The report was overseen by a steering committee of 11 senior executives from GSA member companies and McKinsey. The process involved interviewing 30 GSA members who were senior executives at semiconductor companies, or at companies in adjacent industries that are part of the IoT ecosystem, such as network equipment and industrial automation, and surveying 229 semiconductor executives at GSA member companies.
The IoT, as defined by McKinsey and the GSA, refers to sensors that communicate over the Internet without human intervention. That definition includes wearables and smartphones, both of which communicate autonomously if allowed. It also includes smart devices for cars, homes, and cities, and for healthcare and industrial equipment.
Looking ahead, the benefits and growing ubiquity of connectivity appear likely to make "smart" the default for objects of significant value. Perhaps the term will even disappear as it becomes the norm, to be replaced by "dumb" (or something less pejorative like "silent") for those rare instances when objects can't communicate.
But several challenges may delay that future, and the McKinsey/GSA survey sees six obstacles of note.
1. Security and data privacy. "Overall security is only as good as its weakest point," said one executive interviewed for the report. Certainly weak points are abundant on the Internet today.
This explains why Samsung spent considerable effort at the recent Internet of Things World conference emphasizing the presence of Secure Element hardware in its new ARTIK line of IoT modules.
The report lumps security and privacy into a single concern. That's arguably the ideal case -- owner-controlled encryption -- but typically security and privacy diverge. Companies that keep data secure may define privacy to mean "private to other companies but available to us." Those making IoT devices need to understand that security and privacy can't be an afterthought, or a single idea.
The automatic communication of IoT devices makes privacy more difficult by encouraging a usage pattern where communication consent is given in advance, rather than at a contextually relevant moment.
2. Customer demand. At least in the consumer market, the report anticipates that the IoT market will grow through a variety of applications, rather than via a single killer app. The report advises that semiconductor companies help developers create compelling IoT products and guide businesses with an interest in IoT deployment.
Part of the problem is that IoT products may be more interesting to their makers -- by providing companies with data and customer engagement -- than to customers. Users of IoT devices need to be able to derive real, repeatable benefits from the technology, or they just won't bother with it.
3. Limited consensus on standards. This lack of standards is particularly the case among emerging protocols with low-power consumption like LTE Cat.0, 802.11ah, Sigfox, and OnRamp. The report suggests that chipmakers hedge their bets until there's more clarity.
4. Market fragmentation. The diversity of IoT applications means no single chip is likely to be suitable for all applications. Such fragmentation represents a concern because it limits economies of scale, thus raising production costs. The report recommends that chipmakers focus on silicon that can serve multiple markets -- an approach Samsung has taken with its three distinct ARTIK modules.
5. Elusive new revenue sources. Perhaps the most intriguing aspect of the report is the finding that semiconductor companies are looking beyond silicon manufacturing for profits. Many of the companies interviewed are looking to add value at multiple layers of the technology stack, through software, security, and systems integration. IoT appears to be a ladder up the value chain.
6. Technology shortcomings. Finally, while two-thirds of survey respondents expressed confidence that IoT technology is where it needs to be to thrive, another third suggested that reduced power consumption would stimulate demand for IoT devices and applications.
The Internet of Things is here, but it may take some time to figure out which side is up.
[Did you miss any of the InformationWeek Conference in Las Vegas last month? Don't worry: We have you covered. Check out what our speakers had to say and see tweets from the show. Let's keep the conversation going.]
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.