Use Cases.

Our use case database tracks 133 use cases in the global enterprise technology ecosystem.
Filters allow you to explore use cases quickly and efficiently.

Filters
  • (20)
  • (20)
  • (16)
  • (10)
  • (6)
  • (5)
  • (3)
  • (3)
  • (2)
  • View all 9 Industries
  • (7)
  • (7)
  • (6)
  • (6)
  • (3)
  • (3)
  • View all 6 Functional Areas
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 14 Enabled Capabilities
Selected Filters
20 use cases
Sort by:
Additive Manufacturing
Additive manufacturing (AM) is the industrial production name for 3D printing, a computer controlled production process that creates three dimensional objects by depositing materials, usually in layers.
Download PDF
Asset Health Management (AHM)
Asset Health Management refers to the process of analyzing the health of an asset as determined by operational requirements.
Download PDF
Asset Lifecycle Management
Asset lifecycle management is the process of optimizing the economic value-add generated by your assets throughout their lifecycles from procurement planning to retirement.
Download PDF
Autonomous Transport Systems
Autonomous transport systems provide unmanned, autonomous transfer of equipment, baggage, people, information or resources from point-to-point with minimal intervention.
Download PDF
Collaborative Robotics
A flexible form of human-machine interaction where the user is in direct contact with the robot while he is guiding and training it.
Download PDF
Digital Thread
The digital thread refers to the communication framework that allows a connected data flow and integrated view of the asset's data throughout its lifecycle across traditionally siloed functional perspectives.
Download PDF
Edge Computing & Edge Intelligence
Edge computing and edge intelligence shifts data processing, computing applications, and services away from centralized cloud based servers to the edges of a network.
Download PDF
Indoor Positioning Systems
An indoor positioning system (IPS) is a network of devices used to locate people or objects where GPS and other satellite technologies lack precision or fail entirely, such as inside multistory buildings, airports, parking garages, and underground locations.
Download PDF
Intrusion Detection Systems
Intrusion detection systems monitor network traffic and search for suspicious activity and known threats, sending alerts when suspicious activity is identified.
Download PDF
Process Control & Optimization
Process control and optimization (PCO) is the discipline of adjusting a process to maintain or optimize a specified set of parameters without violating process constraints.
Download PDF
Rapid Prototyping
Rapid prototyping is the application of tools and processes to build and test prototypes during the proof of concept or proof of value phase in the product development process.
Download PDF
Real-Time Location System (RTLS)
Real Time Locating Systems (RTLS) provide knowledge by delivering precise visibility of critical assets, supply chain, manufacturing, and human, in real-time.
Download PDF
Security Claims Evaluation
Security claims evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.
Download PDF
Smart City Operations
Smart city operations include the range of solutions required to enable smart city concepts by integrating information and communication technology with senors and connected devices to optimize the efficiency of city operations and services.
Download PDF
Structural Health Monitoring
Structural health monitoring solutions ensure the safety and soundness of engineering structures such as a buildings and bridges.
Download PDF
Supply Chain Visibility
Supply chain visibility solutions provide visibility into the movement of raw materials, components, and finished goods from suppliers to manufacturers to the final buyer.
Download PDF
Tamper Detection
Tamper detection technologies enable a device to detect and initiate appropriate defensive actions against active attempts to compromise the device integrity or the data associated with the device.
Download PDF
Vehicle Telematics
Vehicle telematics enables the monitoring of location, movement, status, and behavior of a vehicle within a fleet.
Download PDF
Visual Quality Detection
Visual quality detection automates the analysis of products on the production line or equipment in production facilities for quality control using machine vision.
Download PDF
Warehouse Automation
Warehouse automation is the application of specialized equipment and storage and retrieval systems to automate warehousing tasks previously handled by manual labor.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.