Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

Sarah Dickinson
on 31 July 2017

How to pick a winning IoT business model – Infographic


The potential for IoT is huge but many businesses are still grappling with how it can benefit their organisation and how exactly to get started. Canonical recently surveyed over 360 IoT professionals to examine their current and future challenges plus opportunities that exist for organisations looking to become IoT ready. This infographic looks at the findings of 3 key areas that businesses need to consider; monetisation, skills and security considerations.

For more information on these 3 areas and IoT business models, click here to download the full report.

Related posts


Ishani Ghoshal
11 September 2025

What our users make with Ubuntu Pro – Episode 2

Ubuntu Article

How Vaultara achieved FedRAMP compliance with Ubuntu Pro Ubuntu Pro helps businesses worldwide to innovate and shape the future. In this edition of What our users make with Pro, we talk to Dave Monk, CTO of Vaultara, a FedRAMP approved data-sharing platform trusted by the US government. Dave shares how Ubuntu Pro became a cornerstone ...


Isobel Kate Maxwell
10 September 2025

What’s the state of open source adoption in Europe?

Ubuntu Article

New research suggests 86% of European organizations believe open source is valuable for the future of their industry – but only 34% have a clear and visible open source strategy  The Linux Foundation’s latest report, Open source as Europe’s strategic advantage: trends, barriers, and priorities for the European open source community amid r ...


Matthew de Klerk
10 September 2025

What are dependencies, and how do you secure them?

Security Article

There are thousands of free-to-use, ready-built programs and code repositories that solve  problems you’d otherwise need to spend weeks building the solutions for from scratch. However, like with all software, you still need to ensure that your software supply chain is secure and safe to consume. ...