Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion
More Relevant, Valuable Connections Will Improve Innovation, Productivity, Efficiency & Customer Experience

Executive Summary

  • The Internet of Everything (IoE) creates $14.4 trillion in Value at Stake — the combination of increased revenues and lower costs that is created or will migrate among companies and industries from 2013 to 2022.
  • The five main factors that fuel IoE Value at Stake are: 1) asset utilization (reduced costs) of $2.5 trillion; 2) employee productivity (greater labor efficiencies) of $2.5 trillion; 3) supply chain and logistics (eliminating waste) of $2.7 trillion; 4) customer experience (addition of more customers) of $3.7 trillion; and 5) innovation (reducing time to market) of $3.0 trillion.
  • Technology trends (including cloud and mobile computing, Big Data, increased processing power, and many others) and business economics (such as Metcalfe’s law) are driving the IoE economy.
  • These technology and business trends are ushering in the age of IoE, creating an unprecedented opportunity to connect the unconnected: people, process, data, and things. Currently, 99.4 percent of physical objects that may one day be part of the Internet of Everything are still unconnected.
  • To get the most value from IoE, business leaders should begin transforming their organizations based on key learnings from use cases that make up the majority of IoE’s Value at Stake. These use cases include smart grid, smart buildings, connected healthcare and patient monitoring, smart factories, connected private education, connected commercial (ground) vehicles, connected marketing and advertising, and connected gaming and entertainment, among others.
  • Robust security capabilities (both logical and physical) and privacy policies are critical enablers of the Internet of Everything Economy. The IoE Value at Stake projections are based on increasingly broad adoption of IoE by private-sector companies over the next decade. This growth could be inhibited if technology-driven security capabilities are not combined with policies and processes designed to protect the privacy of both company and customer information.

Please download the PDF to read more.