My articles that has featured in the Mobile Operator Guide: Innovation & Transformation 2014 published by SAP. This is their 2nd annual publication released worldwide. (Page 72 to 76)
Wearable Technology and IOT Wearable Device Market is foretold to witness lucrative business prospects owing to the ever-increasing demand for wearable devices.
Previsões da PwC US que a próxima fase da #inovação móvel vai girar em torno de capturar e modelar a situação contextual de usuários móveis. Esse #conhecimento vai se tornar o principal recurso para aplicações móveis preditivos e serviços que atendam às necessidades e desejos dos usuários móveis em tempo quase real , e muitas vezes antes que os próprios usuários revelam o que eles querem.
When consumers perceive value from using the Internet of Things (IoT) devices and applications, the trend will quickly create a new market. To read the entire article published in HITEC 2016 Special Report, please click here: The Future of IoT in Hospitality, By Dr. Aluri (pp. 18-21).
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
Wearable Technology and IOT Wearable Device Market is foretold to witness lucrative business prospects owing to the ever-increasing demand for wearable devices.
Previsões da PwC US que a próxima fase da #inovação móvel vai girar em torno de capturar e modelar a situação contextual de usuários móveis. Esse #conhecimento vai se tornar o principal recurso para aplicações móveis preditivos e serviços que atendam às necessidades e desejos dos usuários móveis em tempo quase real , e muitas vezes antes que os próprios usuários revelam o que eles querem.
When consumers perceive value from using the Internet of Things (IoT) devices and applications, the trend will quickly create a new market. To read the entire article published in HITEC 2016 Special Report, please click here: The Future of IoT in Hospitality, By Dr. Aluri (pp. 18-21).
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
With evolving digital business needs, and changing regulatory compliances, a Digital-First strategy is a must today. Know how a digital business platform leverages the big opportunity of enabling enterprises to reinvent and transform themselves while delivering a delightful customer experience. https://bit.ly/3rFjs5S
As 2017 looms ahead businesses, CEO's, C-level management, as well as non-profit or political leadership need to take a look ahead and see what the new adaptive technologies and business trends can be harnessed and applied to their model in order to operate more efficiently.
From artificial intelligence and augmented reality to multi-connected businesses and new mobility, the focus is on a wide variety of technology – but which trends have a lasting influence on digital transformation, in a post-COVID world? A Social Friendly Report.
Monitoring water temperature, opening a yard gate and detecting water flood are just few samples of the many scenarios that simple IoT system can answer. Azure IoT Hub can be used to connect many different types of devices. At the lowest end, you can use it to connect a less than 3$ WiFi capable system on a cheap microcontroller, such as the WeMos D1 Pro and NodeMCU. In this lecture we will dive into the details of the Azure IoT hub. We will understand its service and its SDKs. We will see how we can build a WiFi capable, Arduino based, cloud controlled IoT smart switch. We will then use a cross platform Xamarin based application to activate the smart switch.
You will learn:
· An Internet of Thing system overview
· How to create and use the Azure IoT Hub
· Implementing an Azure IoT client SDK based solution
· Provisioning IoT devices, sending information to the cloud and receiving commands
· Arduino development using Visual Studio
WiFi Offload Strategy for Telcos-OperatorsGreen Packet
Given the increase in the number of permutations of device and content available out there, a move towards web-based cloud solutions will inevitably form the need for more mobility and efficiency in delivery. This paper will discuss the implications of the emergence of multifunction, multi-radio systems and multiplatform application and services that are driving forward seamless mobility in the pretext of “now” that allows users to transparently access network connections and ensure session persistence across varied connections for consistent experience together.
2013 Global Trends in Technology, Media and TelecomsCM Research
This report offers a comprehensive, global view of the technology, media and telecom (TMT) sectors over the next 12 months. Our aim is to answer three questions:
What will be the big technology cycles over the next 12 months?
How will they affect each of the TMT sectors in the chart below?
Which trends are likely to influence investor perceptions going forward?
With evolving digital business needs, and changing regulatory compliances, a Digital-First strategy is a must today. Know how a digital business platform leverages the big opportunity of enabling enterprises to reinvent and transform themselves while delivering a delightful customer experience. https://bit.ly/3rFjs5S
As 2017 looms ahead businesses, CEO's, C-level management, as well as non-profit or political leadership need to take a look ahead and see what the new adaptive technologies and business trends can be harnessed and applied to their model in order to operate more efficiently.
From artificial intelligence and augmented reality to multi-connected businesses and new mobility, the focus is on a wide variety of technology – but which trends have a lasting influence on digital transformation, in a post-COVID world? A Social Friendly Report.
