IoT value is all about using data to gain insights and take action. We designed Octave from the ground up to make your asset data accessible and actionable, so you can get to those insights more quickly and easily.
The platform does that by providing comprehensive, integrated tools across the four key areas of IoT connectivity:
Let’s drill down into some of the specific capabilities that Octave delivers across these four key areas of IoT data.
The major weakness of many existing IoT platforms and strategies is an underlying assumption that data is easy to acquire. In practice, organizations have struggled to find a one-size-fits-all solution for heterogeneous edge environments. Octave makes data extraction simpler by providing:
Octave provides all the orchestration tools and intelligence your developers need to design and control your IoT application logic. These include:
Octave includes a full suite of tools and features to take a variety of actions in response to IoT data, in a multitude of ways. And, unlike with any other IoT platform, developers can implement diverse actions using the same toolchain—across both edge and cloud. Octave provides:
One of the world’s leading providers of solar-powered lighting for infrastructure wanted to reimagine its business model. The company makes everything from marine buoys to school crosswalk traffic beacons, but was relying solely on one-time equipment sales. Company leaders wanted to add connectivity to their equipment and offer ongoing telemetry as a service. Under the traditional IoT model, launching one pilot, for one product, would have meant contracting with multiple vendors to address all the elements involved (device, network, cloud, security). Just assembling a field trial would have taken six months. From there to a commercially viable application would likely take another year. With Octave, the company worked with just one vendor and moved from conception to launch in a few months. The company also now has broad flexibility in the IoT business models it can support. For example, they can offer different tiers of telemetry services, from basic reports to dashboards to API-based integration with asset management systems. Octave will support all these cases and allow the company to easily change the data behavior as needed. They can also shift from the edge gateways used in the pilot to lower-cost embedded modules as they scale out across their portfolio. When they do, they won’t have to recode anything; everything designed for the prototype will translate to large-scale commercial launch.
A leading manufacturer of paint and chemical coatings for the auto industry wanted to improve cash flow by shifting to a pay-as-you-go revenue model. The company previously shipped containers of its products to customers on consignment, often not receiving payment until months later. By adding connectivity to the containers, they could track when a cannister was opened and immediately invoice. The company turned to its IT partner, a global enterprise systems integrator, to build the IoT pilot. But, while the integrator had expertise in cloud and back-end software development, they had no experience with embedded devices or IoT edge communications. After learning about Octave, the IT integrator realized it was exactly what they needed. With Octave, the developers can build a secure, fully functional IoT application using the Javascript toolchain they already know. They don’t have to worry about the rest of the data stack, edge intelligence or embedded connectivity. Instead, they can quickly take the idea from conception to pilot, and then from pilot to large-scale production, using their existing skill set. Coverage, security, data orchestration—everything is already in place.
The major challenge in IoT security is not figuring out what to do; you can find countless papers on security best practices. The challenge is that implementing security in real-world IoT installations is still hugely complex. With Octave, the platform handles all of that complexity. We broker a trusted relationship between edge and cloud. We ensure that no data is accepted from or sent to unauthenticated sources or destinations. Your developers get a system with built-in trust, so they can focus on building great applications instead of reinventing security infrastructure. Key Octave security capabilities include: