Latest news with #deviceManagement


Forbes
01-07-2025
- Business
- Forbes
How IoT Came To Dominate Everyday Life
Thomas Ryd is CEO & cofounder of a device lifecycle management leader with a mission to secure the world's connected devices. The internet has transformed nearly every aspect of modern life over the past few decades. Smartphones, laptops and digital communication are everyday essentials, seamlessly woven into how we work, live and stay connected. Beyond these ubiquitous technologies, the quieter rise of connected devices unfolded. From refrigerators that remind you to restock groceries, video doorbells that enhance home security and industrial robots that fine-tune production lines to modern breakthroughs like self-driving cars and autonomous security robots, the Internet of Things (IoT) is an invisible yet indispensable part of daily life. Decades of cumulative progress—advances in wireless connectivity, miniaturized sensors, cheaper technology and better computing power—gradually converged to unlock new IoT possibilities and a technology-enhanced future. For OEMs competing in the connected device market, an IoT retrospective uncovers patterns in progress that still influence today's challenges, especially concerning securing, managing and updating connected devices at scale. The Foundations Of IoT: Leveraging Data The foundation of IoT predates modern commercial offerings. In the late 1960s, ARPANET demonstrated how networked systems could share data. By the 1980s, technologies like radio-frequency identification (RFID) and machine-to-machine (M2M) communication enabled devices to exchange data without human input. By 1999, Kevin Ashton, a British technologist at Procter & Gamble, coined the term "Internet of Things" to describe a vision where everyday objects interact digitally. Early IoT applications took root in logistics and manufacturing. Companies like Walmart used RFID tags to improve inventory tracking, while factories adopted M2M systems to automate operations. Defense industries also explored connected equipment to enhance battlefield awareness, proving the value of connected devices well before IoT became mainstream. Challenges That Emerged With Mainstream IoT The 2010s marked IoT's breakout from industrial backrooms into everyday life. Devices like Nest thermostats, Fitbit wearables and voice assistants such as Alexa brought smart technology into homes, fitness and daily routines. Cloud computing fueled this growth by enabling smaller, cheaper and more powerful devices. It supported everything from car infotainment systems to smart farming, like John Deere's use of IoT sensors to monitor soil and boost crop yields in real time. However, this rapid ascent came with hurdles. As more devices came online, the lack of standardization across hardware and communication protocols made interoperability increasingly difficult. Devices from different manufacturers often couldn't communicate effectively, creating fragmented systems and stalling progress. The complexity in the ecosystem increased the cost, time-consumption and failure rate of IoT systems, especially at scale. At the same time, the proliferation of connected devices created a much larger attack surface. Countless OEMs rushed to launch products, often skipping robust security measures. Major incidents like Stuxnet, the Yahoo data breach and the Mirai botnet highlight vulnerabilities, with data to cyber-physical repercussions. Insecure endpoints, poor management and generally immature cybersecurity practices created an ecosystem ripe with exploitable gaps. As IoT adoption surged, so did the complexity of managing vast fleets. What worked for pilot deployments quickly became untenable at scale. OEMs faced challenges in onboarding, updating and monitoring thousands of products across varied environments, connectivity and applications. Without centralized visibility and control, device management and security became resource-intensive and error-prone. Lessons Learned In The Evolution Of IoT Security remains a significant weakness, exposed by incidents from hacked baby monitors to pipeline ransomware attacks. To bolster security and safety, standards and regulations emerged to force accountability, including compulsory NERC CIP for the North American energy grid and GDPR for EU data privacy. Following suit, the EU Cyber Resilience Act forces manufacturers to manage product security for EU market access. Security can no longer be an afterthought. Product strategy must encompass secure design, vulnerability monitoring, regular updates and managed decommissioning from the outset. Compliance isn't solely about avoiding penalties but maintaining long-term viability in a connected world. Many connected products were launched without a clear strategy for long-term support, updates or integration—leading to compatibility issues, downtime and regulatory hurdles. GE's industrial IoT platform, Predix, offers a cautionary tale. Despite strong early adoption, limited integration planning and a lack of scalability ultimately forced GE to downsize its digital division. Building the product is the beginning, not the destination. Enterprises expect secure, interoperable systems that evolve over time. Failing to plan for ongoing support, updates and ecosystem alignment introduces risks that can derail even the most promising innovations. Bold visions aren't enough. Projections of IoT transforming sectors like healthcare and urban planning often outpaced real-world readiness. Companies like Waymo made headlines with self-driving taxis, yet deployment is still limited to a few cities. Complex vetting, regulation and safety challenges slow mass adoption. Events like CES continue to showcase futuristic technology, but the path from demo to mass-market reality remains long, oftentimes