Arthur C. Clarke said it best, “Any sufficiently advanced technology is indistinguishable from magic.” As we watch today’s emerging technologies, we’re seeing this quote come to life. This is where we get to revel in the magic!
IT is concerned that IoT projects will compromise their security, incident management, disaster recovery and network performance.
Offering different and flexible security levels matched to the needs of the service delivered by a network slice will be a ‘monetizing’ opportunity.
The third step is to define the best technical architecture to implement the use case stories described in the functional view.
The third key to successful IoT implementation is to define the best technical architecture to implement the use case stories.