The IoT developer journey is long and challenging. Product development involves taking an IoT product from an idea to a thoroughly tested prototype and detailed design, including a complete bill of material (BoM) and design for manufacturing and assembly (DFMA). But it doesn’t stop there. After a product is launched, its software must be continually improved, tested, and distributed across the installed base throughout the product lifecycle. Finally, products must be properly decommissioned and recycled.
Developers must determine how to merge embedded software and hardware quickly and efficiently, creating outstanding products with robust security, superior wireless RF performance, long battery life, and excellent user experience. In addition, they must test and certify wireless stacks, making sure they comply with the frequently evolving wireless standards and security regulations.
One of the most critical manufacturing challenges for device makers is how to protect their intellectual property (IP) during an outsourced manufacturing process, preventing product cloning and unauthorized manufacturing.
During distribution, IoT device makers must consider several critical challenges, including how to preserve the batteries during the long wait in the supply chain, how to eliminate RF radiation during air freight, and how to prevent tampering.
The lifetime of an IoT device can extend from days to months or years, depending on the use case and application. Nevertheless, the device maker must deliver a great user experience every day, while maintaining the installed base efficiently throughout the lifetime. All the design choices, software implementation, hardware design, wireless performance, energy efficiency, security capabilities, and compatibility with networks, companion devices, cloud, and ecosystems are now put to an ultimate test.
Disposal of a modern wireless IoT product doesn’t end the device maker’s responsibility. It may still hold user’s private information, which is why the so-called trash can attack is widespread. Device makers must have a plan for how to wipe user information and re-assign a secure key upon the recycling phase.
See the links below for more information on longevity for specific product families.
Please select at least one column.