to &lt;a href="https://www.techtarget.com/searchbusinessanalytics/feature/8-types-of-bias-in-data-analysis-and-how-to-avoid-them"&gt;interpretations based on no real data&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;Know the audience&lt;/h3&gt;
 &lt;p&gt;This is important for the clarity of the output. Audiences comfortable with tabular data might see a series of tables and simple graphs -- one for each passing second -- while audiences not familiar with tabular data might prefer an animation with a more complex, color-coded graphic that morphs over time.&lt;/p&gt;
 &lt;h3&gt;Select the data to be visualized&lt;/h3&gt;
 &lt;p&gt;This is about knowing the data, understanding the audience and grasping the broader context of the organization. Where possible, analysts should focus on key captured and interpolated synthetic data analyzed in a way that &lt;a href="https://www.techtarget.com/searchdatamanagement/tip/Evaluating-data-quality-requires-clear-and-measurable-KPIs"&gt;addresses defined KPIs&lt;/a&gt; and organizational objectives for reporting to executives and managers or for exploring important operational factors by technical audiences such as engineers, researchers or designers.&lt;/p&gt;
 &lt;p&gt;In the tire maker example, executives might want to see durability and failure data in a way that illustrates its effect on revenue and profits. In contrast, materials scientists and tire designers might want to examine other factors related to improving designs or formulations. Either group might wish to view such data with different filters: by tire type, tire age, plane type, airline or region.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/pitfalls_to_avoid_with_iot_data_visualization-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/pitfalls_to_avoid_with_iot_data_visualization-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/pitfalls_to_avoid_with_iot_data_visualization-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/pitfalls_to_avoid_with_iot_data_visualization-f.png 1280w" alt="List of IoT data visualization challenges" height="266" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;IoT visualization faces five critical hurdles: overwhelming data volumes, oversimplification, human cognitive limits, inconsistent data quality and scarce specialized talent.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Pitfalls and challenges of IoT data visualization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pitfalls and challenges of IoT data visualization&lt;/h2&gt;
 &lt;p&gt;Of course, visualization teams also encounter many common problems, such as the following.&lt;/p&gt;
 &lt;h3&gt;Data volume and velocity&lt;/h3&gt;
 &lt;p&gt;Many IoT deployments involve enormous amounts of data, and the data changes rapidly. For example, sensors on a jet engine might report on thousands of variables every millisecond, resulting in terabytes of data per flight.&lt;/p&gt;
 &lt;p&gt;Visualization processes can be challenged by the &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/Key-considerations-for-data-intensive-architectures"&gt;need to cycle through vast volumes of data&lt;/a&gt; in a valuable amount of time -- e.g., to process each day's data before it's time to process the next day's. The most challenging problem is meeting a need for data visualization in real time, displaying the visual representation of analyzed data within milliseconds of that data arriving.&lt;/p&gt;
 &lt;h3&gt;Data oversimplification&lt;/h3&gt;
 &lt;p&gt;The more complex the data sets are, the more difficult it becomes for analysts to create clear and engaging visualizations. As a result, they must prune variables whenever possible, but it's easy to cut too much and leave out important information.&lt;/p&gt;
 &lt;h3&gt;Data overload&lt;/h3&gt;
 &lt;p&gt;If analysts prune too little, the effect can be just as damaging. It's challenging for humans to associate more than a handful of variable values with a single data point on a chart.&lt;/p&gt;
 &lt;p&gt;Once the six easiest ones are used -- position, shape, color, brightness, surface pattern and size -- it gets harder to encode more information into the visual representation. That &lt;a href="https://www.techtarget.com/searchbusinessanalytics/tip/steps-to-improve-data-visualization-literacy"&gt;doesn't stop analysts from trying&lt;/a&gt; and pushing more information into the output than humans can make sense of.&lt;/p&gt;
 &lt;h3&gt;Data source inconsistencies&lt;/h3&gt;
 &lt;p&gt;It's common for data quality from a specific sensor, type of sensor or location to vary in reliability. Analysis and visualization processes can mask this variation if analysts don't carefully preserve and reflect it in the output, which increases the risk of making incorrect conclusions from the data.&lt;/p&gt;
 &lt;h3&gt;Workforce skill gaps&lt;/h3&gt;
 &lt;p&gt;All these problems highlight a major underlying issue: the challenge of finding, creating and retaining a team of analysts with the technical skills and talent for making visualizations.&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="Popular tools for IoT data visualization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Popular tools for IoT data visualization&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchitoperations/tip/Evaluate-Grafana-vs-Kibana-for-IT-data-visualization"&gt;Major visualization tools&lt;/a&gt; for working with IoT data run the gamut from the ubiquitous analytics workhorse of many organizations, the spreadsheet -- be it Excel, Google Sheets or something else -- to cloud-based big data analytics platforms explicitly designed to create powerful visualizations from large data sets.&lt;/p&gt;
 &lt;p&gt;Common platforms include Tableau and open source Grafana, as well as visualization components in IoT management platforms from providers like Oracle or AWS.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;John Burke is CTO and a research analyst at Nemertes Research. Burke joined Nemertes in 2005 with nearly two decades of technology experience. He has worked at all levels of IT, including as an end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>IoT data visualization can help organizations turn raw sensor data into business intelligence that drives innovation, but the process comes with its challenges and pitfalls.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g496816315.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/IoT-data-visualization-Tips-and-challenges</link>
            <pubDate>Thu, 24 Jul 2025 15:13:00 GMT</pubDate>
            <title>IoT data visualization: Tips and challenges</title>
        </item>
        <item>
            <body>&lt;p&gt;When it comes to dealing with the data generated by IoT systems, it's not just a matter of slapping some extra hard drives in the data center or attaching a few more &lt;a href="https://www.techtarget.com/searchaws/definition/AWS-bucket"&gt;S3 buckets&lt;/a&gt; and being good to go. IoT data storage has specific needs, and IT professionals must carefully plan where and how they'll meet those needs.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is IoT data storage?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is IoT data storage?&lt;/h2&gt;
 &lt;p&gt;IoT data storage is the systematic collection, organization and maintenance of data generated by connected devices across various storage systems, from edge facilities to central databases and data lakes. It ensures appropriate retention, security and accessibility throughout the data lifecycle.&lt;/p&gt;
 &lt;p&gt;The IoT data lifecycle mirrors the general transactional data lifecycle in some respects, with a strong focus on how data storage at various stages reflects its intended use. Data is stored one way during acquisition and another way for archival retention -- if it isn't going to be purged. Further, data is stored differently for immediate, high-intensity use and differently again for medium-term, less intense use.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/Top-advantages-and-disadvantages-of-IoT-in-business"&gt;IoT adds its own challenges&lt;/a&gt; because it's as much about where as how. At each stage of the broader IoT data lifecycle, from collection to deletion or archiving, IT must consider where data will be stored just as carefully as how it will be kept while there.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iota-iot_system.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iota-iot_system_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iota-iot_system_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iota-iot_system.png 1280w" alt="IoT ecosystem diagram" height="374" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;An IoT system collects data from sensors installed in IoT devices and transfers that data through an IoT gateway so it can be analyzed by an application or back-end system.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Types of IoT data storage"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of IoT data storage&lt;/h2&gt;
 &lt;p&gt;There are four types of IoT data storage: on a device, at an edge facility, in a data center or in the cloud.&lt;/p&gt;
 &lt;h3&gt;Device&lt;/h3&gt;
 &lt;p&gt;Because IoT systems revolve around connected devices, whether it's an implanted medical sensor or a shipping container, the first location where IoT data is stored is on the device itself. Storage might be limited to a single data point, such as a 4-bit temperature reading or a multi-megapixel image from a satellite-mounted camera. IT often has little control over this part of the storage process, although if the device has available capacity, the IoT platform might permit IT to manage data retention on it.&lt;/p&gt;
 &lt;h3&gt;Edge&lt;/h3&gt;
 &lt;p&gt;Many IoT systems are built to send data to either a controller or an aggregation unit located in an edge data center. At the edge, &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data-preprocessing"&gt;data can be preprocessed&lt;/a&gt; in various ways and then sent -- raw, condensed or otherwise modified -- onward to a cloud or data center for use. Edge data centers have limited space available but can store large volumes of data.&lt;/p&gt;
 &lt;h3&gt;Data center&lt;/h3&gt;
 &lt;p&gt;If IoT data is stored on-premises, it typically flows into a primary data center for analysis and use, both for short-term, high-intensity activities such as transaction processing or real-time process control and for medium-term, lower-intensity tasks like analyzing historical trends. Long-term archival storage of data might also be kept in the data center, but it's more commonly housed off-site, in another facility or in the cloud.&lt;/p&gt;
 &lt;h3&gt;Cloud&lt;/h3&gt;
 &lt;p&gt;A lot of IoT data flows from devices or edge aggregators &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-public-cloud-providers-A-brief-comparison"&gt;directly into cloud platforms&lt;/a&gt;, whether under the control of the enterprise or under the control of an IoT service provider.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Technologies for IoT data storage"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technologies for IoT data storage&lt;/h2&gt;
 &lt;p&gt;Any type of storage could be suitable, depending on the IoT system's needs regarding data velocity, volume and variety, as well as the phase in the data lifecycle when the storage is used.&lt;/p&gt;
 &lt;h3&gt;Block&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchstorage/tip/Compare-block-vs-file-vs-object-storage-differences-uses"&gt;Block storage is the lowest-level access&lt;/a&gt; to storage space and is best where the highest-speed access to data is required, such as in real-time transaction processing or real-time device control. A relational database usually manages data in block storage, with access via direct storage device addressing.&lt;/p&gt;
 &lt;h3&gt;Object&lt;/h3&gt;
 &lt;p&gt;Object storage is higher in the data hierarchy, offering space to store files (objects), along with their metadata. It doesn't use directories or names; instead, objects are identified by a unique number. Although not as fast as block storage, object storage is very IoT-friendly, especially for handling unstructured data. Access is through an API using the object ID.&lt;/p&gt;
 &lt;h3&gt;File&lt;/h3&gt;
 &lt;p&gt;File storage has more structure than object storage. It enables hierarchical folder structures containing named files and other ways of organizing information. File storage also allows metadata to be associated with files, with &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/What-are-the-types-of-APIs-and-their-differences"&gt;access via APIs&lt;/a&gt; or system utilities, using file names or file IDs.&lt;/p&gt;
 &lt;p&gt;Any storage technology might be used in an edge or central data center, or in a cloud, though object storage tends to dominate in cloud platforms.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Technologies for IoT data management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technologies for IoT data management&lt;/h2&gt;
 &lt;p&gt;Holding data is only one part of data storage; managing that data is another. IoT systems use all the major data management technologies available, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Time series databases. &lt;/b&gt;These excel at holding a series of data points generated by the same device at different times -- for example, a series of temperatures from a thermostat or a series of spectral fingerprints generated by a gas chromatograph. Each data point is structured identically and is distinguished from others by value and by timestamp or sequence number. These databases are ideal for use cases like trending analysis and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/anomaly-detection"&gt;anomaly detection&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Streaming databases.&lt;/b&gt; Like time-series databases, streaming databases are intended to capture a continuous flow of data, but there's no expectation that the data is structured. These are often used to capture streams of images, videos or sounds.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Relational databases.&lt;/b&gt; Most often used in the middle portion of an IoT lifecycle, where structured data derived from unstructured feeds is analyzed for non-real-time purposes, relational databases store highly structured data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;NoSQL databases.&lt;/b&gt; These are for structured, semistructured and unstructured data, and their growth can be unbounded -- that is, you can keep adding more data to them. However, NoSQL databases don't make the same kinds of promises that relational databases do regarding data operations -- the so-called "ACID constraints" of atomicity, consistency, isolation and durability.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data lakes.&lt;/b&gt; Like NoSQL databases, data lakes are designed to hold structured, semistructured and unstructured data alike. However, &lt;a href="https://www.techtarget.com/searchdatamanagement/feature/Data-lake-vs-data-warehouse-Key-differences-explained"&gt;data lakes aren't databases in the strict sense&lt;/a&gt;, nor are they engines for analysis. Rather, they serve as repositories where raw data can be collected in a way that makes it easy to access data from multiple sources in one location. Data is then analyzed and queried using other tools, with the data lake acting as a powerful front end for object storage.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Challenges and key considerations for IoT data storage"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges and key considerations for IoT data storage&lt;/h2&gt;
 &lt;p&gt;IoT data challenges are often the same fundamental challenges of any big data problem because so many IoT systems generate big data.&lt;/p&gt;
 &lt;h3&gt;Volume&lt;/h3&gt;
 &lt;p&gt;Having data storage in each part of the infrastructure -- from devices to the edge, data center and cloud -- that can manage the volume of data generated can be difficult. Space limitations at the device and edge levels make handling large data volumes challenging, often leading to the practice of storing as little as possible locally and relying on centralized storage. Even when capacity is sufficient, the &lt;a href="https://www.techtarget.com/searchstorage/tip/How-to-prepare-a-data-storage-budget-with-free-template"&gt;expense of providing that capacity&lt;/a&gt; can become a secondary issue.&lt;/p&gt;
 &lt;h3&gt;Velocity&lt;/h3&gt;
 &lt;p&gt;IoT systems not only generate large amounts of data but can do so very quickly. For example, a well-instrumented airplane tire might produce gigabytes of data during a single flight, whereas an engine on the same flight could produce gigabytes every second. Therefore, storage systems must be capable of ingesting data at the same speed as devices supply it, which poses a challenge for both the storage systems and the networks connecting them to IoT devices and controllers. Additionally, they must support analytics using the stored data at whatever speed the use case demands, ranging from near-real-time analysis to immediate response from, for example, industrial robots.&lt;/p&gt;
 &lt;h3&gt;Variety&lt;/h3&gt;
 &lt;p&gt;IoT storage systems and data management systems need to handle a variety of data types being generated. At the edge, this is usually not a problem because each device typically communicates only with its own controllers or aggregators. In data centers and the cloud, however, data from multiple systems can be combined with non-IoT data for analysis.&lt;/p&gt;
 &lt;p&gt;Because it combines all the &lt;a href="https://www.techtarget.com/searchstorage/tip/Top-10-data-storage-issues-and-how-to-overcome-them"&gt;challenges of other enterprise data storage&lt;/a&gt; and management with some complications of its own, IoT data storage and management requires careful consideration each time a new IoT project is launched.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;John Burke is CTO and a research analyst at Nemertes Research. Burke joined Nemertes in 2005 with nearly two decades of technology experience. He has worked at all levels of IT, including as an end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>IoT data storage spans devices, edge facilities, data centers and cloud, using block, object and file technologies to manage high-volume, high-velocity data throughout its lifecycle.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/storage_g539954410.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/IoT-data-storage-Top-technologies-and-challenges-explained</link>
            <pubDate>Wed, 23 Jul 2025 15:35:00 GMT</pubDate>
            <title>IoT data storage: Top technologies and challenges, explained</title>
        </item>
        <item>
            <body>&lt;p&gt;An IoT environment consists of a distributed network of sensors, actuators, controllers and computational and storage devices that work together to capture data about an environment for analysis. In many cases, this data is used to act on the environment. From an enterprise perspective, the analytics tools that extract valuable insights from IoT data streams are essential to the overall IoT ecosystem.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is an IoT platform?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is an IoT platform?&lt;/h2&gt;
 &lt;p&gt;An IoT platform is middleware that manages &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-sensor"&gt;sensors&lt;/a&gt; and other &lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-device"&gt;devices&lt;/a&gt; and connects devices, controllers, storage systems and analytics platforms.&lt;/p&gt;
 &lt;p&gt;It's possible to deploy and operate IoT environments gradually, with each part acquired or developed separately and integrated later by the enterprise. IT and the business line stakeholders in the IoT system are responsible for managing all aspects of it and expanding and updating it as needs and use cases change.&lt;/p&gt;
 &lt;p&gt;Sometimes, a manufacturer will produce all the sensors, actuators, controllers, servers, storage, management and analytics tools needed to run a complete IoT environment -- but its controllers and management tools won't work with devices from other manufacturers. Each IoT system operates in a silo, and IT and stakeholders have very little ability to modify them, with limited options for integrating each siloed environment with others.&lt;/p&gt;
 &lt;p&gt;It's becoming more common for enterprises to adopt a vendor-neutral IoT platform to mitigate the risks and limitations of siloed IoT management and the cost of in-house development.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Key functions of an IoT platform"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key functions of an IoT platform&lt;/h2&gt;
 &lt;p&gt;Key functions of IoT platforms include the device manager, messaging hub, integration hub, analytics engine and security overlay.&lt;/p&gt;
 &lt;h3&gt;Device manager&lt;/h3&gt;
 &lt;p&gt;An IoT platform should help &lt;a href="https://www.techtarget.com/iotagenda/definition/internet-of-things-device-management-IoT-device-management"&gt;manage devices&lt;/a&gt; distributed throughout the enterprise environment -- or deployed on enterprise assets out in the world, e.g., a package, shipping container or rail car -- from initial installation and deployment through retirement and disposal. It encompasses device configuration and registration, asset inventory management, monitoring devices in the field and updating software and firmware as needed.&lt;/p&gt;
 &lt;p&gt;A relatively new and increasingly common feature is providing a logical twin for each deployed device, also known as &lt;i&gt;device shadowing&lt;/i&gt;. This amounts to maintaining a persistent digital copy of the device embodying its last known state. It's compute- and storage-intensive but useful for troubleshooting and what-if configuration change analysis.&lt;/p&gt;
 &lt;h3&gt;Messaging hub&lt;/h3&gt;
