Skip to main content
  1. Blog
  2. Article

Sarah Dickinson
on 31 July 2017

How to pick a winning IoT business model – Infographic


The potential for IoT is huge but many businesses are still grappling with how it can benefit their organisation and how exactly to get started. Canonical recently surveyed over 360 IoT professionals to examine their current and future challenges plus opportunities that exist for organisations looking to become IoT ready. This infographic looks at the findings of 3 key areas that businesses need to consider; monetisation, skills and security considerations.

For more information on these 3 areas and IoT business models, click here to download the full report.

Related posts


Massimiliano Gori
27 March 2026

Modern Linux identity management: from local auth to the cloud with Ubuntu

Cloud and server Article

The modern enterprise operates in a hybrid world where on-premises infrastructure coexists with cloud services, and security threats evolve daily. IT administrators are tasked with a difficult balancing act: maintaining traditional local workflows while managing the inevitable shift toward cloud-native architectures. Identity has emerged ...


Abdelrahman Hosny
24 March 2026

Canonical welcomes NVIDIA’s donation of the GPU DRA driver to CNCF

Partners Article

At KubeCon Europe in Amsterdam, NVIDIA announced that it will donate the GPU Dynamic Resource Allocation (DRA) Driver to the Cloud Native Computing Foundation (CNCF). This marks an important milestone for the Kubernetes ecosystem and for the future of AI infrastructure. For years, GPUs have been central to modern machine learning and high ...


ijlal-loutfi
23 March 2026

Hot code burns: the supply chain case for letting your containers cool before you ship

Ubuntu Article

Zero CVEs doesn’t mean secure. It means unexamined. New code has zero CVEs because no one has studied it yet, and if you’re rebuilding nightly from upstream, you’re signing first and asking questions later. In software supply chain security, the freshest code isn’t always the safest. Sometimes the most secure component in your pipeline is ...