Monitoring water temperature, opening a yard gate and detecting water flood are just few samples of the many scenarios that simple IoT system can answer. Azure IoT Hub can be used to connect many different types of devices. At the lowest end, you can use it to connect a less than 3$ WiFi capable system on a cheap microcontroller, such as the WeMos D1 Pro and NodeMCU. In this lecture we will dive into the details of the Azure IoT hub. We will understand its service and its SDKs. We will see how we can build a WiFi capable, Arduino based, cloud controlled IoT smart switch. We will then use a cross platform Xamarin based application to activate the smart switch.
You will learn:
· An Internet of Thing system overview
· How to create and use the Azure IoT Hub
· Implementing an Azure IoT client SDK based solution
· Provisioning IoT devices, sending information to the cloud and receiving commands
· Arduino development using Visual Studio
WiFi Offload Strategy for Telcos-OperatorsGreen Packet
Given the increase in the number of permutations of device and content available out there, a move towards web-based cloud solutions will inevitably form the need for more mobility and efficiency in delivery. This paper will discuss the implications of the emergence of multifunction, multi-radio systems and multiplatform application and services that are driving forward seamless mobility in the pretext of “now” that allows users to transparently access network connections and ensure session persistence across varied connections for consistent experience together.
2013 Global Trends in Technology, Media and TelecomsCM Research
This report offers a comprehensive, global view of the technology, media and telecom (TMT) sectors over the next 12 months. Our aim is to answer three questions:
What will be the big technology cycles over the next 12 months?
How will they affect each of the TMT sectors in the chart below?
Which trends are likely to influence investor perceptions going forward?
Система G-tech - композитные фасадные навесные стеновые модули, 100% заводского изготовления, предназначенные для ограждения наружных стен зданий высотой до 150 метров с железобетонным или стальным каркасом, которые служат заменой традиционным способам устройства ограждающих конструкций зданий.
Bases de la identidad (que es, cómo se forma una identidad, desde el átomo, un ecosistema, una persona, y hasta un planeta entero, partimos de las mismas leyes, las de la naturaleza, y ampliamos).
#Mi curso virtual SIGA Casuístico
El curso en su totalidad es práctico, el cual se encargará de dar solución a casos reales que se dan en el SIGA .
Inicio: 30 de Noviembre del 2015 Con Certificación por R&C CONSULTING (24h lectivas). Obtén promociones por pronto pago. Visita nuestra web para mayor información: rc-consulting.org O llámanos a: Teléfono : 01-266-1067 Movistar: 9-9911-4921 RPM: #125533 RPC: 987972131
Ways to improve Social enterpreurship in Ethiopian Dairy Farming Daniel Temesgen Gelan
Improve Dairy extension services for farmers on quality milk production and animal health care
Focus on youth Entrepreneurship in dairy (Youth movement in dairy reduced antibiotic use/organic farming )
Internet of Things with Wearable Devices at Enterprise Radariosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
The software development sector is constantly expanding, creating a plethora of opportunities for organizations, startups, and entrepreneurs. We provide valuable information that helps you in software development for your business.
Get more information about software development. We are providing the best information which helps you to develop customized software for your business.
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
A presentation given by Peter George at the 2004 Wireless LAN Event. The presentation discusses some of the considerations an enterprise must make when planning to introduce mobile working as part of its mission critical processes.
Wearable Technology: Automotive's Next Digital FrontierCognizant
Wearables promise to impact the automotive value chain in a similar way to smartphones. But despite their great promise, wearables also lack proven use cases, requiring that companies proceed cautiously while ignoring wearables at their own peril.
Connected Products for the Industrial WorldCognizant
By leveraging product-centric connected ecosystems, manufacturers can create new and more effective business models, advance operational excellence, and design and develop better products and services that align with customer needs and preferences.
The expansion of the Internet of Things IoT implies progressively dynamic client gadgets on the Internet. IoT devices can be ordinary articles from vehicles, advanced mobile phones to wearable sensors. Huge measures of information are produced by IoT devices through the assortment and transmission of information required for the yield of valuable results and in this way, an ef cient approach to work is significant. In the public eye today, mobile communication and mobile computing play a critical job in each part of our lives, both individual and open correspondence. By utilizing Cloud Computing with IoT, data computations are situated outside the devices henceforth diminishing the strain on the devices themselves. IoT devices are additionally frequently portable and with versatility comes the need to have wireless connections to the cloud. Therefore, Mobile Cloud Computing MCC gets appropriate. However, the development in mobile computing use can be improved by coordinating portable figuring into distributed computing. This will bring about developing another model called Mobile Cloud Computing MCC that has as of late pulled in a lot of consideration in the academic sector. This paper investigates its features, advantages, applications, and difficulties of Mobile Cloud Computing. Research endeavours towards the execution of Mobile Computing are additionally talked about giving an understanding of the fate of the innovation. Sujay Sudhakar Parkhe "Smart Computing: Mobile + Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30340.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30340/smart-computing-mobile--cloud/sujay-sudhakar-parkhe
Wearable Devices: The Next Big Thing in CRMCognizant
When integrated with CRM systems, wearable devices offer the same type of digital experience as desktops, laptops, smartphone or tablets, but with the convenience afforded by watches, eyeglasses and headbands. Wearables apply across the CRM spectrum - from sales, to marketing, to services.