 &lt;p&gt;The IoT platform is a central hub for communication among devices, controllers and data consumers such as aggregators and analytics nodes. This is essentially message brokering or queuing, and it supports publish/subscribe models and push models.&lt;/p&gt;
 &lt;p&gt;Some platforms might refer to this as &lt;i&gt;event brokering&lt;/i&gt; or &lt;i&gt;event streaming&lt;/i&gt;. Still, the essential functions are the same: receiving data from some nodes, optionally transforming it in some way -- for example, by converting it from one format to another -- and then getting it to or making it available to other nodes.&lt;/p&gt;
 &lt;p&gt;Platforms will support multiple &lt;a href="https://www.techtarget.com/iotagenda/tip/Top-12-most-commonly-used-IoT-protocols-and-standards"&gt;generic messaging protocols&lt;/a&gt;, such as XMPP, and will usually also support vendor- or industry-specific protocols.&lt;/p&gt;
 &lt;h3&gt;Integration hub&lt;/h3&gt;
 &lt;p&gt;Beyond sending data from sensors to controllers or aggregators, IoT platforms also connect different systems -- most often by providing REST APIs for their functions, such as messaging and inventory management.&lt;/p&gt;
 &lt;p&gt;They might also provide API access to the IoT devices they manage through layers of abstraction. In this capacity, they might help send data to external analytics platforms or the analytics components of the IoT platform.&lt;/p&gt;
 &lt;h3&gt;Analytics engine&lt;/h3&gt;
 &lt;p&gt;An IoT platform might simply serve as an aggregator, preprocessor and integration point for a broader analytics platform or provide its own analytics capabilities.&lt;/p&gt;
 &lt;p&gt;If a platform provides analytics, it should include time series analysis, flexible correlation analysis, and &lt;a href="https://www.techtarget.com/searchbusinessanalytics/tip/6-top-predictive-analytics-tools"&gt;trending and predictive analytics&lt;/a&gt;. A platform that performs its own analytics might or might not have a built-in visualization engine; if it doesn't, it should integrate with external ones.&lt;/p&gt;
 &lt;h3&gt;Security overlay&lt;/h3&gt;
 &lt;p&gt;Although an IoT platform doesn't secure the network segment that each device is on, it is responsible for ensuring that its communications with all devices and other integrated systems are encrypted and comply with current security standards, which might include using quantum-resistant encryption technologies in some cases.&lt;/p&gt;
 &lt;p&gt;It is also responsible for authenticating and authorizing all messaging and API-mediated device access. Additionally, as the tracker of device configurations, it plays a key role in IoT security by helping keep all managed devices updated on security patches.&lt;/p&gt;
 &lt;p&gt;Lastly, in a &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-implement-zero-trust-security-from-people-who-did-it"&gt;well-architected zero-trust environment&lt;/a&gt;, it provides current inventory and device identity information to the environment's policy engine to adjust access decisions in real time.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iota-iot_system.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iota-iot_system_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iota-iot_system_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iota-iot_system.png 1280w" alt="IoT ecosystem diagram." height="374" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;An IoT system collects data from sensors installed in IoT devices and transfers it through an IoT gateway so an application or back-end system can analyze it.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="Types of IoT platforms"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of IoT platforms&lt;/h2&gt;
 &lt;p&gt;The main types of platforms are general, function-specific and vertical-specific:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;General IoT platforms.&lt;/b&gt; These include most or all of the functions outlined earlier.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Function-specific IoT platforms.&lt;/b&gt; These specialize in just one or two functional areas; one might focus on asset and device management, while another might focus on message brokering for IoT environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Vertical-specific IoT platforms.&lt;/b&gt; These are built for the needs of specific verticals, such as &lt;a href="https://www.techtarget.com/iotagenda/definition/Industrial-Internet-of-Things-IIoT"&gt;industrial IoT&lt;/a&gt;, medical IoT and logistics IoT.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Every platform of any kind should implement strong security measures for all the functions it offers.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to choose the right IoT platform"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to choose the right IoT platform&lt;/h2&gt;
 &lt;p&gt;As with all platform selections, IT should first connect with stakeholders to understand where the IoT systems to be managed fit into the current line of business or corporate strategy and the extent to which the enterprise will be able to dictate platforms.&lt;/p&gt;
 &lt;p&gt;Then, while working with stakeholders, IT should define a set of minimum requirements for the platform and its desired characteristics to adapt to future needs. This could include the following features, among others:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Protocols that the platform must support to work with current and future IoT systems.&lt;/li&gt; 
  &lt;li&gt;Processing and storage capacities that the platform must meet or exceed to serve current and projected use cases.&lt;/li&gt; 
  &lt;li&gt;External analytics or other packages that the platform must integrate with immediately.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;IT should incorporate standard requirements or preferences from the overall IT and security architecture. For example, it might be a requirement that the platform provides an on-premises version to &lt;a href="https://www.techtarget.com/searchsecurity/tip/Data-sovereignty-compliance-challenges-and-best-practices"&gt;meet data sovereignty needs&lt;/a&gt;, or that its device-facing communications use only encryption technologies that can be exported widely.&lt;/p&gt;
 &lt;p&gt;After clearly distinguishing "must-haves" from the "nice-to-haves" and thoroughly documenting everything to the best of IT's ability, the selection team should quickly scan the environment for potential platforms. They should triage as they go, focusing on swiftly eliminating options that don't meet their requirements. Then, using a balanced scorecard method, they should evaluate the remaining vendors to conduct a proof of concept with at least two before choosing a platform to pilot.&lt;/p&gt;
 &lt;p&gt;All this can be overridden if senior management presents IT with a &lt;i&gt;fait accompli&lt;/i&gt;: "We are strategically invested in this vendor, so use its platforms." However, even a strong senior-level influence shouldn't outweigh actual use-case-driven needs. If the preferred vendor can't meet the requirements of the use case -- either directly or with a minor addition of another platform to fill a gap -- and if the use case can't wait for the preferred vendor to catch up, IT must seek alternatives.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Popular IoT platforms to consider"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Popular IoT platforms to consider&lt;/h2&gt;
 &lt;p&gt;There are hundreds of function-specific IoT packages out there. There are far fewer general-purpose ones. Among those, some of the &lt;a href="https://www.techtarget.com/iotagenda/feature/7-IoT-SaaS-platform-providers-help-streamline-adoption"&gt;most important ones are cloud services&lt;/a&gt;:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;AWS IoT Core.&lt;/b&gt; Adds a rules engine controlling integrations with other AWS services to the core functions in device management, messaging, etc., and implements logical twins (as device shadowing).&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Azure IoT Central.&lt;/b&gt; Implements all the key functions outlined above and facilitates using other Azure services for storage, analytics and visualization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;ThingWorx.&lt;/b&gt; Emphasizes model-driven, rapid development of IoT applications to use the underlying middleware functions.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Some major cloud players, such as Google, Salesforce and IBM, have retired IoT-centered platforms with no direct replacement. However, with DIY integrations or a third-party partner, one can typically recreate much of what they did using other functionality in their portfolios.&lt;/p&gt;
 &lt;p&gt;Also worth mentioning is Kaa, a microservices-based platform that supports self-hosting in IaaS, on-premises or edge data centers or as a hybrid spanning multiple sourcing options.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;John Burke is CTO and a research analyst at Nemertes Research. Burke joined Nemertes in 2005 with nearly two decades of technology experience. He has worked at all levels of IT, including as an end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>When selecting an IoT platform, thoroughly evaluate its key functions, including the device manager, messaging hub, integration hub, analytics engine and security overlay.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/folder-files13.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/How-to-choose-the-right-IoT-platform-for-your-business</link>
            <pubDate>Tue, 22 Jul 2025 14:07:00 GMT</pubDate>
            <title>How to choose the right IoT platform for your business</title>
        </item>
        <item>
            <body>&lt;p&gt;Data management is necessary when there is a large amount of data, when data will be shared or when data needs special handling, high levels of reliability or continuous availability.&lt;/p&gt; 
&lt;p&gt;The large amount of data produced by IoT systems can come from frequent &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-sensor"&gt;sensor&lt;/a&gt; sampling, for example. The sensor might only send a few bytes of data each time it's checked, but it generates a lot of data because it's sampled every microsecond. That large volume of data can also result from having many sensors or from capturing high-definition video.&lt;/p&gt; 
&lt;p&gt;Even if an IoT data project isn't generating a lot of data, it might be generating operationally crucial data, sensitive data or data important to business performance evaluation, resource planning, environmental management and &lt;a href="https://www.techtarget.com/searchcio/tip/IoT-compliance-standards-and-how-to-comply"&gt;compliance efforts&lt;/a&gt;. It might be generating data that other systems need to perform their work or that the organization must make available to partners, suppliers or customers.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is IoT data management?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is IoT data management?&lt;/h2&gt;
 &lt;p&gt;IoT data management is the application of good information stewardship practices to the data associated with IoT systems. Information stewardship derives from the idea that every byte of information entering an organization will be stored, managed and protected throughout its life according to set policy and standardized practices. It comprises several data management disciplines: data quality management, information lifecycle management, information protection, information resilience and compliance management.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f.png 1280w" alt="Illustration of the IoT data pipeline process." height="308" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;An IoT data pipeline starts with endpoint device data, which moves through processing and storage, and is ultimately analyzed to glean valuable business insights.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Key features of IoT data management&lt;/h3&gt;
 &lt;p&gt;In an IoT context, all the major aspects of information stewardship are relevant:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Governance.&lt;/b&gt; This underpins a coherent system of IoT data management rather than a haphazard collection of possibly adequate practices. Without a solid framework of policy guiding activities such as data quality evaluation, data retention and disaster recovery planning, organizations have trouble ensuring that IoT data will be available and trustworthy when needed and &lt;a href="https://www.techtarget.com/iotagenda/tip/Explore-the-relationship-between-IoT-governance-and-privacy"&gt;visible only to those who need to see it&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data quality management.&lt;/b&gt; This includes both the core IoT system design -- for example, making sure a sensor can produce data with the required accuracy at the needed frequency -- and interactions between the IoT devices and the rest of the infrastructure. In an IoT context, data quality management often involves ensuring that data is stored and transmitted without losing accuracy or data points, and at whatever volume the overall system requires. This might involve adding extra error correction and ensuring lossless data transmissions, building large-scale parallel storage systems capable of handling very high data acquisition rates or preventing the use of lossy compression on some data streams.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Information lifecycle management.&lt;/b&gt; This addresses all aspects of data acquisition, storage and ultimate disposition. In an IoT context, this means knowing where data streams will be coming from and at what volume, guiding each stream of data to where it will be stored for however long it's to be retained and then making sure it's archived or deleted when it should be. Data might &lt;a href="https://www.techtarget.com/iotagenda/tip/How-to-select-the-right-IoT-database-architecture"&gt;come to a central database&lt;/a&gt; directly from sensors, aggregated in storage in edge facilities first or using some intermediate controllers. Data can persist for minutes, hours, days or years in databases and might be published to data lakes for analytics or integrations with other systems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Information protection.&lt;/b&gt; This requires everything from properly encrypting data in motion -- e.g., from sensors to controllers or controllers to databases -- to properly securing access to data in back-end systems. It requires clear policies defining which data needs to be protected and how, and specifying which people, roles or systems are to have access to that data and at what points in its lifecycle.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Information resilience.&lt;/b&gt; This covers all aspects of guaranteeing both short-term and long-term availability of IoT data in the event of service disruptions and disasters. So, it encompasses activities ranging from redundant storage of data in an edge facility prior to its consolidation into a central database or data lake to ensuring up-to-the-minute backups of key data to external facilities to create air-gapped archives for &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Long-term-data-backup-options"&gt;data that must be kept available long term&lt;/a&gt;, e.g., for compliance reasons.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance management.&lt;/b&gt; This can overlap with other areas because it involves ensuring and verifiably auditing that IoT data is managed according to policy, regulation and law. It includes aspects such as data quality management, or making sure data is captured where and how it should be and not where or how it shouldn't be; information lifecycle management, which ensures data is stored or disposed of as required; information protection, which protects data according to policies and restricts access to authorized people or systems; and resilience, which guarantees data availability as dictated by policy.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Benefits of IoT data management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of IoT data management&lt;/h2&gt;
 &lt;p&gt;The main benefit of IoT data management, like all data stewardship, is that the organization has the data it needs, when it needs it, and can trust that data because it has been properly controlled and protected. Additionally, effective IoT data management helps ensure that the organization's customers, partners and suppliers can trust that the organization is handling their data and any data shared with them responsibly and appropriately. It also enables the organization to demonstrate that it's a good steward of the data if needed.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Challenges of IoT data management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges of IoT data management&lt;/h2&gt;
 &lt;p&gt;The main challenge of effective IoT data management is coordinating many people and systems. IoT data management involves not just teams within different parts of IT but also groups from other areas of the organization, located in various places and even in different countries, and possibly in other organizations altogether.&lt;/p&gt;
 &lt;p&gt;At a minimum, IoT data management involves or affects the work of the following roles:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Whoever owns the IoT systems in question. The primary stakeholders are usually outside IT and might be part of the &lt;a href="https://www.techtarget.com/whatis/definition/operational-technology"&gt;operational technology&lt;/a&gt; team in a line of business.&lt;/li&gt; 
  &lt;li&gt;Data managers.&lt;/li&gt; 
  &lt;li&gt;Storage management teams.&lt;/li&gt; 
  &lt;li&gt;Network and cybersecurity teams.&lt;/li&gt; 
  &lt;li&gt;Edge, data center and cloud infrastructure teams.&lt;/li&gt; 
  &lt;li&gt;Disaster planners.&lt;/li&gt; 
  &lt;li&gt;Risk and compliance managers.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Best practices for IoT data management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices for IoT data management&lt;/h2&gt;
 &lt;p&gt;Not many of these best practices are specific to IoT situations; instead, they are broader best practices that organizations must understand and apply to IoT, too:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Understand the anticipated volume, velocity and variety of data streams stemming from IoT projects and systems.&lt;/li&gt; 
  &lt;li&gt;Ensure excess capacity in all the key components of the data management system, from end to end, whether for processing, encryption, transmission or storage of data.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-implement-zero-trust-security-from-people-who-did-it"&gt;Apply zero-trust principles&lt;/a&gt; to IoT data; allow access only to those entities requiring it and authenticate every request for access.&lt;/li&gt; 
  &lt;li&gt;Secure IoT endpoints to protect data at the point of capture or creation, again following zero-trust principles, and encrypt data in motion and at rest.&lt;/li&gt; 
  &lt;li&gt;Understand the compliance and privacy requirements that might apply to any IoT data so that an appropriate management policy can be written.&lt;/li&gt; 
  &lt;li&gt;Understand when data can be removed from active systems and how it should be archived or removed.&lt;/li&gt; 
  &lt;li&gt;Audit for compliance with data management policies, including access controls in particular.&lt;/li&gt; 
  &lt;li&gt;Regularly conduct tabletop "war game" exercises or red-team probes to stress-test systems, policies and people's understandings of their roles and responsibilities.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;&lt;i&gt;John Burke is CTO and a research analyst at Nemertes Research. Burke joined Nemertes in 2005 with nearly two decades of technology experience. He has worked at all levels of IT, including as an end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>IoT data management applies stewardship practices to handle large volumes of sensor data, ensuring security and compliance while coordinating across teams for reliable data access.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/code_g1195673150.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/Best-practices-for-IoT-data-management</link>
            <pubDate>Thu, 17 Jul 2025 13:47:00 GMT</pubDate>
            <title>8 best practices for IoT data management</title>
        </item>
        <item>
            <body>&lt;p&gt;Internet of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt;) data analytics is a comprehensive method of collecting, storing, processing, analyzing and, ultimately, presenting the vast amounts of &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data"&gt;data&lt;/a&gt; culled from &lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-device"&gt;IoT devices&lt;/a&gt;. Its application considers past, present and future real-world use cases or activities -- or some combination of the three.&lt;/p&gt; 
&lt;p&gt;Regardless of the mix, all IoT analytics jobs share the same underlying goal: to help business and technology leaders spot opportunities for operational improvement and make better-informed decisions. Measurable IoT analytics benefits include cost reduction, product quality improvement, more efficient use of time and materials and faster responses to market changes and opportunities.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Types of IoT analytics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of IoT analytics&lt;/h2&gt;
 &lt;p&gt;There are four principal types of, or approaches to, IoT data analytics:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Historical, or descriptive, analytics.&lt;/li&gt; 
  &lt;li&gt;Real-time, or diagnostic, analytics.&lt;/li&gt; 
  &lt;li&gt;Predictive analytics.&lt;/li&gt; 
  &lt;li&gt;Prescriptive analysis.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Here's a closer look at their use cases -- some unique and others interrelated.&lt;/p&gt;
 &lt;h3&gt;Historical analytics&lt;/h3&gt;
