Opening up Comms Networks Could Spur IoT Development
With Gartner predicting that the number of IoT devices will hit 14.2 billion this year, getting devices to communicate with each other at scale won’t be easy.
Fragmented networks mean that developers have to deal with that issue before they can even begin building solutions. According to Evan Cummack, head of IoT and Wireless at cloud communications platform, Twilio, establishing multiple large agreements so that developers can get access to the world’s wireless networks to build IoT solutions is very familiar territory to the company.
In an exclusive interview with UC Today, Cummack said that his company started out by “democratising access to the world’s closed telecommunications networks” and when that happened, developers started building products around “unified communications, customer engagement, and multi-channel customer service”.
“So it makes sense at that point that Twilio says: ‘hey if all of our customers are reinventing the same wheel, we should be providing these higher-level software solutions to solve some of the problems.’”
Similar patterns emerging in IoT
He said that Twilio started on IoT in a similar way to how it got started speaking about communication problems. There are very similar patterns emerging in IoT that it saw in the comms world 12 years ago; a lot of regional networks with essentially closed bases.
Trying to get a deal with multiple carriers is not necessarily the most attractive proposition in the world when you are trying to experiment and innovate, said Cummack. This was a problem Twilio was able to solve in IoT as it had done with unified comms.
In IoT, like unified comms, that are so many use cases and so many businesses that need to be built, said Cummack. He added that problems in IoT can be solved by another massive wave of developers building on a big platform, much in the same way that they did when Google and Apple built up their platforms. These developers can come in a solve all of the problems.
Cummack said solutions developed on IoT platforms could integrate with unified comms. “From an operational perspective, there will be cross sections where you have, for example, someone operating some fleet of [IoT] devices and you are going to want to use communications to respond to problems.”
Machine and human interface
“You’re going to want communications to be doing proactive notifications, you’re going to want communications to generally be sort of acting as the interface between the machine’s system and human stakeholders.”
Cummack also said that the primary reason for being interested in the IoT market is that firstly, Twilio has five million developers in its ecosystem already. Secondly, having spent a lot of time in mobile communications, it has a strong history of business development and collaboration with the carriers.
“So it does put us in a position where we’re able to, once again, take something that’s essentially a sort of fragmented black box type ecosystem, and present it to a developer as a single pane of glass. You have a single API for a single console.”
Industry: Unified Communications
- Identity & Access Management (IdAM) Consultant
- Upto €100,000 plus bonus and benefits
An Identity & Access Management Consultant is needed to lead and drive technical and or business transformation projects in a client-facing position for a prestigious consultancy in Germany. The Identity & Access Management Consultant will be responsible for technical design and implementation of Identity & Access Management/IAM products within a wide variety of clients. The Identity & Access Management Consultant will have a blend of technical hands-on and client-facing consultancy with the ability to develop new business. Broad technical knowledge across Identity and access management is benefical. The Identity & Access Management Consultant will need to have technical hands-on experience with one or more of the following core areas; Privileged Access Management (PAM, CyberArk, Beyondtrust, Thycotic) Identity Governance Administration (IGA, Sailpoint, Omada, RSA) Customer Identity & Access Management (CIAM, Forgerock PSD2) The Identity & Access Management Consultant must have the willingness to travel to customer sites across Germany (once we are allowed to)
- Cyber Vulnerability and Threat Hunter, London
REF CH7915 Cyber Vulnerability and Threat Hunter, London £50,000 London To monitor and identify cyber threats and vulnerability within a public sector environment. MIRE Att&ck, CIS, OWASP, Vulnerability management tools MUST be able to commute to central London MUST be able to achieve UK SC Clearance. On going support and development. Apply today for more information or contact me directly on Chris.Holt@dclsearch.com or 07884666351
- Ping Identity Consultant
- upto €850
Looking for experienced PIng Identity Consultants, Looking for consultant with Implemenation or Architect experience in the Ping identity product set (Ping Federate, Ping Access, Ping Directory, Ping Adapter development, SDK etc) This would be for implementation projects, working across Europe. You will be responsible for providing implementation services to our clients from information gathering through to implementation. Evaluating client business, process, systems, and technology requirements and advise clients on best practices to help guide and solidify proposed designs. Manage Client expectations, Stakeholder Managment, ensuring design match business requirements this is a remote role you can be based anywher in Europe
- Ping Identity Consultant
Looking for experienced PIng Identity Consultants, Looking for consultant with Implemenation or Architect experience in the Ping identity product set (Ping Federate, Ping Access, Ping Directory, Ping Adapter development, SDK etc) This would be for implementation projects, working across Europe. You will be responsible for providing implementation services to our clients from information gathering through to implementation. Evaluating client business, process, systems, and technology requirements and advise clients on best practices to help guide and solidify proposed designs. Manage Client expectations, Stakeholder Managment, ensuring design match business requirements this is a remote role, you can be based anywhere within Europe