measured in decades. Adding software to hardware transforms the business model. Long-term success requires not just innovation but ongoing support, including updates, maintenance, security and compliance. OEMs must plan for sustainable revenue sources to fund the ongoing costs of software. The Road Ahead Billions of new devices are expected to come online. However, adding more devices to the mainstream does not secure the future of IoT if these connections are not also more resilient. This next wave of growth demands enhanced security, device life cycle management and financial stability to enable continuous support and operability. Products must be reliable while maintaining robust security and privacy protections—regardless of environment, complexity or application. Ultimately, tech innovation won't purely define the next chapter of IoT. It will hinge on how effectively OEMs manage the device life cycle—from secure design and deployment to ongoing updates, compliance and responsible decommissioning. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Yahoo
11-06-2025
- Business
- Yahoo
FiberStar Selects Incognito Software Systems to Optimize Fiber Network and Enhance Wi-Fi Service Quality
Incognito's Digital Experience Solution enables the provisioning and management of fiber ONT devices and improved in-home Wi-Fi. VANCOUVER, British Columbia, June 11, 2025--(BUSINESS WIRE)--PT. Mega Akses Persada (FiberStar), a leading fiber operator in Indonesia, has announced its partnership with Incognito Software Systems, a leading global provider of broadband service orchestration, device management, and network intelligence OSS solutions, to deploy its Digital Experience (DX) Solution to streamline multi-vendor device management and optimize Wi-Fi service quality. With Incognito's solution, FiberStar can take advantage of market-leading TR-069 and Wi-Fi management capabilities to enhance key customer journeys, such as service activation, performance management, and issue resolution. With a focus on designing, building, and operating high-quality, open-access fiber infrastructure that enables enterprise customers and communication service providers to offer triple-play services across 200 cities in Indonesia, FiberStar required a robust device management solution capable of supporting end-to-end provisioning and monitoring of Optical Network Terminals (ONTs) across its network while maintaining visibility of in-home Wi-Fi performance. Thanks to the flexible architecture and standards-based approach of Incognito's solution, the deployment was completed swiftly in just a matter of weeks, allowing FiberStar to quickly enhance its service delivery. Incognito's DX Solution equips FiberStar with real-time visibility into in-home Wi-Fi performance, enabling remote diagnostics, proactive troubleshooting, and seamless configuration updates across multi-vendor devices. This ensures optimized connectivity, reduced service disruptions, and faster resolution of Wi-Fi issues, leading to improved customer satisfaction and trust. Key features of the solution include: Standards-based TR-069 device management and provisioning that is network access agnostic and vendor-neutral; Centrally managed device configurations, including firmware updates, reboots, and parameter changes, to streamline operational processes; Advanced service quality management to validate connection quality, perform automated network-wide monitoring, and conduct individual device diagnostics; Real-time alerts and reporting to provide deeper insights into network performance and long-term trends. "At FiberStar, we are committed to delivering top-tier fiber services to customers across Indonesia," says Sugiharto Darmakusuma, President Director at FiberStar. "By selecting Incognito's proven carrier-grade solution, we can improve operational efficiencies while continuing to meet the growing demands of the Indonesian IT market and exceed customer expectations." To support this project, Incognito worked with PT Multipolar Technology Tbk to ensure a seamless deployment of the DX Solution for FiberStar. Multipolar Technology played a key role in understanding the networking requirements, facilitating stakeholder collaboration, and ensuring a smooth implementation that enhances FiberStar's service offerings. "Through our collaboration with Incognito, Multipolar Technology has provided FiberStar with a best-in-class and telco standard device management solution (FTTH multi-vendor ONT management) empowering them to deliver exceptional connectivity experiences," said Yugi Edison, Director Account Management Telco and Public Sector at Multipolar Technology. "We are excited to continue this collaboration with FiberStar to foster innovation throughout the region." "Incognito is proud to be a key enabler of FiberStar's network growth goals," said Gary Knee, CEO of Incognito. "The swift deployment of our DX Solution provides network-wide visibility and control over FiberStar's fiber network devices, helping cut costs, reduce demands on operational teams, and improving the quality of experience of all subscribers." About Incognito Software Systems Inc. Incognito Software Systems Inc. provides service orchestration software and services that help digital service providers manage the next-generation broadband experience. Founded 30 years ago, Incognito has over 200 customers worldwide, including America Movil, Cox, Digicel, Globe, and Orange, leveraging its solutions to fast-track the introduction of innovative broadband services over fiber and 5G fixed wireless access technologies, while delivering a great customer experience. Incognito Software Systems is a Lumine Group company (TSXV: LMN). Visit or follow us on LinkedIn and X (Twitter). View source version on Contacts Matt MarianiDigital Marketing Manager+