 &lt;p&gt;Historical analytics, or &lt;a href="https://www.techtarget.com/whatis/definition/descriptive-analytics"&gt;descriptive analytics&lt;/a&gt;, examines IoT data gathered over time to spot trends and find patterns. A business then evaluates behaviors in systems or environments to make objective determinations about their accuracy, efficiency or appropriate use. Historical analytics identifies valuable -- and often overlooked or undetected -- data patterns and relationships.&lt;/p&gt;
 &lt;p&gt;For example, a &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-city"&gt;smart city&lt;/a&gt; collects data about traffic patterns and road conditions to understand the durability and performance of its transportation infrastructure. Such data helps determine road and bridge longevity, leading to improved repair and upgraded strategies.&lt;/p&gt;
 &lt;h3&gt;Real-time analytics&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/real-time-analytics"&gt;Real-time analytics&lt;/a&gt;, or diagnostic analytics, immediately identifies anomalies or deviations from the norm, improving business response to unforeseen events or conditions. Real-time data combines with &lt;a href="https://www.techtarget.com/whatis/definition/historical-data"&gt;historical data&lt;/a&gt; to produce a more comprehensive &lt;a href="https://www.techtarget.com/whatis/definition/data-set"&gt;data set&lt;/a&gt; for analysis.&lt;/p&gt;
 &lt;p&gt;For example, a manufacturing company uses &lt;a href="https://www.techtarget.com/iotagenda/definition/smart-sensor"&gt;smart sensors&lt;/a&gt; on its factory floor to measure each machine's physical activities. These IoT devices recognize malfunctions that disrupt manufacturing workflows or pinpoint mechanical anomalies that create product quality problems.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iot_data_pipeline-f.png 1280w" alt="Diagram of an IoT data pipeline process." height="308" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;IoT devices transform sensor data into insights for real-time monitoring and prediction.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Predictive analytics&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/predictive-analytics"&gt;Predictive analytics&lt;/a&gt; uses patterns in historical and real-time data to forecast conditions, incidents or issues. Predictive analytics often combines with advanced computing capabilities, such as &lt;a href="https://www.techtarget.com/whatis/definition/statistical-analysis"&gt;statistical modeling&lt;/a&gt; and machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;For example, an electric utility uses &lt;a href="https://www.techtarget.com/whatis/definition/sensor"&gt;sensors&lt;/a&gt; and &lt;a href="https://www.utilitydive.com/spons/a-new-era-for-smart-meters-shifting-intelligence-to-the-edge/645133/"&gt;smart meters&lt;/a&gt; to collect data on energy consumption, predicting future energy demands based on season, weather, time of day and other factors. This optimizes energy production and distribution across its grid.&lt;/p&gt;
 &lt;h3&gt;Prescriptive analysis&lt;/h3&gt;
 &lt;p&gt;Prescriptive analysis, a variation of predictive analytics, provides solutions, suggests optimizations or offers alternatives to capitalize on collected IoT data. Prescriptive analysis uses both historical and real-time data and employs advanced &lt;a href="https://www.techtarget.com/whatis/definition/machine-learning-algorithm"&gt;ML algorithms&lt;/a&gt; and mathematical models.&lt;/p&gt;
 &lt;p&gt;For example, a retailer combines data from inventory systems, sales history and weather forecasts to determine optimal inventory levels -- and even pricing strategies -- for each product based on time of year, demand and competing products.&lt;/p&gt;
 &lt;h3&gt;Mixing analytical approaches&lt;/h3&gt;
 &lt;p&gt;Any motivated organization has the capacity to employ one or all of these approaches depending on business needs and goals. However, the types and amounts of available IoT data directly affect analytical capabilities.&lt;/p&gt;
 &lt;p&gt;For example, a business seeks historical analytics and therefore needs to collect, store and protect IoT data over long periods. By comparison, a neighboring business needs real-time analytics and alerts, so it wants relevant sensor data that determines system functionality immediately.&lt;/p&gt;
&lt;/section&gt;                    
&lt;section class="section main-article-chapter" data-menu-title="5 steps of IoT data analytics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5 steps of IoT data analytics&lt;/h2&gt;
 &lt;p&gt;IoT data analytics is a process, and each of the following steps has multiple aspects -- with some crossover -- that require scrutiny from business and technology leaders:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Collection.&lt;/b&gt; Data generated by IoT devices is gathered from across a shared network and stored. IoT data collection generates tremendous &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-traffic"&gt;network traffic&lt;/a&gt; depending on the number of IoT devices, the types of data generated and the data's urgency. Data is &lt;a href="https://www.techtarget.com/whatis/definition/structured-data"&gt;structured&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/unstructured-data"&gt;unstructured&lt;/a&gt; or mixed. In most cases, it is collected and stored at the &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge&lt;/a&gt; -- closest to the data's origin. This reduces &lt;a href="https://www.techtarget.com/searchnetworking/definition/bandwidth"&gt;network bandwidth&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/definition/latency"&gt;latency&lt;/a&gt; issues, as well as adding some &lt;a href="https://www.techtarget.com/searchdatabackup/definition/data-processing"&gt;data processing&lt;/a&gt; prior to analysis.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Storage.&lt;/b&gt; Collected IoT data requires extensive &lt;a href="https://www.techtarget.com/searchstorage/definition/storage-capacity-planning"&gt;storage capacity&lt;/a&gt;, especially if the data is retained for a prolonged period. As a significant business asset, it demands protection from unauthorized access, tampering, theft and misuse, guided by regulatory and &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity"&gt;business continuity&lt;/a&gt; obligations. Similarly, backup and other data protection measures safeguard against loss due to malfunctions or damage. In most cases, raw IoT data is stored at the edge near the IoT devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Processing.&lt;/b&gt; Processing is a preparatory step addressing IoT &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data-quality"&gt;data quality&lt;/a&gt;. Diverse devices generate IoT data, and this &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/raw-data"&gt;raw data&lt;/a&gt; must be cleaned, filtered, normalized and transformed into a useful and consistent format. This step achieves the following:&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li style="list-style-type: none;"&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li style="list-style-type: none;"&gt; 
     &lt;ul class="default-list"&gt; 
      &lt;li&gt;Removes noise, such as outlying values.&lt;/li&gt; 
      &lt;li&gt;Manages missing data in a constructive and meaningful way.&lt;/li&gt; 
      &lt;li&gt;Ensures all data uses the same format or level of precision.&lt;/li&gt; 
     &lt;/ul&gt; &lt;/li&gt; 
   &lt;/ul&gt; &lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p style="padding-left: 40px;"&gt;Some or all IoT data processing is performed through an &lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-gateway"&gt;IoT gateway&lt;/a&gt; located at the edge, again near IoT devices and any stored raw data. Processed data might be sent across a greater network to a &lt;a href="https://www.techtarget.com/searchdatacenter/definition/data-center"&gt;data center&lt;/a&gt; for analysis.&lt;/p&gt;
 &lt;ol type="1" start="4" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Analysis.&lt;/b&gt; Stored data is prepared and moved across a network, such as the &lt;a href="https://www.techtarget.com/whatis/definition/Internet"&gt;i&lt;/a&gt;nternet, to a centralized location, such as a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt; or local data center, where computing resources perform extensive data analyses. Here, the processed data undergoes detailed analysis -- descriptive, diagnostic, predictive, prescriptive or some combination -- based on the types, amounts and purpose of data collected.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Presentation.&lt;/b&gt; The analyzed data is then presented to business and technology professionals in an easily understood format. The analysis typically includes reports, &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/business-intelligence-dashboard"&gt;dashboards&lt;/a&gt;, graphs or other &lt;a href="https://www.techtarget.com/iotagenda/tip/IoT-data-visualization-Tips-and-challenges"&gt;visualizations that help leaders make informed decisions&lt;/a&gt;, respond to specific events or introduce prescriptive suggestions.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Benefits of IoT data analytics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of IoT data analytics&lt;/h2&gt;
 &lt;p&gt;IoT data analytics offers several potential benefits to an enterprise, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Faster response times.&lt;/b&gt; IoT analytics spots potential problems or issues -- sometimes long before a disruptive event occurs. Businesses use these analyses to perform maintenance or schedule prompt remediation, mitigating downtime and preserving the &lt;a href="https://www.techtarget.com/searchcio/definition/UX-user-experience"&gt;user experience&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Faster time to market.&lt;/b&gt; By spotting relationships and predicting demand, IoT analytics develops and enhances products much more quickly than traditional design cycles. Products reach the market in less time, increasing an organization's revenue and competitive advantage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Increased revenue.&lt;/b&gt; IoT analytics identifies potential revenue opportunities, including unfulfilled product demand, optimized pricing and enhanced personalization. Once addressed, each area adds value to customers, users and partners, driving business revenue.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lower costs.&lt;/b&gt; IoT analytics reduces costs through improved &lt;a href="https://www.techtarget.com/searchcio/definition/resource-allocation"&gt;resource allocation&lt;/a&gt;, streamlined operations and better issue management, from averted downtime to more effective maintenance practices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enhanced quality.&lt;/b&gt; IoT analytics gathers information about product design, supply chain resources, product manufacturing and business outcomes. This data helps the organization find and reduce defects, improve consistency in products and services, satisfy customers with superior quality and thereby burnish the brand.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Challenges with IoT data analytics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Challenges with IoT data analytics&lt;/h2&gt;
 &lt;p&gt;IoT analytics delivers powerful benefits, yet business and technology leaders must recognize several critical challenges associated with IoT technology, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Complexity.&lt;/b&gt; IoT deployments are demanding. First, they require the best IoT devices and their proper installation, configuration and ongoing management, including routine maintenance such as battery replacement and &lt;a href="https://www.techtarget.com/whatis/definition/firmware"&gt;firmware&lt;/a&gt; updates. Other necessities include establishing a dedicated IoT network, plus building the computing and storage infrastructure required to generate the analytics. Success depends on extensive staff expertise, a clear business vision and steady support from all management levels.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalability.&lt;/b&gt; Large IoT deployments typically grow more complex over time. Any IoT design demands careful consideration of both its current effectiveness and its &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scalability&lt;/a&gt;. Consider additional devices needed in the future and how to integrate and manage those new devices effectively. And, as data volume grows, it's vital to determine when the quantity of data being processed and analyzed begins to limit performance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IoT effectiveness.&lt;/b&gt; IoT demands a clear and well-supported purpose or use case, but business needs and conditions change. Business and technology leaders must oversee the IoT infrastructure and ensure its outcomes remain relevant and effective, often using objective metrics such as &lt;a href="https://www.techtarget.com/searchdatabackup/definition/Data-loss"&gt;data loss&lt;/a&gt; or network latency. Select meaningful metrics. Watch the metrics over time. Correct any waning IoT analytics.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Data quality.&lt;/b&gt; Data from IoT devices is often lost, corrupted or unusable due to device malfunctions, network issues or incompatible formats. An accurate, reliable and consistent IoT infrastructure features regular measurement, review and correction of data quality issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; IoT data is a sensitive asset with tangible business value. Sometimes it includes personal data collected from a &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/wearable-technology"&gt;wearable&lt;/a&gt; device. As such, IoT data demands protection. &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;Encryption&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;access control&lt;/a&gt; and reporting, &lt;a href="https://www.techtarget.com/searchsecurity/definition/authentication"&gt;authentication&lt;/a&gt;, &lt;a href="https://www.techtarget.com/whatis/definition/acceptable-use-policy-AUP"&gt;acceptable use policies&lt;/a&gt; and backup and &lt;a href="https://www.techtarget.com/searchdatabackup/definition/restore"&gt;restoration&lt;/a&gt; are among proven security techniques. IoT data is typically subject to the same &lt;a href="https://www.techtarget.com/searchcio/definition/regulatory-compliance"&gt;regulatory compliance&lt;/a&gt; and business continuity considerations as other sensitive business data.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Real-world applications of IoT data analytics"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Real-world applications of IoT data analytics&lt;/h2&gt;
 &lt;p&gt;Enterprises employ IoT analytics across a wide range of real-world applications. The following are some common examples.&lt;/p&gt;
 &lt;h3&gt;Supply chain logistics&lt;/h3&gt;
 &lt;p&gt;IoT devices gather a variety of transportation vehicle data, including distance traveled, starts and stops, fuel used and idle times. This &lt;a href="https://www.techtarget.com/searcherp/definition/logistics"&gt;logistics&lt;/a&gt; data is collected and analyzed from all vehicles to gauge the efficiency of each, the routes traveled and subsequent maintenance needs. Analytics then predicts and schedules preventive vehicle maintenance and prescribes optimizations to save time, fuel and wear. Success is measured by comparing transport time, fuel use and maintenance costs &lt;i&gt;without&lt;/i&gt; IoT analytics to the same parameters &lt;i&gt;with&lt;/i&gt; IoT optimizations.&lt;/p&gt;
 &lt;h3&gt;Manufacturing and retail inventory&lt;/h3&gt;
 &lt;p&gt;IoT devices track inventory levels -- both components and finished goods. IoT analytics combines a grasp of current inventory levels with historical and predicted sales data, then pairs that information with a knowledge of supply chain logistics and manufacturing operations to optimize inventory. Components are ordered and delivered just in time for manufacturing to schedule and use them, then stock enough finished goods to reach market for sale. This reduces waste, limits inventory costs and increases manufacturing capacity.&lt;/p&gt;
 &lt;h3&gt;Agriculture&lt;/h3&gt;
 &lt;p&gt;IoT analytics buoys traditional businesses, including farming. IoT sensors measure soil conditions, such as moisture level; track available resources, such as fertilizer; and oversee farming vehicle locations. IoT analytics combines this tangible data with seasonal historical weather data, weather forecasts and data about pests and crop health. Analytics then produces suggestions to hone irrigation, alter fertilizers, administer pest control strategies and assign farm vehicles to perform tasks at the proper time, yielding the largest and healthiest crop.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>IoT data analytics is a comprehensive method of collecting, storing, processing, analyzing and, ultimately, presenting the vast amounts of data culled from IoT devices.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/iotagenda/definition/What-is-IoT-data-analytics</link>
            <pubDate>Tue, 15 Jul 2025 11:14:00 GMT</pubDate>
            <title>What is IoT data analytics?</title>
        </item>
        <item>
            <body>&lt;p&gt;Devices of all types in every environment -- including mobile phones, automobiles and industrial equipment -- are now connecting to the internet.&lt;/p&gt; 
&lt;p&gt;By 2034, Statista predicts the total number of connected devices will reach 40.6 billion -- more than double the 19.8 billion devices in 2025. As a result, engineers, developers and other IoT professionals are in &lt;a href="https://www.techtarget.com/whatis/feature/Top-8-most-in-demand-IT-tech-jobs" target="_blank" rel="noopener"&gt;increasingly high demand&lt;/a&gt;. These professionals will need a diverse skill set that enables them to develop and maintain IoT infrastructure at scale, at every level of the technology stack.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="IoT skills"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IoT skills&lt;/h2&gt;
 &lt;p&gt;Here are some must-have skills that IoT professionals need to keep up with what some have termed "&lt;a href="https://www.computerweekly.com/news/252512774/IoT-connectivity-management-market-to-be-worth-more-than-31bn-by-2026"&gt;the IoT explosion&lt;/a&gt;."&lt;/p&gt;
 &lt;h3&gt;1. Artificial intelligence and machine learning&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/AI-and-IoT-How-do-the-internet-of-things-and-AI-work-together"&gt;IoT and AI are converging&lt;/a&gt;&lt;a href="https://www.techtarget.com/iotagenda/blog/IoT-Agenda/AI-and-IoT-convergence-could-herald-a-new-era-of-technological-change"&gt;&lt;/a&gt;&amp;nbsp;to form the artificial intelligence of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Artificial-Intelligence-of-Things-AIoT"&gt;AIoT&lt;/a&gt;). Precedence Research &lt;a href="https://www.precedenceresearch.com/ai-in-iot-market"&gt;predicts&lt;/a&gt; the global AI in IoT market size will increase to $161.93 billion by 2034, which is a significant increase from the $93.12 billion in 2025.&lt;/p&gt;
 &lt;p&gt;IoT devices collect large amounts of data called &lt;a href="https://www.techtarget.com/iotagenda/definition/sensor-data"&gt;sensor data&lt;/a&gt;, which organizations then analyze. For example, a &lt;a href="https://www.techtarget.com/iotagenda/tip/Examples-and-use-cases-of-IoT-in-manufacturing"&gt;manufacturing plant could use IoT&lt;/a&gt; sensors to report the site temperature, which is then recorded in a database that tracks the temperature data for all sites. AI and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML" target="_blank" rel="noopener"&gt;machine learning&lt;/a&gt; could then help database administrators organize data, determine how to maintain the correct temperature and optimize the facility. Using AI also facilitates predictive analytics to improve the environment in the future. AI makes the data that IoT devices collect useful, helps filter redundant data out of big data stores and performs complex data analysis using data science.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn about &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Integrating-IoT-and-machine-learning-Benefits-and-use-cases"&gt;&lt;i&gt;integrating IoT and machine learning&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    IoT professionals will need a diverse skill set that enables them to develop and maintain IoT infrastructure at every level of the technology stack.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;h3&gt;2. Node.js development&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/whatis/definition/Nodejs"&gt;Node.js&lt;/a&gt; is a popular open source development environment for developers who are looking to pivot into IoT space. Node.js is often used in tandem with connected devices, such as Arduino and Raspberry Pi.&lt;/p&gt;
 &lt;p&gt;Arduino is a single-board microcontroller known for making embedded programming easier by &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/Tips-and-tricks-for-deploying-TinyML"&gt;interfacing with sensors&lt;/a&gt; and other inputs and outputs. Raspberry Pi is a low-cost, miniature, single-board computer used as a lightweight software development tool with languages such as &lt;a href="https://www.techtarget.com/whatis/definition/Python"&gt;Python&lt;/a&gt; and Node.js. Both devices are good teaching tools for people who want to get into these languages in an IoT context. Node.js enables Arduino and Raspberry Pi to communicate with each other.&lt;/p&gt;
 &lt;p&gt;Node.js is well suited to a distributed IoT environment, which quickly processes real-time data. It can handle multiple tasks at once because of its &lt;a href="https://www.techtarget.com/searchnetworking/definition/asynchronous"&gt;asynchronous&lt;/a&gt;, event-driven input/output model.&lt;/p&gt;
 &lt;h3&gt;3. Mobile app development&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/feature/Get-started-with-IoT-mobile-apps-for-enterprise-use"&gt;Mobile apps often control IoT&lt;/a&gt; devices, so it is important for IoT developers to know how to create user-friendly, high-performance mobile applications. IoT applications should also be cross-platform and be able to communicate effectively with cloud servers and a range of hardware. Like most aspects of IoT, mobile apps should also perform well with real-time data.&lt;/p&gt;
 &lt;h3&gt;4. API automation and testing&lt;/h3&gt;
 &lt;p&gt;Application programming interfaces (&lt;a href="https://www.techtarget.com/searchapparchitecture/definition/application-program-interface-API"&gt;APIs&lt;/a&gt;) enable IoT devices to exchange real-time data efficiently and accurately; it's how IoT devices communicate with each other. Therefore, it is important for IoT professionals to &lt;a href="https://www.techtarget.com/searchsecurity/tip/7-API-security-testing-best-practices-with-checklist"&gt;be well versed in API testing&lt;/a&gt;. Because of IoT's complex and distributed nature, it is also important to automate tests where possible.&lt;/p&gt;
 &lt;p&gt;An example test case for IoT would be to ensure that a certain physical condition picked up by a sensor is represented properly in the program. Another example is to test what happens when the data structure of an IoT monitoring system is updated. For example, will changing the way data is organized within the system change how the data is processed? Any changes should be noted and tested to make sure the desired change occurred.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchapparchitecture/tip/API-testing-checklist-and-best-practices"&gt;&lt;em&gt;Hone your API testing skills&lt;/em&gt;&lt;/a&gt;&lt;em&gt; with this best practices checklist. &lt;/em&gt;&lt;/p&gt;
 &lt;h3&gt;5. Information security&lt;/h3&gt;
 &lt;p&gt;Infosec professionals are in high demand in the IoT space. &lt;a&gt;&lt;/a&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/5-IoT-security-threats-to-prioritize"&gt;Securing IoT infrastructure&lt;/a&gt;&amp;nbsp;is difficult because of the array of implementations and devices that IoT includes. Security engineers in this field need to be creative and adaptable in how they approach &lt;a href="https://www.techtarget.com/searchsecurity/definition/vulnerability-assessment-vulnerability-analysis"&gt;vulnerability assessments&lt;/a&gt;, accounting for both physical and logical weaknesses in IoT endpoints. There is also demand for security personnel that are skilled with tools from specific vendors, such as Orbit, a business management platform, and CloudFlare, a secure content distribution network.&lt;/p&gt;
 &lt;p&gt;One weakness of IoT -- specifically industrial IoT -- is password security. Often, administrators neglect to change manufacturer-set default passwords, because many devices in this space are not geared toward usability. They operate autonomously much of the time and do not have users regularly accessing them. Unchanged passwords make it significantly easier for intruders to guess the &lt;a href="https://www.techtarget.com/iotagenda/post/Dont-believe-the-passwordless-hype"&gt;generic passwords and break into IoT&lt;/a&gt; systems to steal data or perform network reconnaissance.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Learn some &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-5-password-hygiene-tips-and-best-practices" target="_blank" rel="noopener"&gt;best practices for password hygiene&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
 &lt;h3&gt;6. UI/UX design&lt;/h3&gt;
 &lt;p&gt;IoT's security problem and need for competent &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/user-interface-UI"&gt;user interface&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchcio/definition/UX-user-experience"&gt;user experience&lt;/a&gt; designers go hand in hand. The more user-friendly an IoT device is, the easier it is for security personnel to dynamically update security settings.&lt;/p&gt;
 &lt;p&gt;Good user experience also makes it easy for users to understand how a given IoT product provides value to their organization. With all the information IoT devices generate, good UX and responsive web design are crucial to creating a secure flow of data from sensors to applications to people. UX designers in the IoT space must be able to collaborate with IoT software developers to make this a reality.&lt;/p&gt;
 &lt;h3&gt;7. Cloud computing&lt;/h3&gt;
 &lt;p&gt;The distributed cloud computing framework is an important concept for IoT professionals. Instead of processing the data solely at the &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge&lt;/a&gt; -- the closest to the place in a network where data gets created -- or in a centralized cloud database, distributed computing mixes both approaches, processing some data at the edge and some centrally. Time-critical data or data that requires less processing could be processed at the edge and close to the source. Data that is not time sensitive or requires more intensive processing can be sent to a centralized location farther from the source.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/ZSLIN1aBr4w?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;                           
&lt;section class="section main-article-chapter" data-menu-title="How to improve IoT skills"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to improve IoT skills&lt;/h2&gt;
 &lt;p&gt;To improve IoT skills, the IT professional needs to identify areas to develop. This can be done by reviewing a list of common skills or a job description for IoT. Peer reviews and manager assessments are also helpful to determine skill improvement opportunities.&lt;/p&gt;
 &lt;p&gt;Here are some ways to enhance and improve skills:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/feature/11-top-IoT-online-courses-to-boost-your-career-free-and-paid"&gt;Pursue training online&lt;/a&gt;, through workshops or at conferences.&lt;/li&gt; 
  &lt;li&gt;Look into &lt;a href="https://www.techtarget.com/whatis/feature/IT-certification-vs-degree-Which-is-better-for-your-career"&gt;certifications or a college degree&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Find an experienced mentor for questions and advice.&lt;/li&gt; 
  &lt;li&gt;Ask questions for clarification.&amp;nbsp;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;IoT speaks many programming languages -- such as Java, Python, PHP, Swift and C# -- and requires experience in a variety of frameworks such as hardware, software, cloud, analytics and user interface. It's also equally important to maintain these skills over time because this field is always changing as &lt;a href="https://www.techtarget.com/iotagenda/tip/Top-9-IoT-business-models"&gt;IoT is incorporated into various business models&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The internet of things is growing rapidly and becoming increasingly complex. IoT professionals will need an array of skills to succeed as this trend continues.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keys_a150731005.jpg</image>
            <link>https://www.techtarget.com/whatis/feature/Top-7-must-have-IoT-skills-to-boost-your-career</link>
            <pubDate>Mon, 14 Jul 2025 14:13:00 GMT</pubDate>
            <title>Top 7 must-have IoT skills to boost your career</title>
        </item>
        <item>
            <body>&lt;p&gt;The internet of things, or &lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt;, connects sensors and control devices, enabling computer systems to interact with and influence real-world activities. Businesses can take advantage of this capability for many use cases, ranging from facility control applications that resemble smart homes to the control of real-time processes in industrial, transportation, utility and other verticals.&lt;/p&gt; 
&lt;p&gt;Also, an increasing number of IoT functions -- even ones as complex as image and video analysis -- have been reduced to hardware and chip implementations, making them easy to deploy and efficient to run, even when the IoT application has stringent latency requirements on the control loop (i.e., the path from event reception to control response).&lt;/p&gt; 
&lt;p&gt;Although real-time process control is a major use case for IoT, many such requirements can be addressed with simple programming or event-processing software. These IoT applications typically only process events in specific, predetermined ways, and they can't easily correlate multiple events or understand changes over time -- an area where machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;) excels.&lt;/p&gt; 
&lt;p&gt;Integrating IoT and ML can lead to numerous benefits, such as efficiency in real-time analytics and predictive maintenance. Because IoT and ML complement each other's strengths, they've successfully been applied across many industries, including healthcare, industrial and manufacturing, utilities and business management.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="IoT and machine learning"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;IoT and machine learning&lt;/h2&gt;
 &lt;p&gt;The increasing complexity of real-time process control applications and the untapped value of historical IoT data drive the integration of IoT and ML. That data helps businesses identify trends and better understand how their products and services are created. What sets ML apart from other forms of artificial intelligence (AI) is its ability to learn from real-time or recorded information specific to the IoT process involved. It doesn't train on outside data, but on the job. This provides significant benefits for enterprises:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;IoT systems can generate a large number of events with insufficient links to the processes they control, making practical analysis difficult. ML algorithms address this challenge by &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Types-of-learning-in-machine-learning-explained"&gt;learning to identify patterns&lt;/a&gt; in data.&lt;/li&gt; 
  &lt;li&gt;ML systems can convert raw IoT events into meaningful process conditions, which is key to analyzing and automating complex workflows. Whereas a sensor can signal an event, ML can determine what that event means.&lt;/li&gt; 
  &lt;li&gt;By analyzing signals from multiple sensors, machine learning models develop a comprehensive view of the overall system: how it creates, moves and stores what a company sells. That deeper awareness enables the ML model to provide real-time insights into the system's state -- for example, normal operation or fault -- and recommendations for restoring or optimizing operations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A recent innovation in the partnership between IoT and ML uses the &lt;a href="https://www.techtarget.com/searcherp/definition/digital-twin"&gt;digital twin&lt;/a&gt;, a model of a real-world process that's synchronized with the process using IoT sensors. The digital twin provides ML systems with context, a way of knowing the structure of a real-time process in advance, which improves the ML model's ability to control complex systems.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/4FxU-xpuCww?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;The role of training&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Explore-the-role-of-training-data-in-AI-and-machine-learning"&gt;ML systems require training&lt;/a&gt; to perform their tasks effectively. In IoT, training aims to transform raw &lt;a href="https://www.techtarget.com/iotagenda/definition/sensor-data"&gt;sensor data&lt;/a&gt; into meaningful process conditions.&lt;/p&gt;
 &lt;p&gt;ML training can take four forms:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Human-driven cooperation between an ML expert and a process expert.&lt;/b&gt; The ML expert writes rules based on guidance from a subject-matter expert on the real-time process being addressed; this forms the basis of the ML application. This was once the dominant approach, and it's still used to create initial ML models.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Using application logs for historical data analysis.&lt;/b&gt; This gives the ML model a broad view of how the real-time process works. If the logs properly identify events and control actions, they can also teach the ML model the appropriate responses to changing conditions. This is the preferred way to fully train an ML system, whether as the exclusive mechanism for doing so or as a way of &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/How-to-train-an-LLM-on-your-own-data"&gt;building on an existing model&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;A rule set is created as a foundation model, using generative AI (GenAI) to analyze a broad range of historical data from other IoT applications.&lt;/b&gt; This represents the latest advancements in ML training.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Real-time learning from the observation of process operations.&lt;/b&gt; This requires an application that receives IoT events and passes control commands and depends on a human operator to generate responses that the ML system learns. This can be used to refine existing models, but it often requires considerable time to accumulate experience on the full range of conditions that could be encountered.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Unlike traditional programmatic IoT systems, which recognize only predefined scenarios, ML models can adapt dynamically to new conditions. Once trained, they can analyze sensor data and provide real-time recommendations.&lt;/p&gt;
 &lt;div class="extra-info"&gt;
  &lt;div class="extra-info-inner"&gt;
   &lt;h3 class="splash-heading"&gt;Generative AI and IoT&lt;/h3&gt; 
   &lt;p&gt;Because of control loop latency constraints, generative or large language model (&lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM"&gt;LLM&lt;/a&gt;)-based AI will likely have too much latency to be introduced into IoT control loops. However, it can augment ML in IoT applications beyond the control loop and facilitate building ML models for IoT applications.&lt;/p&gt; 
   &lt;p&gt;Here are a couple of examples of GenAI, ML and IoT augmentation:&lt;/p&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;IoT generates a large amount of data, surpassing the volume of ordinary business transactions. This data can be used by a GenAI application to report on the state of processes and to aid in capacity and process planning. Because GenAI can respond to natural language questions, generate images and analyze data, it's a candidate for IoT applications that involve processing high volumes of data and supporting free-form human interactions.&lt;/li&gt; 
    &lt;li&gt;GenAI, in its agentic form, can link the control loop to traditional business processes. Many ML and IoT use cases, including business process management (&lt;a href="https://www.techtarget.com/searchcio/definition/business-process-management"&gt;BPM&lt;/a&gt;), are likely to evolve toward more GenAI-focused applications over time. To manage this transition, organizations should be proactive, aiming to balance advanced functionalities with cost-efficiency.&lt;/li&gt; 
   &lt;/ul&gt; 
   &lt;p&gt;Business cases for using GenAI in developing ML models and applications include the following:&lt;/p&gt; 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;GenAI is already being used to build training and test data for ML development by creating plausible variations on historical process data captured.&lt;/li&gt; 
    &lt;li&gt;GenAI can filter historical process data to remove extraneous information that could interfere with ML training.&lt;/li&gt; 
    &lt;li&gt;In closed-loop &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/Explore-real-world-use-cases-for-adaptive-AI"&gt;adaptive learning&lt;/a&gt;, GenAI can analyze conditions to recommend rule changes when an IoT event doesn't match existing ML rules or when human oversight reverses an ML decision.&lt;/li&gt; 
    &lt;li&gt;GenAI can be used to build foundation ML models for standard business processes. Nvidia is just one example of a company already working in this area.&lt;/li&gt; 
    &lt;li&gt;GenAI can be used to build digital twin models of real-time processes, which can improve the quality of an IoT and ML system.&lt;/li&gt; 
   &lt;/ul&gt;
  &lt;/div&gt;
 &lt;/div&gt;
 &lt;h3&gt;Historical data analysis&lt;/h3&gt;
 &lt;p&gt;Historical IoT data plays a dual role in ML integration:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Training and pattern recognition.&lt;/b&gt; Historical data gives ML models the foundation they need to recognize patterns that represent conditions and, with the support of experts, link those patterns to recommended actions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Analysis and forecasting.&lt;/b&gt; Analyzing historical data enables ML models to recognize trends, spot developing conditions requiring intervention and compare the value of alternative actions. For example, historical data can define the state of the process, identify it as valid or indicate a problem and recognize steps to restore invalid states to an identified goal state.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="Benefits of integrating IoT and machine learning"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of integrating IoT and machine learning&lt;/h2&gt;
 &lt;p&gt;ML is an alternative to building IoT applications as event processors and using state-event tables or graphs. ML is superior to either of these programming options for several reasons:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchenterpriseai/tip/8-machine-learning-benefits-for-businesses"&gt;ML is a more complete rule statement&lt;/a&gt;. The biggest problem enterprises report with IoT applications is an incomplete rule set, which means that the developer most likely forgot them. ML models learn, meaning that they build experiences into rules and are far less likely to miss important event sequences.&lt;/li&gt; 
  &lt;li&gt;ML can easily incorporate foundation models or generalized ML models created for a class of real-time processes. These can then be fine-tuned or trained to the specific needs of a target application.&lt;/li&gt; 
  &lt;li&gt;ML, if it supports real-time training, can automatically accommodate new events, conditions and IoT devices. With traditional programming, these would require development work.&lt;/li&gt; 
  &lt;li&gt;ML can accommodate more complex conditions in the control loop without significantly increasing latency.&lt;/li&gt; 
  &lt;li&gt;ML models can be applied hierarchically, integrating with each other or with AI agents.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Machine learning and IoT applications across industries"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Machine learning and IoT applications across industries&lt;/h2&gt;
 &lt;p&gt;ML-enabled IoT applications mix real-time and historical data to inform their recommendations and analyses. How that integration is done, and &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/Top-12-machine-learning-use-cases-and-business-applications"&gt;which specific use cases it supports&lt;/a&gt;, varies by vertical market segment.&lt;/p&gt;
 &lt;h3&gt;Healthcare&lt;/h3&gt;
 &lt;p&gt;Healthcare is among the fastest-growing verticals for ML-enabled IoT, including both real-time and non-real-time applications -- although the latter has yielded more use cases so far. Consider the following examples:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;ML analysis of broad medical records, combined with patient-specific data and real-time patient vital signs obtained using IoT, can alert the patient care team to trends that require intervention.&lt;/li&gt; 
  &lt;li&gt;ML is increasingly used to examine medical images of all types. For example, it has proved highly effective in mammography for spotting cancer early and in difficult situations. Because ML can learn from a radiologist's review of the results, its accuracy improves over time.&lt;/li&gt; 
  &lt;li&gt;The same information, when collected for historical analysis, can drive reviews and changes to overall patient care protocols, treatment plans, medications and medical equipment. Many of these use cases dovetail with other uses of &lt;a href="https://www.techtarget.com/healthtechanalytics/feature/Artificial-intelligence-in-healthcare-defining-the-most-common-terms"&gt;ML in healthcare&lt;/a&gt;, such as analyzing medical imaging, electrocardiogram data and blood test results.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Industrial and manufacturing&lt;/h3&gt;
 &lt;p&gt;Industrial settings are a significant area for IoT and ML use cases and a fast-growing domain for real-time applications. ML-driven process control is more flexible than traditional fixed programming of automated systems.&lt;/p&gt;
 &lt;p&gt;Manufacturing use cases for IoT and ML include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Flexible or highly adaptable manufacturing.&lt;/b&gt; Because ML algorithms can adapt over time, they help improve process control systems by learning from and adjusting to new conditions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Parts and assembly inspection.&lt;/b&gt; ML can inspect images of parts or assemblies to spot defects before they're further integrated into products, reducing waste.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Assembly lines and product transportation.&lt;/b&gt; ML has been used in assembly lines and to move supplies and products with autonomous vehicles to improve safety. One manufacturer reported a 22% reduction in insurance claims and rates through this application.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Production processes and logistics.&lt;/b&gt; IoT sensor data collected over time can be combined with real-time data from production processes and logistics, such as manufacturing steps, transportation and storage of parts and finished goods. This can improve efficiency in parts delivery and traditional &lt;a href="https://www.techtarget.com/whatis/definition/just-in-time-manufacturing-JIT-manufacturing"&gt;just-in-time&lt;/a&gt; manufacturing practices, thereby reducing costs, vehicle miles traveled and carbon footprint.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Equipment and vehicle predictive maintenance.&lt;/b&gt; ML models can use IoT-reported process activity data to learn long-term relationships and anticipate failures. When paired with historical cost information on past maintenance from core business applications, ML can also help determine when to retire vehicles or equipment.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Utilities management&lt;/h3&gt;
 &lt;p&gt;The &lt;a target="_blank" href="https://pragyatmika.co.in/iot-and-ai-in-utility-management-of-smart-cities/" rel="noopener"&gt;utility industry stands out&lt;/a&gt; as a committed adopter of IoT, ML and both in combination. This is due to the sector's multifaceted nature, which combines elements from areas including transportation, customer support, regulatory compliance and BPM.&lt;/p&gt;
 &lt;p&gt;Consequently, utilities involved in distributing or handling power, gas, water and wastewater are a fast-growing area for ML and IoT. These applications combine real-time missions, such as early problem detection, with historical analysis to inform capacity planning, resource allocation and environmental impact management.&lt;/p&gt;
 &lt;h3&gt;Business process management&lt;/h3&gt;
 &lt;p&gt;In BPM, ML and IoT applications typically rely on non-real-time analysis. These systems often repurpose IoT data collected for other applications to track business processes in detail.&lt;/p&gt;
 &lt;p&gt;BPM has the unique and explicit goal of assembling real-time IoT data that tracks business processes and combining it with other historical company data. Traditional business analytics focuses on accumulated transactional data about a company's operations, which often lacks any link with how it creates, distributes and manages its products and resources.&lt;/p&gt;
 &lt;p&gt;By combining IoT-derived insights with transactional data analysis, ML algorithms can give decision-makers a more complete picture of operations. This application is also being increasingly augmented by AI agents built on small or large language models.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Tom Nolle is founder and principal analyst at Andover Intel, a consulting and analysis firm that looks at evolving technologies and applications first from the perspective of the buyer and the buyer's needs. By background, Nolle is a programmer, software architect, and manager of software and network products. He has provided consulting services and technology analysis for decades.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>With applications in industries such as manufacturing and healthcare, integrating IoT with machine learning offers a range of unique benefits.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/iot_g1212287865.jpg</image>
            <link>https://www.techtarget.com/searchenterpriseai/tip/Integrating-IoT-and-machine-learning-Benefits-and-use-cases</link>
            <pubDate>Mon, 14 Jul 2025 00:00:00 GMT</pubDate>
            <title>Integrating IoT and machine learning: Benefits and use cases</title>
        </item>
        <item>
            <body>&lt;p&gt;IoT endpoints are prime targets for attacks, with the soaring number of connected devices and often porous security controls creating plenty of opportunities for hackers.&lt;/p&gt; 
&lt;p&gt;In its "The State of &lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-security-Internet-of-Things-security"&gt;IoT Security&lt;/a&gt;, 2024" report, Forrester Research concluded that corporate &lt;a href="https://www.techtarget.com/iotagenda/definition/IoT-device"&gt;IoT devices&lt;/a&gt; were the most reported target for external attacks, meaning they were attacked more than any other enterprise asset, including corporate and employee-owned computers and mobile devices.&lt;/p&gt; 
&lt;p&gt;According to cybersecurity software maker SonicWall's "2025 Cyber Threat Report," IoT attacks were up 124% in 2024. The worrisome statistics aren't surprising, given the &lt;a href="https://www.techtarget.com/iotagenda/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to-consider"&gt;challenges of securing an IoT ecosystem&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;First, the IoT industry doesn't have a clear set of security standards to ensure developers and manufacturers incorporate consistent security across their products. Also, IT admins often find it challenging to keep track of and update devices that remain in the field for many years.&lt;/p&gt; 
&lt;p&gt;In addition, many IoT devices lack built-in security features due to their embedded firmware or software limitations. They often come with default passwords that don't have to be reset when deployed.&lt;/p&gt; 
&lt;p&gt;Meanwhile, hackers scan networks for devices and known vulnerabilities and increasingly use nonstandard ports to get network access. Once they have device access, it's easier to avoid detection through fileless malware or software memory.&lt;/p&gt; 
&lt;p&gt;Let's examine what makes IoT devices vulnerable and how to mitigate attacks.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is the IoT attack surface?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the IoT attack surface?&lt;/h2&gt;
 &lt;p&gt;At its basic level, an &lt;a href="https://www.techtarget.com/whatis/definition/attack-surface"&gt;attack surface&lt;/a&gt; refers to the total number of potential entry points for unauthorized system access. An IoT attack surface includes all possible security vulnerabilities for IoT devices, their software and network connections.&lt;/p&gt;
 &lt;p&gt;The growing concern around IoT device security includes the fact that threat actors can damage the network and software that support IoT devices and the devices themselves. Furthermore, IoT device adoption is advancing faster than the processes and protocols that &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/How-to-manage-Windows-Server-in-an-air-gapped-environment"&gt;provide secure, reliable connections&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Organizations can take steps to secure the IoT attack surface, but this requires the staff and technical expertise to establish policies that can proactively detect threats and reactively apply measures to reduce the size of the attack surface.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/tips_to_reduce_attack_surfaces-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/tips_to_reduce_attack_surfaces-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/tips_to_reduce_attack_surfaces-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/tips_to_reduce_attack_surfaces-f.png 1280w" alt="Graphic listing tips to reduce attack surfaces" height="269" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Here are six tips for reducing the attack surface and potential security risks.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Top IoT security risks to address"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top IoT security risks to address&lt;/h2&gt;
 &lt;p&gt;Here are the eight common IoT vulnerabilities and seven external threats that pose the most significant risks.&lt;/p&gt;
 &lt;h3&gt;1. An expanding attack surface&lt;/h3&gt;
 &lt;p&gt;One of the biggest threats to an organization's ability to secure its IoT environment is its sheer scale. Estimates on the actual number of connected devices in the world vary from one researcher to the next, but they are consistently in the billions and growing. For example, in its "State of IoT Summer 2024" report, IoT Analytics said that connected IoT devices numbered 16.6 billion at the end of 2023 -- up 15% over 2022. By the end of 2024, that number was 18.8 billion.&lt;/p&gt;
 &lt;p&gt;Moreover, enterprise IoT spending is projected to grow at a 14% compound annual growth rate through 2030, according to IoT Analytics' "State of IoT Spring 2025" report, with that spending dramatically expanding the attack surface.&lt;/p&gt;
 &lt;p&gt;Of course, an individual organization has far fewer devices to secure, but the number of connected endpoints adds up fast. Additionally, IoT devices are generally on 24/7, with many continuously connected.&lt;/p&gt;
 &lt;h3&gt;2. Insecure hardware&lt;/h3&gt;
 &lt;p&gt;A &lt;a href="https://www.techtarget.com/searchsecurity/tip/Types-of-endpoint-security"&gt;single endpoint device can present a risk&lt;/a&gt; to the security of the entire IoT ecosystem -- and, ultimately, the organization's IT environment. Devices often lack built-in security controls due to their limitations -- namely, their small computational capacity and low-power design.&lt;/p&gt;
 &lt;p&gt;As a result, many devices can't support security features such as authentication, &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt; and access control. Even when endpoint devices have security controls such as passwords, some organizations deploy them without using or enabling them. That leaves devices and the organization vulnerable to various attack types, including brute-force attacks.&lt;/p&gt;
 &lt;h3&gt;3. Maintenance and update challenges&lt;/h3&gt;
 &lt;p&gt;Challenges with adequately maintaining endpoint devices and updating software create further security vulnerabilities. There are a few contributing factors here. First, updates like a security patch to address a vulnerability that hackers could exploit might not be forthcoming from device vendors, particularly if the endpoint device is older. Second, connectivity limitations, along with a device's limited computation capacity and power supply, could make updating devices deployed in the field impossible.&lt;/p&gt;
 &lt;h3&gt;4. Lack of visibility into the IoT environment&lt;/h3&gt;
 &lt;p&gt;Even when updates are possible, organizations might not know whether they have devices to update. According to a 2024 survey by Starfleet Research, nearly half (46%) of security leaders reported difficulty in gaining IoT device visibility.&lt;/p&gt;
 &lt;h3&gt;5. Shadow IoT&lt;/h3&gt;
 &lt;p&gt;A related risk is shadow IoT -- that is, IoT endpoints deployed without IT's or the security department's official support or permission. These unsanctioned IoT devices could be personal items with an IP address, such as fitness trackers or digital assistants, but they could also be corporate and enterprise technologies, such as wireless printers. Either way, they create risks for the enterprise because they might not &lt;a href="https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one"&gt;meet an organization's security standards&lt;/a&gt;, and even if they do, they might not be configured and deployed in ways that follow security best practices.&lt;/p&gt;
 &lt;p&gt;Additionally, IT administrators and security teams generally lack knowledge of these deployments. They might not monitor them or their traffic, giving hackers a higher chance of successfully breaching them without being detected.&lt;/p&gt;
 &lt;h3&gt;6. Poor asset management&lt;/h3&gt;
 &lt;p&gt;Organizations face challenges not only in identifying all the IoT devices in their environment but also in effectively managing the devices they do have. &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Patch-management-vs-vulnerability-management-Key-differences"&gt;Some fail to patch vulnerabilities&lt;/a&gt; and update software when patches and updates are available. Others neglect to fix known misconfigurations in a timely manner, if at all, or implement adequate access controls. Organizations often fail to take such actions because the work it requires exceeds their capacity to do it.&lt;/p&gt;
 &lt;h3&gt;7. Inadequate or nonexistent monitoring and incident response capabilities&lt;/h3&gt;
 &lt;p&gt;Monitoring for unusual activities and traffic that could indicate attempted attacks has become a standard security practice to safeguard IT environments. The same goes for incident response capabilities. However, organizations don't always have those capabilities or the same level of maturity in their capabilities within the IoT environment for various reasons, such as resource constraints and the complexity of IoT environments.&lt;/p&gt;
 &lt;h3&gt;8. Unencrypted data transmissions&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/iotagenda/tip/How-to-select-the-right-IoT-database-architecture"&gt;IoT devices collect vast amounts of data&lt;/a&gt; as they measure and record everything from temperature readings to the speed of objects. They send much of this data to centralized locations -- usually in the cloud -- for processing, analysis and storage. They also frequently receive information back that tells the devices what actions to take. Studies have shown that a significant portion of this transmitted data is unencrypted.&lt;/p&gt;
 &lt;h3&gt;9. IoT botnets&lt;/h3&gt;
 &lt;p&gt;In addition to vulnerabilities, threats are coming from outside the IoT environment. One such threat is the botnet. Enterprise IT and security leaders have consistently listed this as a top threat following the major botnet attacks, such as Mirai, that arose nearly a decade ago.&lt;/p&gt;
 &lt;p&gt;In these attacks, an attacker &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-protect-your-organization-from-IoT-malware"&gt;infects an IoT device with malware&lt;/a&gt; through an unprotected port or phishing scam and co-opts it into an IoT botnet to initiate massive cyberattacks. Hackers can easily find malicious code on the internet that detects susceptible machines or hides code from detection before another code module signals devices to launch an attack or steal information.&lt;/p&gt;
 &lt;p&gt;IoT botnets are frequently used for DDoS attacks to overwhelm a target's network traffic. Botnet orchestrators find IoT devices an attractive target because of weak security configurations and the number of devices that can be consigned to a botnet to target organizations.&lt;/p&gt;
 &lt;h3&gt;10. DNS threats&lt;/h3&gt;
 &lt;p&gt;Many organizations use IoT to collect data from older machines that lack the most recent security standards. When organizations combine legacy devices with IoT, it can expose the network to older device vulnerabilities. IoT device connections often rely on DNS, a decentralized naming system from the 1980s, which might not handle the scale of IoT deployments that can grow to thousands of devices. Hackers can use DNS vulnerabilities in &lt;a href="https://www.techtarget.com/searchsecurity/tip/Types-of-DNS-attacks-and-how-to-prevent-them"&gt;DDoS attacks and DNS tunneling&lt;/a&gt; to get data or introduce malware.&lt;/p&gt;
 &lt;h3&gt;11. Malicious node injection&lt;/h3&gt;
 &lt;p&gt;Hackers can also attack an IoT ecosystem by inserting or injecting fake nodes into the web of legitimate connecting nodes, thereby enabling hackers to alter and/or control the data flowing between the fake and legitimate nodes -- and, ultimately, all the nodes in the web.&lt;/p&gt;
 &lt;h3&gt;12. IoT ransomware&lt;/h3&gt;
 &lt;p&gt;As the number of insecure devices connected to corporate networks increases, so do IoT ransomware attacks. Hackers infect devices with malware to turn them into botnets that probe access points or search for valid credentials in device firmware that they can use to enter the network.&lt;/p&gt;
 &lt;p&gt;With network access through an IoT device, attackers can exfiltrate data to the cloud and threaten to keep, delete or make the data public unless paid a ransom. Sometimes, payment isn't enough for an organization to get all its data back, and the ransomware automatically deletes the files, regardless.&lt;/p&gt;
 &lt;h3&gt;13. Tampering with physical devices&lt;/h3&gt;
 &lt;p&gt;Hackers tampering with physical devices presents another risk. This could mean that attackers physically access an IoT device to steal data, tamper with the device to install malware, access its ports and inner circuits to break into the organization's network, or destroy it altogether.&lt;/p&gt;
 &lt;h3&gt;14. Firmware exploits/supply chain vulnerabilities&lt;/h3&gt;
 &lt;p&gt;As &lt;a href="https://www.techtarget.com/searchsecurity/tip/The-biggest-ransomware-attacks-in-history"&gt;headline-making attacks in recent years&lt;/a&gt; have shown, hackers use vulnerabilities in the technology components and software that organizations buy to run their operations. Those same supply chain vulnerabilities exist in the IoT market, which leaves organizations reliant on their IoT vendors to identify the vulnerabilities and offer fixes. And when these vendors are not forthcoming -- or not responsive quickly enough -- organizations can fall victim to hackers whose MO is targeting known vulnerabilities in IoT equipment.&lt;/p&gt;
 &lt;h3&gt;15. Vulnerabilities in the ecosystem&lt;/h3&gt;
 &lt;p&gt;As IoT devices proliferated, so did their connections to the organization's infrastructure and the broader connected universe. That connectedness, which is the very nature of IoT, can amplify the potential risks associated with vulnerabilities anywhere in the ecosystem. For example, insecure interfaces such as APIs create an entry point for hackers who could use that foothold to access increasingly sensitive points within the ecosystem.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/mLg95dLm-Gs?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;                                        
&lt;section class="section main-article-chapter" data-menu-title="How to defend against IoT security risks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to defend against IoT security risks&lt;/h2&gt;
 &lt;p&gt;IT teams must take a multilayered approach to IoT security risk mitigation and &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-are-the-cybersecurity-benefits-of-zero-trust"&gt;adopt a zero-trust approach to security&lt;/a&gt;, whereby access is given to entities -- whether human users or IoT devices -- only after they verify their identities and enterprise-authorized rights to connect with the systems or data they are seeking to access.&lt;/p&gt;
 &lt;p&gt;In addition to those overarching security strategies, organizations should have specific defenses to protect against the different types of IoT attacks. They should establish robust governance policies and practices to mitigate excessive risk.&lt;/p&gt;
 &lt;p&gt;IoT security combines policy enforcement and software to detect and address any threats. Enterprise IT teams, in conjunction with security teams and the business departments that own IoT use cases, should do the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Enact and enforce strong password policies for devices on the network.&lt;/li&gt; 
  &lt;li&gt;Use threat detection software to anticipate potential attacks and network monitoring tools to detect activities that could indicate a threat, attack attempt or actual attack.&lt;/li&gt; 
  &lt;li&gt;Have a comprehensive asset detection and management program to ensure better visibility into the endpoints deployed in their enterprise and what data is on their IoT devices.&lt;/li&gt; 
  &lt;li&gt;Conduct device vulnerability assessments.&lt;/li&gt; 
  &lt;li&gt;Disable unneeded services.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchdatabackup/tip/Backup-scheduling-best-practices-to-ensure-availability"&gt;Perform regular data backups&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Implement and practice disaster recovery procedures.&lt;/li&gt; 
  &lt;li&gt;Implement network segmentation.&lt;/li&gt; 
  &lt;li&gt;Install software that counters the various attack types, such as using DNS Security Extensions, a cryptographic security protocol that helps secure the DNS.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Additionally, organizations should follow basic cybersecurity measures, such as authentication, regular updates and patches, and confirm that IoT devices meet security standards and protocols before they're added to the network.&lt;/p&gt;
 &lt;p&gt;Data protection strategies are another way to boost IoT security. IT teams can help ensure data security by using visibility tools, data classification systems, data encryption measures, data privacy measurements and log management systems.&lt;/p&gt;
 &lt;p&gt;For physical security measures, organizations should place devices in a tamper-resistant case and remove any device information manufacturers might include on the parts, such as model numbers or passwords. IoT designers should bury conductors in the multilayer circuit &lt;a target="_blank" href="https://www.bytesnap.com/news-blog/introduction-iot-hardware-design/" rel="noopener"&gt;board&lt;/a&gt; to prevent hackers from easily accessing them. If a hacker does tamper with a device, it should have a disable function, such as short-circuiting when opened.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Mary K. Pratt is an award-winning freelance journalist with a focus on covering enterprise IT and cybersecurity management.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Certain IoT security concerns, like botnets, are hard to forget, but others might not come to mind as easily, including DNS threats and physical device attacks.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/iot_g1157534820.jpg</image>
            <link>https://www.techtarget.com/iotagenda/tip/5-IoT-security-threats-to-prioritize</link>
            <pubDate>Wed, 02 Jul 2025 09:00:00 GMT</pubDate>
            <title>Top 15 IoT security threats and risks to prioritize</title>
        </item>
        <item>
            <body>&lt;p&gt;CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for &lt;a href="https://www.techtarget.com/searchitchannel/feature/MSPs-expand-into-managed-physical-security-services"&gt;security and monitoring&lt;/a&gt;.&lt;/p&gt; 
&lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cctv_camera-h.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cctv_camera-h_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cctv_camera-h_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/cctv_camera-h.jpg 1280w" alt="Photo of a CCTV camera." data-credit="Oatintro/Getty Images" height="207" width="280"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;CCTV cameras transmit signals for viewing on monitors in a closed loop for authorized users only. 
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;p&gt;CCTV systems enable real-time observation and recording of activities in designated areas. Unlike traditional broadcast television, CCTV operates on a closed loop, ensuring that footage is accessible only to &lt;a href="https://www.techtarget.com/searchsecurity/definition/user-authentication"&gt;authorized users&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does CCTV work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does CCTV work?&lt;/h2&gt;
 &lt;p&gt;CCTV relies on strategically placed cameras that capture video footage, which is then transmitted to monitors or recording devices through private &lt;a href="https://www.techtarget.com/searchnetworking/definition/coaxial-cable-illustrated"&gt;coaxial cables&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/wireless"&gt;wireless communication&lt;/a&gt;. CCTV systems often use digital technologies, enabling features like high-definition video, remote access and integration with &lt;a href="https://www.techtarget.com/searchsecurity/tip/Pave-a-path-to-cybersecurity-and-physical-security-convergence"&gt;other security systems&lt;/a&gt;. The closed-circuit aspect means that the video feed is limited to specific monitors, enhancing security and privacy.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Common applications of CCTV"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Common applications of CCTV&lt;/h2&gt;
 &lt;p&gt;Older CCTV systems used small, low-resolution, black-and-white monitors with no interactive capabilities. Modern CCTV systems can include color, high-resolution displays with the ability to zoom in on an image or track something -- or someone -- among their features. Talk CCTV lets an overseer speak to people within range of the camera's associated speakers.&lt;/p&gt;
 &lt;p&gt;CCTV technology has evolved significantly, expanding its applications across the following sectors:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Public safety and crime prevention.&lt;/b&gt; Cities worldwide deploy CCTV to monitor &lt;a href="https://www.techtarget.com/iotagenda/blog/IoT-Agenda/Smart-cities-for-a-stronger-resilient-future"&gt;public spaces&lt;/a&gt;, deter criminal activities and assist in investigations. For instance, Bengaluru, India, has geotagged over 530,000 CCTV cameras to enhance urban safety.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Traffic management.&lt;/b&gt; CCTV systems monitor traffic flow, detect violations and manage congestion.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Retail and commercial security.&lt;/b&gt; Businesses use CCTV to prevent theft, &lt;a href="https://www.techtarget.com/whatis/definition/employee-monitoring"&gt;monitor employee behavior&lt;/a&gt; and ensure customer safety.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Healthcare facilities.&lt;/b&gt; Hospitals employ CCTV to monitor patient areas, ensuring safety and &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/compliance"&gt;compliance&lt;/a&gt; with protocols.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Educational institutions.&lt;/b&gt; Schools use CCTV to enhance security, monitor student behavior and prevent vandalism.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Industrial and hazardous environments.&lt;/b&gt; CCTV enables remote monitoring of dangerous areas, reducing the &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/How-AI-can-transform-industrial-safety"&gt;risk to human operators&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Technological advancements in CCTV"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technological advancements in CCTV&lt;/h2&gt;
 &lt;p&gt;In the last few years, the following technology developments have significantly enhanced CCTV capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Digital video recorders and network video recorders.&lt;/b&gt; These devices enable &lt;a href="https://www.techtarget.com/searchstorage/answer/What-are-guidelines-for-cloud-based-video-surveillance-storage"&gt;efficient storage&lt;/a&gt; and retrieval of high-quality video footage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Internet Protocol cameras.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/Internet-Protocol"&gt;IP&lt;/a&gt; cameras offer higher resolution and can transmit data over networks, facilitating remote access and integration with other systems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI integration.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;-powered CCTV systems can detect unusual activities, recognize faces and trigger alerts, enhancing proactive security measures.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Edge computing.&lt;/b&gt; Processing data at the source -- i.e., the camera -- through &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge computing&lt;/a&gt; reduces latency and bandwidth usage, enabling real-time analytics and faster response times.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Privacy concerns and regulations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Privacy concerns and regulations&lt;/h2&gt;
 &lt;p&gt;The proliferation of CCTV has raised significant privacy issues. Primary concerns include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Data protection laws.&lt;/b&gt; In regions like the European Union, the &lt;a href="https://www.techtarget.com/whatis/definition/General-Data-Protection-Regulation-GDPR"&gt;General Data Protection Regulation&lt;/a&gt; mandates strict guidelines on &lt;a href="https://www.techtarget.com/searchcio/definition/data-collection"&gt;data collection&lt;/a&gt;, storage and usage, affecting how CCTV footage is handled.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Facial recognition technology.&lt;/b&gt; The integration of &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/facial-recognition"&gt;facial recognition&lt;/a&gt; with CCTV has sparked debates over surveillance and individual freedoms. The U.K., for example, calls for stricter regulations to govern such technologies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Public awareness and consent.&lt;/b&gt; It is crucial to make sure that individuals are informed about surveillance practices. Clear signage and transparent policies help maintain trust and compliance.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;CCTV systems play a pivotal role in modern security infrastructure, offering benefits in crime prevention, traffic management and operational efficiency. However, their deployment must balance security needs with respect for privacy and compliance with &lt;a href="https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one"&gt;legal frameworks&lt;/a&gt;.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/JkcYwaaN1PQ?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Global trends and implementations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Global trends and implementations&lt;/h2&gt;
 &lt;p&gt;CCTV usage varies globally, driven by different priorities and challenges in the various countries. Here are some use cases:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;India.&lt;/b&gt; Cities like Chennai have implemented extensive CCTV networks to &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/How-AI-in-physical-security-makes-public-places-safer"&gt;monitor public spaces&lt;/a&gt;, with control rooms overseeing thousands of cameras for enhanced security.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;U.K.&lt;/b&gt; CCTV surveillance in the U.K. emphasizes crime prevention and public safety, though it also grapples with privacy concerns.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;China.&lt;/b&gt; Known for its expansive surveillance systems, China integrates AI and facial recognition extensively, raising international discussions about privacy and human rights.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;U.S.&lt;/b&gt; CCTV is widely used in both public and private sectors, with real-time crime centers integrating various surveillance technologies to aid law enforcement.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;As the technology evolves, ongoing global dialogue and regulation are essential to make sure that CCTV &lt;a href="https://www.techtarget.com/whatis/feature/Examples-of-AI-in-the-Olympics"&gt;serves the public interest&lt;/a&gt; without infringing on individual rights.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Effectively powering edge devices like CCTV cameras around the clock is crucial and can be managed successfully with the right strategies. Learn the &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchdatacenter/tip/What-to-know-about-managing-power-for-edge-devices"&gt;&lt;i&gt;essentials of securing and maintaining reliable power at the edge&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for security and monitoring.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/whatis/definition/CCTV-closed-circuit-television</link>
            <pubDate>Wed, 25 Jun 2025 10:00:00 GMT</pubDate>
            <title>What is CCTV (closed-circuit television)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to end users and devices. Cisco ISE enables the creation and enforcement of security and access policies for users and &lt;a href="https://www.techtarget.com/whatis/definition/endpoint-device"&gt;endpoints&lt;/a&gt; connected to network infrastructure, such as routers and switches. It is intended to help organizations simplify &lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-management-ID-management"&gt;identity management&lt;/a&gt; across devices and applications, make proactive governance decisions, and implement a &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero-trust&lt;/a&gt; model across their IT environments.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How is Cisco ISE used?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How is Cisco ISE used?&lt;/h2&gt;
 &lt;p&gt;Cisco Identity Services Engine combines network access control (&lt;a href="https://www.techtarget.com/searchnetworking/definition/network-access-control"&gt;NAC&lt;/a&gt;), a &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-are-the-most-important-pillars-of-a-zero-trust-framework"&gt;zero-trust architecture&lt;/a&gt;, and identity and access control policy tools into one platform. Organizations can use Cisco ISE to define and enforce access policies with greater precision and meet compliance and reporting requirements. By enabling granular, policy-driven permissions for different populations of users and devices on a distributed network, Cisco ISE functions as a consolidated system for authentication, authorization and accounting (&lt;a href="https://www.techtarget.com/searchsecurity/definition/AAA-server"&gt;AAA&lt;/a&gt;). In doing so, it seeks to lower security risk and protect its IT assets and data from cyberattacks, data breaches and other undesirable events.&lt;/p&gt;
 &lt;p&gt;Cisco ISE can further strengthen network security and streamline &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-policy"&gt;security policy&lt;/a&gt; management by integrating with other security products. It can share information like user and device identities, as well as threats and vulnerabilities, with other Cisco and non-Cisco tools to jointly identify threats, isolate (or remove) infected endpoints and protect business-critical data.&lt;/p&gt;
 &lt;p&gt;In addition to policy enforcement, IT administrators can use ISE to improve &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-visibility"&gt;network visibility&lt;/a&gt;, grant guest access to the network, and perform threat containment, tool integrations, device administration and bring your own device (&lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device"&gt;BYOD&lt;/a&gt;) management.&lt;/p&gt;
 &lt;p&gt;Enhanced network visibility provides the ability to see not only which users and devices are connected but also the applications that are installed and running. Such visibility helps to strengthen network security and reduce the &lt;a href="https://www.techtarget.com/searchsecurity/tip/What-is-attack-surface-management-and-why-is-it-necessary"&gt;size of the attack surface&lt;/a&gt;. This then allows IT administrators to contain threats like malware in the network, minimizing their lateral movement and reducing the scope for damage.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_cisco_ise_is_used-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_cisco_ise_is_used-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_cisco_ise_is_used-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_cisco_ise_is_used-f.png 1280w" alt="Graphic with icons depicting the different functions of Cisco ISE in enterprise network management." height="252" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Cisco ISE can be used for many functions, including policy, visibility, threat containment, integration, device administration and BYOD management.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Cisco ISE can authenticate wired, wireless and virtual private network (&lt;a href="https://www.techtarget.com/searchnetworking/definition/virtual-private-network"&gt;VPN&lt;/a&gt;) users. It can identify and log a user's identity, location and access history, as well as assign different services based on those unique properties. Administrators can also configure network devices with &lt;a href="https://www.techtarget.com/searchnetworking/definition/IPv6-Internet-Protocol-Version-6"&gt;IPv6&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;The platform can also help organizations to streamline their service operations by consolidating management of network infrastructure, such as switches, routers and firewalls. This reduces the operational burden on IT teams and supports more consistent policy enforcement.&lt;/p&gt;
 &lt;p&gt;Taken together, these features and capabilities make Cisco ISE well-suited to &lt;a href="https://www.computerweekly.com/news/366582132/Zero-trust-is-a-strategy-not-a-technology"&gt;zero-trust strategies&lt;/a&gt;. With this platform, organizations can implement effective, highly granular, identity-based access management across wired and wireless networks.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/D6nql-FGAyk?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="How does Cisco ISE work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does Cisco ISE work?&lt;/h2&gt;
 &lt;p&gt;With an increased number of users and devices accessing networks remotely, protecting an organization's data from network security breaches becomes more complex. Administrators can use Cisco Identity Services Engine to control who has access to their network and ensure authorized, &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-manage-BYOD-security-policies-and-stay-compliant"&gt;policy-compliant devices&lt;/a&gt; obtain connectivity.&lt;/p&gt;
 &lt;p&gt;Cisco ISE is built to allow only trusted users and devices to access the resources on an enterprise network. It works with other network devices to create contextual identities for users and devices. Organizations can then use these all-encompassing identities to enforce secure access policies.&lt;/p&gt;
 &lt;p&gt;The platform obtains information from multiple sources to automatically identify and classify devices. Through passive network monitoring and telemetry, Cisco ISE collects endpoint attribute data. Its Profiler function then passes on these attributes to the analyzer. Here, all known endpoints are classified according to their policies and identity groups.&lt;/p&gt;
 &lt;p&gt;Using its Wi-Fi Edge Analytics feature, Cisco ISE obtains data from Apple, Intel and Samsung devices to conduct enhanced profiling according to attributes like device model, OS version and firmware. In addition, it uses predefined and custom device templates to automatically associate administrator-defined identities to connected endpoints and to associate &lt;a href="https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks"&gt;authorization policies&lt;/a&gt; for specific types of endpoints.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Cisco ISE deployment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cisco ISE deployment&lt;/h2&gt;
 &lt;p&gt;Cisco Identity Services Engine is available as both a physical or virtual appliance. The virtual appliances can run on &lt;a href="https://www.techtarget.com/searchvmware/definition/VMware-ESXi"&gt;VMware ESXi&lt;/a&gt; 6.5, 6.7 and 7.x, &lt;a href="https://www.techtarget.com/searchitoperations/tip/Xen-vs-KVM-What-are-the-differences"&gt;KVM&lt;/a&gt; on Red Hat 7.x, &lt;a href="https://www.techtarget.com/searchitoperations/tip/3-FAQs-to-improve-your-Hyper-V-basic-knowledge"&gt;Microsoft Hyper-V&lt;/a&gt; (on Microsoft Windows Server 2012R2 and later), as well as many other on-premises and cloud platforms. Organizations can use either type of deployment to create clusters. These clusters provide the scale, redundancy and failover enterprise networks require.&lt;/p&gt;
 &lt;p&gt;Organizations also have the flexibility to deploy Cisco ISE in standalone or distributed modes. In distributed deployments, also known as high-availability or &lt;a href="https://www.techtarget.com/searchnetworking/answer/Network-redundancy-vs-resiliency-Whats-the-difference"&gt;redundant deployments&lt;/a&gt;, one machine assumes the primary role. Another machine assumes the secondary role and is considered the backup.&lt;/p&gt;
 &lt;p&gt;Additionally, the Cisco ISE architecture can be deployed with what Cisco refers to as Administration, Monitoring and Troubleshooting, Policy Service, and pxGrid personas. These personas are roles assigned to each ISE node, which constitutes a single virtual or physical appliance. The Administration persona provides a comprehensive, consolidated portal for all the core functions of network configuration and management. The other personas provide more specialized functions to create a fully scalable, integrated system.&lt;/p&gt;
 &lt;p&gt;Another available node for Cisco ISE is the Inline Posture node. Network admins can use this node to enforce policies and execute change of authorization requests that other network devices cannot accommodate.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Top Cisco ISE features"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top Cisco ISE features&lt;/h2&gt;
 &lt;p&gt;Cisco ISE helps to protect networks from cyberattacks using the following features:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Access control.&lt;/b&gt; Provides numerous access control options that include downloadable access control lists (&lt;a href="https://www.techtarget.com/searchnetworking/definition/access-control-list-ACL"&gt;ACLs&lt;/a&gt;), virtual LAN, URL redirections and security group ACLs to reduce the attack surface and strengthen overall network security.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Centralized management.&lt;/b&gt; Administrators can configure, manage and authenticate users and devices from a single, user-friendly GUI. The console's unified view also simplifies network administration.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cisco DNA Center integration.&lt;/b&gt; This network &lt;a href="https://www.techtarget.com/whatis/definition/controller"&gt;controller&lt;/a&gt; and analytics platform integrates with ISE to simplify the setup of various Cisco ISE services. It also aids in policy design, provisioning and assignment to users and applications instead of network devices. Additionally, it enables admins to deploy group-based access controls and implement network segmentation based on business requirements.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Contextual identity and business policies.&lt;/b&gt; A rule-based, attribute-driven policy model makes it easy to implement business-relevant access control policies. Admins can create attributes like authentication protocols, device identity and posture validation, and reuse them as needed.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Dynamic Reauthentication Times.&lt;/b&gt; Admins can create temporary policies for devices that do not need continuous access. After the designated period expires, devices lose network authentication.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cipher control. &lt;/b&gt;Admins can edit a list of ciphers and disable those no longer needed to ensure uninterrupted compliance with security standards.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Device profiling.&lt;/b&gt; Cisco ISE can create custom device templates that automatically detect, classify and associate administration identities for connected endpoints.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Guest lifecycle management.&lt;/b&gt; Built-in support for hotspot, sponsored, self-service and other access workflows, plus real-time visual flows remove the complexity from implementing and customizing guest network access.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IPv6 support. &lt;/b&gt;Cisco ISE is IPv6-ready for all RADIUS and TACACS+ based network devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitoring and troubleshooting.&lt;/b&gt; ISE users can access a built-in console for detailed reports (historical and real time) of network monitoring, reporting and troubleshooting data.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;In addition to the above, other key features of Cisco ISE include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Common policy automation.&lt;/b&gt; Cisco ISE acts as a universal translator that enables different parts of the network architecture to understand each other, regardless of whether they are legacy or next-gen elements.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;PxGrid Direct enhancements.&lt;/b&gt; These improvements enable organizations to immediately synchronize data from PxGrid Direct Connectors, ensuring fast database updates.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;PAC-less Communication.&lt;/b&gt; ISE typically uses Protected Access Credentials, or PACs, to establish encrypted &lt;a href="https://www.techtarget.com/searchsecurity/definition/Transport-Layer-Security-TLS"&gt;TLS&lt;/a&gt; tunnels. Cisco ISE 3.4 introduced PAC-less Communication to streamline communication between ISE and Cisco TrustSec devices.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI/ML profiling and multifactor classification.&lt;/b&gt; Cisco ISE can quickly create a profile and rules for identical unknown endpoints to simplify management and boost security.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security group tags. &lt;/b&gt;SGTs&lt;b&gt; &lt;/b&gt;&lt;a target="_blank" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec/sgt_inline_tagging.html" rel="noopener"&gt;simplify segmentation&lt;/a&gt; and the management of switches, routers and other network devices.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Benefits of Cisco ISE"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of Cisco ISE&lt;/h2&gt;
 &lt;p&gt;Cisco Identity Services Engine offers the following benefits:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Centralized network access control (NAC).&lt;/b&gt; All an organization's network access points can be controlled from one centralized location, reducing management overhead and enhancing security.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Simplified network visibility.&lt;/b&gt; ISE stores detailed &lt;a href="https://www.techtarget.com/whatis/definition/attribute"&gt;attribute&lt;/a&gt; histories of all endpoints and users connected to a network to ensure comprehensive, real-time visibility into the entire network.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Threat containment.&lt;/b&gt; ISE matches endpoints with attributes like users, location, threat and vulnerability, enabling administrators to choose who and what devices to allow on a network.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Zero-trust implementation.&lt;/b&gt; Organizations can easily implement a zero-trust network architecture to ensure secure network access, lower the risk of harmful events, and protect business integrity and continuity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Easy administration access control and auditing. &lt;/b&gt;Audit trails are maintained for every change in the network, allowing admins to easily conduct audits and troubleshoot issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;More control over Domain Controllers (DC).&lt;/b&gt; Cisco ISE maintains Active Directory site awareness and ensures that a DC is always available.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Automated compliance.&lt;/b&gt; Cisco ISE uses a persistent client-based agent, a temporal agent or a query to an external &lt;a href="https://www.techtarget.com/searchenterprisedesktop/feature/Understand-how-UEM-EMM-and-MDM-differ-from-one-another"&gt;endpoint management tool&lt;/a&gt; to enforce required compliance policies for endpoints.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Cisco ISE licensing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cisco ISE licensing&lt;/h2&gt;
 &lt;p&gt;Cisco ISE is licensed on a subscription basis, but a 90-day free evaluation license can be downloaded for up to 100 endpoints. The evaluation license includes all the features of a full license and allows admins to set up a limited deployment in Evaluation mode. When the license expires, admins can only view the Licensing window in the Cisco ISE administrator portal. It is possible to request an extension to the license or coverage for additional endpoints.&lt;/p&gt;
 &lt;p&gt;The full versions of Cisco ISE are licensed on a subscription basis for terms of one, three and five years. Cisco offers three tiers of licenses: Essentials, Advantage and Premier.&lt;/p&gt;
 &lt;p&gt;Essentials is the base package, and Premier is the highest tier. All license packages for Cisco ISE are set up in a &lt;i&gt;nested doll model&lt;/i&gt;, meaning all the features in the Essentials and Advantage tiers appear in the Premier edition, and all the features in the Essentials edition appear in the Advantage tier. Simply put, the higher-tier licenses include all the features of the lower-tier licenses.&lt;/p&gt;
 &lt;p&gt;Essentials includes the following features and capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;AAA and &lt;a href="https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X"&gt;802.1x&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Support for Guest functionality on endpoints with &lt;a href="https://www.techtarget.com/searchsecurity/definition/RADIUS"&gt;RADIUS&lt;/a&gt; sessions.&lt;/li&gt; 
  &lt;li&gt;Easy Connect (PassiveID).&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The Advantage license includes all the features and capabilities of the Essentials license, along with the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Endpoint profiling classification in authorization policies.&lt;/li&gt; 
  &lt;li&gt;BYOD support.&lt;/li&gt; 
  &lt;li&gt;PxGrid, PxGrid Cloud and PxGrid Direct for endpoints with RADIUS sessions.&lt;/li&gt; 
  &lt;li&gt;Group-based policy (TrustSec).&lt;/li&gt; 
  &lt;li&gt;Endpoint analytics visibility and enforcement.&lt;/li&gt; 
  &lt;li&gt;Adaptive Network Control policy and User-Defined Network attributes in authorization policies.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The Premier license contains the most features, including all the above plus the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/mobile-device-management"&gt;Mobile device management&lt;/a&gt; visibility and enforcement.&lt;/li&gt; 
  &lt;li&gt;Posture visibility.&lt;/li&gt; 
  &lt;li&gt;Compliance visibility.&lt;/li&gt; 
  &lt;li&gt;Threat-centric NAC.&lt;/li&gt; 
  &lt;li&gt;Segmentation using Cisco Software-Defined Access.&lt;/li&gt; 
  &lt;li&gt;Cisco AnyConnect intelligent VPN/zero-trust network access with agent.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/mobile_computing-mdm.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/mobile_computing-mdm_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/mobile_computing-mdm_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/mobile_computing-mdm.jpg 1280w" alt="Components of the mobile device management architecture diagram." height="451" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The premier license of Cisco ISE includes all the features of the other versions and adds mobile device management visibility and enforcement, among other capabilities.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;All subscriptions automatically renew at the completion of the license term (12, 36 or 60 months) for an additional 12-month term. To prevent automatic renewals, customers must deselect the option when placing the initial order. They can also choose to cancel a renewal up to 60 days before the new term's start date.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn about some other ways to &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchnetworking/tip/Tips-to-improve-network-security-visibility"&gt;&lt;i&gt;improve network visibility and security&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, such as including intrusion detection systems, automation or executive support.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to end users and devices.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchmobilecomputing/definition/Cisco-Identity-Services-Engine-ISE</link>
            <pubDate>Tue, 10 Jun 2025 10:06:00 GMT</pubDate>
            <title>What is Cisco ISE?</title>
        </item>
        <item>
            <body>&lt;p&gt;The Fourth Industrial Revolution (4IR) is the ongoing transformation of how people live, work and relate to one another through the fusion of technologies that blur the lines between the physical, &lt;a href="https://www.techtarget.com/whatis/definition/digital"&gt;digital&lt;/a&gt; and biological spheres.&lt;/p&gt; 
&lt;p&gt;Building on the digital advancements of the Third Industrial Revolution, this new era is marked by rapid technological breakthroughs in fields such as &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;AI&lt;/a&gt;, &lt;a href="https://www.techtarget.com/whatis/definition/robotics"&gt;robotics&lt;/a&gt;, the internet of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt;), &lt;a href="https://www.techtarget.com/whatis/definition/quantum-computing"&gt;quantum computing&lt;/a&gt;, &lt;a href="https://www.techtarget.com/whatis/definition/biotechnology"&gt;biotechnology&lt;/a&gt; and more.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/types_of_robots-f.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/types_of_robots-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/types_of_robots-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/types_of_robots-f.png 1280w" alt="Chart describing types of robots." height="226" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Breakthroughs in robotics as part of the 4IR has enabled the creation of many different kinds of robots suited to a variety of tasks.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;section class="section main-article-chapter" data-menu-title="A brief history of industrial revolutions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;A brief history of industrial revolutions&lt;/h2&gt;
 &lt;p&gt;To better understand the Fourth Industrial Revolution, it helps to view it in the context of the previous three revolutions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;The First Industrial Revolution, in the late 18th to early 19th century, introduced mechanization through steam engines and waterpower, shifting economies from agrarian to industrial.&lt;/li&gt; 
  &lt;li&gt;The Second Industrial Revolution, in the late 19th to early 20th century, brought electricity, mass production and the rise of factories.&lt;/li&gt; 
  &lt;li&gt;The Third Industrial Revolution, in the mid-20th century, marked the digital revolution, ushering in &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/computer"&gt;computers&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchdatacenter/definition/IT"&gt;IT&lt;/a&gt; and early &lt;a href="https://www.techtarget.com/searchitoperations/definition/IT-automation"&gt;automation&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Defining characteristics of the Fourth Industrial Revolution"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Defining characteristics of the Fourth Industrial Revolution&lt;/h2&gt;
 &lt;p&gt;According to Klaus Schwab, founder of the World Economic Forum and author of &lt;i&gt;The Fourth Industrial Revolution&lt;/i&gt;, 4IR is distinguished not just by emerging technologies, but by the speed, scope and systemic impact of these changes. Unlike previous industrial revolutions, the fourth is evolving at an exponential rather than linear pace and affects virtually every industry in every country.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/erp-industrial_revolutions.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/erp-industrial_revolutions_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/erp-industrial_revolutions_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/erp-industrial_revolutions.png 1280w" alt="Timeline of industrial revolutions." height="250" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The Fourth Industrial Revolution represents the incorporation and innovation of many technologies, such as intelligently networked machines and manufacturing processes using IT.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Core technologies of the Fourth Industrial Revolution&lt;/h3&gt;
 &lt;p&gt;The Fourth Industrial Revolution includes the integration and advancement of numerous technologies:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;AI and &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;machine learning&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;IoT, including the industrial internet of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Industrial-Internet-of-Things-IIoT"&gt;IIoT&lt;/a&gt;).&lt;/li&gt; 
  &lt;li&gt;Robotics and autonomous machines.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/virtual-reality"&gt;Virtual reality&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/definition/augmented-reality-AR"&gt;augmented reality&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchcio/definition/blockchain"&gt;Blockchain&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchcio/definition/distributed-ledger"&gt;distributed ledger technology&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/cloud-computing"&gt;Cloud computing&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge computing&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/whatis/definition/3-D-printing-rapid-prototyping-stereolighography-or-architectural-modeling"&gt;3D printing&lt;/a&gt; or additive manufacturing.&lt;/li&gt; 
  &lt;li&gt;Quantum computing.&lt;/li&gt; 
  &lt;li&gt;Biotechnology and gene editing, e.g., &lt;a href="https://www.techtarget.com/pharmalifesciences/feature/10-Ways-CRISPR-Advancements-Are-Reshaping-Healthcare"&gt;CRISPR&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Cyber-physical systems and &lt;a href="https://www.techtarget.com/searcherp/definition/smart-factory"&gt;smart factories&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/edgecomputing.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/edgecomputing_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/edgecomputing_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/edgecomputing.jpg 1280w" alt="Diagram of edge computing." height="560" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Faster connection speeds, data processing closer to the data source, and technologies such as IoT sensors and robotics enable factories to become smarter and operate with greater independence, if not autonomously, at the edge of the network.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Industry 4.0 and manufacturing&lt;/h3&gt;
 &lt;p&gt;A major subdomain of 4IR is &lt;a href="https://www.techtarget.com/searcherp/definition/Industry-40"&gt;Industry 4.0&lt;/a&gt;, which refers to the use of smart technology in manufacturing environments. Smart factories use IoT devices, &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/real-time-analytics"&gt;real-time data analytics&lt;/a&gt; and automation to create self-optimizing systems that increase efficiency, reduce waste and enable mass customization.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/DeyJM8lmi1E?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Societal and economic implications"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Societal and economic implications&lt;/h2&gt;
 &lt;p&gt;The Fourth Industrial Revolution is not only transforming business models, but also reshaping job markets, education systems and government policies. Key areas of impact include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Job displacement and creation.&lt;/b&gt; While automation might eliminate certain jobs, it also creates new roles requiring advanced technical and &lt;a href="https://www.techtarget.com/searchcio/definition/soft-skills"&gt;soft skills&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Privacy and data security.&lt;/b&gt; The proliferation of connected devices raises concerns about surveillance, cybersecurity threats and &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/data-governance"&gt;data governance&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Ethical challenges.&lt;/b&gt; Questions around &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-bias-algorithm-bias-or-AI-bias"&gt;AI bias&lt;/a&gt;, digital inclusion and biotechnology call for new &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/Top-resources-to-build-an-ethical-AI-framework"&gt;ethical frameworks&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Global inequality.&lt;/b&gt; Countries and individuals lacking digital infrastructure might fall behind, increasing the risk of a widening &lt;a href="https://www.techtarget.com/whatis/definition/digital-divide"&gt;digital divide&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/4qSZEP5lJi4?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;Preparing for the Fourth Industrial Revolution&lt;/h3&gt;
 &lt;p&gt;To adapt to this new era, individuals, businesses and governments must take proactive steps, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Investing in education and lifelong learning, especially in &lt;a href="https://www.techtarget.com/whatis/definition/STEM-science-technology-engineering-and-mathematics"&gt;STEM&lt;/a&gt; and digital literacy.&lt;/li&gt; 
  &lt;li&gt;Developing ethical AI and data governance frameworks.&lt;/li&gt; 
  &lt;li&gt;Promoting public-private partnerships to build inclusive digital economies.&lt;/li&gt; 
  &lt;li&gt;Creating resilient regulatory systems that can keep pace with rapid innovation.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/iota-industry_iot_infrastructure.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/iota-industry_iot_infrastructure_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/iota-industry_iot_infrastructure_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/iota-industry_iot_infrastructure.png 1280w" alt="Diagram of IIoT infrastructure." height="364" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;IIoT infrastructure components include the IoT or edge gateway, sensors, actuators and edge nodes.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Embracing the Fourth Industrial Revolution requires more than just adopting new technologies -- it demands a mindset of continuous learning, ethical innovation and cross-sector collaboration. By preparing today, individuals and organizations can help shape a more inclusive, resilient and technologically empowered future.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Learn ways to &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/6-ways-to-reduce-different-types-of-bias-in-machine-learning"&gt;reduce machine learning bias&lt;/a&gt; in its different forms. Explore ways in which &lt;a href="https://www.techtarget.com/iotagenda/tip/AI-and-IoT-How-do-the-internet-of-things-and-AI-work-together"&gt;AI and IoT technologies work together&lt;/a&gt; and how AI supercharges existing IoT systems for the Fourth Industrial Revolution. Check &lt;a href="https://www.techtarget.com/iotagenda/feature/Top-5-industrial-IoT-use-cases"&gt;potential IIoT use cases&lt;/a&gt; and its advantages and challenges.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The Fourth Industrial Revolution (4IR) is the ongoing transformation of how people live, work and relate to one another through the fusion of technologies that blur the lines between the physical, digital and biological spheres.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/whatis/definition/fourth-industrial-revolution</link>
            <pubDate>Mon, 09 Jun 2025 14:00:00 GMT</pubDate>
            <title>What is the Fourth Industrial Revolution?</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;i&gt;In this video, Informa TechTarget managing editor Kate Murray explains how RFID works and what it's used for in today's world.&lt;/i&gt;&lt;/p&gt; 
&lt;p&gt;A simple tap can go a long way.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Radio frequency identification (&lt;a href="https://www.techtarget.com/iotagenda/definition/RFID-radio-frequency-identification"&gt;RFID&lt;/a&gt;) is a wireless communication method that uses electromagnetic frequencies to identify and track animals, objects and people. You might know this better as tapping your credit card or using an electronic passport, but it has many other applications.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here, we'll explain how RFID is used.&lt;/p&gt; 
&lt;p&gt;RFID was born from the radar technology used in World War II to identify hostile and friendly aircraft. Development continued in the years following, with the first official patents being awarded in the 1970s. At the time, RFID devices were mainly used for tasks like toll collecting and key card scanning.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;An RFID system is made up of three components -- an &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/antenna"&gt;antenna&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchnetworking/definition/transceiver"&gt;transceiver&lt;/a&gt; and &lt;a href="https://www.techtarget.com/iotagenda/definition/transponder"&gt;transponder&lt;/a&gt; -- which is embedded in an RFID tag. Together, the antennae and transceiver make up what's known as the RFID reader. This reader uses radio waves to transmit signals that activate the tag. From here, the tag returns a wave to the antenna, where it's translated into data.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;RFID is often described as a wireless barcode system, but there are notable differences between RFID and barcodes. For one, barcodes require a direct line of sight for scanning, while RFID tags do not. And barcodes need close proximity for scanning, while RFID can scan from inches or feet away. And, unlike barcodes, RFID tags can update data in real time.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Near field communications (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Near-Field-Communication"&gt;NFC&lt;/a&gt;) is a notable &lt;a href="https://www.techtarget.com/searcherp/tip/RFID-vs-NFC-Learn-the-pros-and-cons-of-each"&gt;subset of RFID&lt;/a&gt;. It enables the exchange of data within a short range of roughly 20 cm. Because of this, NFC is usually reserved for tasks like opening doors or linking smartphones to Bluetooth devices.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Today, RFID systems are most commonly used for equipment tracking, &lt;a href="https://www.techtarget.com/searcherp/tip/7-benefits-of-RFID-in-supply-chain-management-and-logistics"&gt;inventory management&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searcherp/feature/RFID-in-supply-chain-6-examples-in-use-today"&gt;supply chain logistics&lt;/a&gt; and access control; and are prevalent in industries such as healthcare, manufacturing, retail, business and even home use.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;While some have raised security concerns around potential skimming or unauthorized tracking of RFID tags, these incidents are rare. As an extra precaution, RFID tags in passports are equipped with basic access controls and anti-skimming material to prevent any illicit scanning.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Overall, RFID systems can cut costs, improve customer experience, bolster supply chain efficiency and more. Over time, we can expect wider adoption of RFID, as systems are increasingly being used to support &lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;internet of things&lt;/a&gt; deployments.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Do you use RFID? Share your experience in the comments, and remember to like and subscribe, too.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Tommy Everson is an assistant editor for video content at Informa TechTarget. He assists in content creation for TechTarget's YouTube channel and TikTok page.&amp;nbsp;&lt;/i&gt;&lt;/p&gt;</body>
            <description>Radio frequency identification uses radio waves to digitally tag items, so businesses can wirelessly identify and track goods. Near field communication is a subset of RFID.</description>
            <link>https://www.techtarget.com/whatis/video/An-explanation-of-RFID</link>
            <pubDate>Fri, 30 May 2025 11:00:00 GMT</pubDate>
            <title>An explanation of RFID</title>
        </item>
        <item>
            <body>&lt;p&gt;A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control. The fundamental nature of programmable networks is to separate the underlying physical hardware from the control software of a device.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Traditional networks vs. programmable networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Traditional networks vs. programmable networks&lt;/h2&gt;
 &lt;p&gt;In traditional IT networks, physical hardware such as &lt;a href="https://www.techtarget.com/searchnetworking/definition/router"&gt;routers&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchnetworking/definition/switch"&gt;switches&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/tip/Where-to-place-a-firewall-in-an-enterprise-network"&gt;firewalls&lt;/a&gt; must be manually configured and individually managed. This requires a lot of human intervention and manual effort. IT teams can expend this if the network is small or the organization's networking needs are less complex. However, for large, complex networks, manual configurations and management can be time-consuming and extremely onerous for IT teams.&lt;/p&gt;
 &lt;p&gt;Another characteristic of traditional networks is that troubleshooting happens on a case-by-case basis. This makes it difficult to detect and diagnose issues affecting multiple devices. It also increases resolution times and &lt;a href="https://www.techtarget.com/searchnetworking/feature/The-effects-of-network-downtime-and-ways-to-fix-it"&gt;network downtime&lt;/a&gt;. Visibility into network health is extremely limited in these networks, necessitating additional tools to monitor the network and its operations, which translates into increased expense and management overhead.&lt;/p&gt;
 &lt;p&gt;To address these issues, programmable or software-defined networks can be the change that resource-constrained IT teams need. A single entity using specialized software controls these networks. IT personnel do not need to individually configure, manage or troubleshoot devices and services, so they can deploy these elements quickly and manage them easily, regardless of changing user needs or increasing network complexity. They can also implement centralized policies to &lt;a href="https://www.techtarget.com/searchnetworking/answer/Compare-network-management-vs-network-monitoring"&gt;manage traffic flows and monitor real-time network conditions&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Network programmability: What does it mean and how does it relate to software-defined networking?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Network programmability: What does it mean and how does it relate to software-defined networking?&lt;/h2&gt;
 &lt;p&gt;Network programmability enables the separation of network hardware from the control software. The software has a broader view of the network, creating a proverbial 10,000-foot overview. With network programmability, software can be programmed in one place, using a &lt;a href="https://www.techtarget.com/searchnetworking/definition/SDN-controller-software-defined-networking-controller"&gt;controller&lt;/a&gt; to &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-orchestration"&gt;orchestrate&lt;/a&gt; the configuration of the network's other hardware devices.&lt;/p&gt;
 &lt;p&gt;This development led to the creation of software-defined networking (&lt;a href="https://www.techtarget.com/searchnetworking/definition/software-defined-networking-SDN"&gt;SDN&lt;/a&gt;), which has now largely supplanted the generic term &lt;i&gt;programmable networks&lt;/i&gt;.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Characteristics of programmable networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Characteristics of programmable networks&lt;/h2&gt;
 &lt;p&gt;The most essential characteristic of a programmable network is that it can be centrally defined and managed with software. Most programmable networks use open network interfaces and development tools, enabling them to be programmed easily, extended securely and controlled.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/sdn-sdn_architecture.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/sdn-sdn_architecture_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/sdn-sdn_architecture_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/sdn-sdn_architecture.png 1280w" alt="Diagram showing the architectural features of software-defined networks." height="391" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Programmable networks use an architecture that separates physical infrastructure from controller software, like with SDN.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Since hardware limitations do not rigidly confine programmable networks, they are more agile and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scalable&lt;/a&gt;. They can easily adopt and incorporate new features and innovative technologies to meet an organization's current and future needs.&lt;/p&gt;
 &lt;p&gt;Using &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/What-are-the-types-of-APIs-and-their-differences"&gt;application programming interfaces&lt;/a&gt; frees networks to adopt new architectures and protocols. The APIs also facilitate interactions between the network hardware and software. This simplifies network management and control, and creates opportunities for automating the network and increasing responsiveness, flexibility and efficiency.&lt;/p&gt;
 &lt;p&gt;In recent years, predictive &lt;a href="https://www.computerweekly.com/blog/Write-side-up-by-Freeform-Dynamics/AI-and-analytics-Been-there-done-that"&gt;analytics platforms based on AI&lt;/a&gt; and machine learning have emerged to simplify maintenance further and improve the performance and security of SDN . These platforms also support proactive handling of network issues and ensure high performance and low latency for critical applications.&lt;/p&gt;
 &lt;p&gt;Finally, programmable networks tend to be more secure than traditional networks. Administrators can use centralized templates, widely accepted best practices and checkpoints to maintain consistent configurations and &lt;a href="https://www.computerweekly.com/feature/Reinventing-security-operations-for-the-modern-threat-landscape"&gt;alleviate security threats&lt;/a&gt;. Automated checks can reduce the risk of human error and minimize the potential for network downtime.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="History of network programmability"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;History of network programmability&lt;/h2&gt;
 &lt;p&gt;When the concept of programmable networks emerged, it was a radical innovation. Traditionally, network admins configured each network device independently of others. They used the command-line interface (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/command-line-interface-CLI"&gt;CLI&lt;/a&gt;) to type hundreds of commands, one by one, until a group of devices passed traffic as intended.&lt;/p&gt;
 &lt;p&gt;In those days, automation involved onerous scripting languages or cutting and pasting. Admins might cut and paste changing localized device information, such as IP addresses. With the exponential growth of networks, this became untenable.&lt;/p&gt;
 &lt;p&gt;Today, &lt;a href="https://www.techtarget.com/searchnetworking/tip/12-network-automation-ideas-to-incorporate-in-your-network"&gt;network automation&lt;/a&gt; and programming are easier than ever, thanks to the separation between transmission hardware and control software as well as the virtualization of networking infrastructure. The availability of open, programmable network interfaces helps organizations deploy new services easily to satisfy business or user demands. Programmability also simplifies device configurations, network troubleshooting and centralized policy implementation.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Fundamental elements of programmable networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Fundamental elements of programmable networks&lt;/h2&gt;
 &lt;p&gt;All programmable networks rely on a few fundamental elements:&lt;/p&gt;
 &lt;h3&gt;Protocols&lt;/h3&gt;
 &lt;p&gt;Network admins can control and program networks from one place and time using protocols like &lt;a href="https://www.techtarget.com/whatis/definition/OpenFlow"&gt;OpenFlow&lt;/a&gt; and other open and proprietary standards. All underlying hardware works together as if someone had punched in all those CLI commands on each device. This means scalable networks can have sufficient size and scope to support &lt;a href="https://www.techtarget.com/searchstorage/opinion/Time-to-rethink-IT-for-containerized-workloads"&gt;growing cloud and containerization workloads&lt;/a&gt; that put more stress on infrastructure.&lt;/p&gt;
 &lt;h3&gt;APIs&lt;/h3&gt;
 &lt;p&gt;Programmable networks also facilitated the advancement of APIs that enable one piece of software to talk to another.&lt;/p&gt;
 &lt;p&gt;Controllers use APIs to speak to devices under their control. Industry-standard &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/RESTful-API"&gt;RESTful APIs &lt;/a&gt; can provide access to the software controller so that anyone can write custom software to orchestrate a programmable network.&lt;/p&gt;
 &lt;h3&gt;Infrastructure as code&lt;/h3&gt;
 &lt;p&gt;Using APIs to control networks is now commonplace. The scale and scope of modern networks makes device-by-device configuration impractical in any but the smallest of networks.&lt;/p&gt;
 &lt;p&gt;With enterprises embracing virtualization, containerization and cloud deployments, a concept called &lt;a href="https://www.techtarget.com/searchitoperations/definition/Infrastructure-as-Code-IAC"&gt;infrastructure as code&lt;/a&gt; has taken hold. IaC involves using software to build a network completely from the ground up, including storage and compute, on top of an abstracted hardware layer. By using software code instead of manual configurations, IaC can automate the deployment of network configurations. This accelerates configurations while accommodating scalable deployments and a more agile IT environment.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Kjq4vw_hMjE?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;SDN controllers&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/feature/Important-components-of-SDN-controllers"&gt;SDN controllers&lt;/a&gt; play an important role in reducing the risk of human error in network configuration and management. They do this by automatically applying logic checks before configurations are pushed live. They also can configure devices from a &lt;a href="https://www.techtarget.com/searchdatacenter/definition/single-pane-of-glass"&gt;single pane of glass&lt;/a&gt; interface, ensuring configuration consistency and centralized management while minimizing the need for human intervention.&lt;/p&gt;
 &lt;p&gt;Controllers continuously monitor the network and provide real-time visibility into its overall health and performance. This helps identify and address issues early.&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="Uses of programmable networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Uses of programmable networks&lt;/h2&gt;
 &lt;p&gt;Programmable networking is particularly useful in data centers where complex interconnections and traffic patterns are the norm. There, using software, APIs, and an open ecosystem of tools, interfaces and technologies helps improve bandwidth management, security and resource allocation.&lt;/p&gt;
 &lt;p&gt;SDN is also suitable for internet of things (&lt;a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT"&gt;IoT&lt;/a&gt;) and telecommunications applications. Programmability facilitates building a complex infrastructure for handling many connected devices in IoT networks and simplifies infrastructure management for telecom networks.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/answer/Cloud-networking-vs-cloud-computing-Whats-the-difference"&gt;Cloud computing&lt;/a&gt; is another key use case for programmable networks. Through software, network managers can create flexible virtual networks where resources can be added or removed quickly in response to fast-changing needs.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Benefits of programmable networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of programmable networks&lt;/h2&gt;
 &lt;p&gt;Programmable networking has several benefits over traditional networking:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Reduced long-term costs.&lt;/li&gt; 
  &lt;li&gt;Applications able to maintain information about device capabilities.&lt;/li&gt; 
  &lt;li&gt;Networks able to respond to application status and resource requirements.&lt;/li&gt; 
  &lt;li&gt;Better allocation of bandwidth and resources.&lt;/li&gt; 
  &lt;li&gt;Faster network deployments.&lt;/li&gt; 
  &lt;li&gt;Improved network performance and reduced downtime.&lt;/li&gt; 
  &lt;li&gt;Packet prioritization for traffic shaping.&lt;/li&gt; 
  &lt;li&gt;Improved operational flexibility and enhanced transparency.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Programmable networks are also more scalable and enduring, enabling organizations to adapt easily to evolving business circumstances and use new technologies.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Further explore the role of &lt;a href="https://www.techtarget.com/searchnetworking/tip/The-role-of-network-virtualization-and-SDN-in-data-centers"&gt;network virtualization and SDN in data centers&lt;/a&gt; and learn more about how infrastructure as code can help streamline development and deployment &lt;a href="https://www.techtarget.com/searchdatacenter/feature/IaC-tools-comparison-shows-benefits-of-automated-deployments"&gt;with this comparison of eight IaC tools&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/definition/programmable-network-PN</link>
            <pubDate>Mon, 31 Mar 2025 13:00:00 GMT</pubDate>
            <title>What is a programmable network (network programmability)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Port address translation (PAT) is a type of network address translation (&lt;a href="https://www.techtarget.com/searchnetworking/definition/Network-Address-Translation-NAT"&gt;NAT&lt;/a&gt;) that maps a network's private internal &lt;a href="https://www.techtarget.com/whatis/definition/IPv4-address-class"&gt;IPv4 addresses&lt;/a&gt; to a single public &lt;a href="https://www.techtarget.com/whatis/definition/IP-address-Internet-Protocol-Address"&gt;Internet Protocol address&lt;/a&gt; by using network ports. NAT is a process that &lt;a href="https://www.techtarget.com/searchnetworking/definition/router"&gt;routers&lt;/a&gt; use to translate internal, nonregistered IP addresses to external, registered IP addresses. PAT differs from other forms of NAT because it uses &lt;a href="https://www.techtarget.com/searchnetworking/definition/port-number"&gt;port numbers&lt;/a&gt; when mapping &lt;a href="https://www.techtarget.com/whatis/definition/private-IP-address"&gt;private IP addresses&lt;/a&gt; to a public IP address, which is the address seen by external systems.&lt;/p&gt; 
&lt;p&gt;Port address translation is also called &lt;i&gt;porting&lt;/i&gt;, &lt;i&gt;port overloading&lt;/i&gt;, &lt;i&gt;port-level multiplexed NAT&lt;/i&gt; and &lt;i&gt;single address NAT&lt;/i&gt;. PAT is the most common form of NAT used in most homes and small and medium-sized businesses.&lt;/p&gt; 
&lt;p&gt;PAT was introduced as a way to conserve &lt;a href="https://www.techtarget.com/searchnetworking/answer/IPv4-vs-IPv6-Whats-the-difference"&gt;IPv4&lt;/a&gt; addresses until a more permanent solution could be implemented. This solution eventually came in the form of &lt;a href="https://www.techtarget.com/iotagenda/definition/IPv6-address"&gt;IPv6&lt;/a&gt;. However, IPv4 is still used extensively in network communications, so PAT continues to be relevant. PAT also helps to provide better security on the local network by hiding the internal IP addresses from public view.&lt;/p&gt; 
&lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/whatis-ipv6_address-h.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/whatis-ipv6_address-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/whatis-ipv6_address-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/whatis-ipv6_address-h.png 1280w" alt="Visual of an IPv6 address." height="134" width="279"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 1. Although IPv6 replaced IPv4, the latter -- along with port address translation -- is still used extensively in network communications.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;p&gt;The use of port numbers is integral to a router's ability to implement PAT because they provide a mechanism for translating the internal IP addresses to the external address and vice versa. The port number is appended to the external IP address to distinguish different connections to the same address. For example, if a router's external IP address is 192.168.35.4, outside connections might use addresses such as 192.168.35.4:37, 192.168.35.4:148 or 192.168.35.4:1637 to communicate with specific devices on the internal network.&lt;/p&gt; 
&lt;p&gt;A router can use either &lt;a href="https://www.techtarget.com/searchnetworking/definition/TCP"&gt;Transmission Control Protocol&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchnetworking/definition/UDP-User-Datagram-Protocol"&gt;User Datagram Protocol&lt;/a&gt; port numbers to implement PAT. Because the port numbers are based on a 16-bit encoding, a router can theoretically support up to 65,536 port numbers per external IP address, although the practical limit is much less. Even so, a single registered IP address can connect to thousands of internal devices. To facilitate this process, the router maintains an address translation table that maps the internal IP addresses to the external IP address, incorporating the port numbers into the mapping.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/5VIadA71eGA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does port address translation work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does port address translation work?&lt;/h2&gt;
 &lt;p&gt;Like other types of NAT deployments, PAT is implemented by positioning a PAT-enabled router between the inside and outside network, as shown in Figure 2. The inside network is the internal network, such as an organization's &lt;a href="https://www.techtarget.com/searchnetworking/definition/local-area-network-LAN"&gt;local area network&lt;/a&gt; or an individual's home network. Everything else is considered the outside network. For example, when you view a webpage on your computer, you are connecting from your inside network to the outside network where the &lt;a href="https://www.techtarget.com/whatis/definition/Web-server"&gt;web server&lt;/a&gt; resides.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_port_address_translation_works-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_port_address_translation_works-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_port_address_translation_works-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_port_address_translation_works-f.png 1280w" alt="Diagram of how port address translation works." height="336" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Figure 2. Port address translation, a type of network address translation, maps a network's private internal IPv4 addresses to a single public IP address.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Each device connected to the inside network receives a private IPv4 address, which is referred to as the &lt;i&gt;inside local address&lt;/i&gt;. In Figure 2, three computers have been assigned inside local addresses: 10.0.1.2, 10.0.1.3 and 10.0.1.4. The addresses are used for communications on the inside network, whether between the computers themselves or between the computers and the router.&lt;/p&gt;
 &lt;p&gt;The router is configured with an inside local IP address, 10.0.1.1, which is connected to the local network and is what other devices use to connect to it. This can also be considered the other device's gateway address. The router also has an external or public IP address, 34.120.117.196, which is the public-facing address used to connect to devices on the &lt;a href="https://www.techtarget.com/whatis/definition/Internet"&gt;internet&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;To support the PAT process, the router maintains an address translation table that maps the inside local addresses and ports to a specific combination of the public IP and port number. The port numbers are unique to each connection between the inside network and outside network. In this way, the router can map the inside global address to each connection, even when the same computer initiates multiple connections.&lt;/p&gt;
 &lt;p&gt;For example, 10.0.1.2 requests data from techtarget.com:443 and opens port 10.0.1.2:1487 for replies. The router intercepts this and forwards it, but it says that replies should go to 34.120.117.196:65002 and makes the mapping of 10.0.1.2:1487=34.120.117.196:65002. The next computer also requests data from techtarget.com:443 and opens port 10.0.1.3:1489. The router changes this to say 34.120.117.196:65003 and makes the mapping of 10.0.1.3:1489=34.120.117.196:65003. When the web server sends its replies to 34.120.117.196:65002 and 34.120.117.196:65003, the router gets them and forwards them to the correct internal computer.&lt;/p&gt;
 &lt;p&gt;Most &lt;a href="https://www.techtarget.com/searchnetworking/tip/Tips-for-setting-up-a-home-network"&gt;home networks&lt;/a&gt; use PAT to connect internal devices to the internet. In such a scenario, the &lt;a href="https://www.techtarget.com/whatis/definition/ISP-Internet-service-provider"&gt;internet service provider&lt;/a&gt; assigns a public IP address to the network's router. The router, in turn, assigns a private internal IP address to each device on the inside network. When one of those devices connects to a resource on the internet -- i.e., the outside network -- the router assigns a port number to the connection. The port number is appended to the public IP address so that the connection has a unique address.&lt;/p&gt;
 &lt;p&gt;This process is repeated for each device on the inside network, whether a laptop, tablet, smartphone or other type of smart device. In this way, all devices on the inside network can share the same public IP address even if they access the internet at the same time. The router knows exactly which device to send specific &lt;a href="https://www.techtarget.com/searchnetworking/definition/packet"&gt;packets&lt;/a&gt; to because of the unique port number that has been assigned to each connection.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="What is the difference between NAT and PAT?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the difference between NAT and PAT?&lt;/h2&gt;
 &lt;p&gt;NAT is the general term for whenever IP address translation is needed between devices on different networks. PAT is a method of implementing NAT using port numbers. PAT is the most common form of NAT.&lt;/p&gt;
 &lt;p&gt;Other methods of implementing NAT include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Static NAT.&lt;/li&gt; 
  &lt;li&gt;Dynamic NAT.&lt;/li&gt; 
  &lt;li&gt;Carrier-grade NAT.&lt;/li&gt; 
  &lt;li&gt;Deterministic NAT.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Port address translation advantages and disadvantages"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Port address translation advantages and disadvantages&lt;/h2&gt;
 &lt;p&gt;Port address translation has its benefits and drawbacks.&lt;/p&gt;
 &lt;h3&gt;Port address translation advantages&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Ability to serve hundreds of devices from a single public IP address.&lt;/li&gt; 
  &lt;li&gt;Simple implementation with no &lt;a href="https://www.techtarget.com/whatis/definition/configuration"&gt;configuration&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Increased security by hiding internal device details.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Port address translation disadvantages&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;No direct inbound access allowed and requires the use of port forwarding.&lt;/li&gt; 
  &lt;li&gt;Issues with double NAT and real-time communication forwarding.&lt;/li&gt; 
  &lt;li&gt;Might require multiple public IP addresses to support several hundred clients.&lt;/li&gt; 
  &lt;li&gt;May not &lt;a href="https://www.techtarget.com/searchdatacenter/definition/scalability"&gt;scale&lt;/a&gt; into tens of thousands of clients.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="What is the difference between PAT and port forwarding?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the difference between PAT and port forwarding?&lt;/h2&gt;
 &lt;p&gt;Port address translation is a way for several internal devices to share a single public IP address. PAT is primarily concerned with internal devices connecting to external devices; it does not offer a way for an external device to send an unexpected request inbound. &lt;a href="https://www.techtarget.com/searchnetworking/definition/tunneling-or-port-forwarding"&gt;Port forwarding&lt;/a&gt; is a way to map a specific external port to a single internal IP address and port combination.&lt;/p&gt;
 &lt;p&gt;Port forwarding is used when an internal service needs to be accessible to external devices or the internet. This might be needed for a web or game server. Certain &lt;a href="https://www.techtarget.com/searchnetworking/definition/protocol"&gt;protocols&lt;/a&gt; may also benefit from having port forwarding configured.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/WexBQ1XgaDw?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;&lt;em&gt;When configuring a network, network administrators must &lt;a href="https://www.techtarget.com/searchnetworking/tip/Static-IP-vs-dynamic-IP-addresses-Whats-the-difference"&gt;choose between a static or dynamic IP address&lt;/a&gt;; learn what these IP addresses offer, and also explore their pros and cons. Learn about &lt;a href="https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained"&gt;common network protocols and their functions&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public Internet Protocol address by using network ports.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/4.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/definition/Port-Address-Translation-PAT</link>
            <pubDate>Mon, 31 Mar 2025 09:00:00 GMT</pubDate>
            <title>What is port address translation (PAT)?</title>
        </item>
        <title>Search IoT Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