2017 brings many changes from the political landscape to healthcare to technology. Whether you're a CEO, entrepreneur, small business owner, professional or part of management at a non-profit organization.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
A discussion on IT trends forecast for the year ahead in respect to entrepreneurs & students.
The transcript of my oral notes for the presentation are added to the last slides.
Similar to Asian Giants Catching Up with the Global LTE Leaders (20)
This presentation was given during the Blockchain Summit 2017 in Melbourne.
The talk analyzed the reason’s why Blockchain is being termed as a disruptive technology which may potentially impacts sectors beyond Banking and Finance.
It elaborates the spectrum of use cases that may be relevant to the Telecom sector especially in the areas of new product & service development (NPD), operational improvement and/or risk management. It emphasizes the key trends that are being witnessed in the Financial sector and drew lights on the future outlook for Blockchain for the Telecom sector.
Live Streaming becomes Mainstream by Sohag SarkarSohag Sarkar
This article analyzes the growing uptake of Video streaming over smart devices and the limitless use cases of Live streaming. It further explores the key drivers have made live streaming truly mainstream.
From Gloom to Boom: The Return of the growing Telecom Market by Sohag SarkarSohag Sarkar
Communication Today (Adi Media publication)
Analysis on the Telecom Investment in 2014:
The market stabilization in 2013 has provided the much needed respite (Optimism) to all the players in the telecom ecosystem; as they await (Cautiously) the next set of rules (to be set forth by the government and the regulator) to further the telecom revolution to the next level. This year therefore would be the “Year of Cautious Optimism” and the operators would show signs of bringing back the sector to its lost glory:
The Spectrum Auction: Survival of the richest? by Sohag SarkarSohag Sarkar
Business Standard magazine: Indian Management Cover Story titled "The Spectrum Auction: Survival of the richest?" (January 2015 edition)
The article provides analysis on the Telecom Spectrum auction planned in March 2015:
Key players (Incumbents, Challengers, New entrants and spectators) contending for the valuable spectrum bands to offer varied services i.e. 2G, 3G or 4G (considering a technology neutral auction).
Impact of the present auction on existing customers (83% of the subscribers who contributes 77% of the overall revenue) as the license to serve the customer comes to an expiry (across 17 out of 22 telecom Circles) for the incumbent operators namely Airtel, Vodafone, Idea and Reliance.
Art of Business Transformation by Sohag SarkarSohag Sarkar
The paper analyzes the end-to-end process of Telecom
Business Transformation (which can be applied to other Industries as well). Today majority of the Telcos around the globe are engaged in a business transformation in some form or the other. A business transformation is required to keep pace with the internal and/or the external factors within the Telco. An internal factor maybe defined as an initiative which is driven from within the organization, example “Sustenance like keeping pace with the subscriber growth”. While on the other hand, an external factor may also drive an organization to initiate a business transformation like the readiness for Mobile Number Portability.
Business Transformations are critical to the success of an organization in near as well as long term. The same is required to provide the necessary fillip to an organization and the competitive advantage in the market place. Therefore, getting a business transformation “first time right” is crucial and the paper analyzes all aspects that essentially contribute to the success of a transformation program: Definition of Business Case, Resource deployment, Planning & Budgeting, Partner & Product Selection, Stakeholder Management, Performance Management, Change Management and overall Program Management.
The paper aims at assimilating the knowledge garnered during the implementation of large scale telecom business transformations within and outside the country. And present the key challenges faced by various Telcos in an anecdote manner and introspects the proactive resolution that would have helped in the transformation journey.
Monetization of Mobile Social Media in IndiaSohag Sarkar
The article was presented at the International Conference on "Managing Change in Business and Economy" under the track titled "Contemporary Marketing Practices and Framework for Change".
Telecom Outlook 2011-12 by Sohag SarkarSohag Sarkar
The article analyzes the Telecom Sector and defines the contemporary focus areas (3G, MNP, National Broadband Plan, MVAS, Telecom Manufacturing, and Policy Reforms) for year 2012.
A Business Paper on Third Generation Mobile Services popularly known as 3G.
The paper provides an overview on the 3G Technology that was introduced in India in the year 2011, describing the key players who won the 3G spectrum; how it would enhance and support other sectors like Healthcare, Banking & Finance, Media & Entertainment, Education, MVAS & Equipment Manufacturers. The paper also analyzes the ground work to be performed by operators before the launch of 3G services in the country.
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...Sohag Sarkar
The paper analyzes the immense popularity of social media over mobile devices and prospects the new theme of location based mobile - social networking.
Impact Of Celebrity Endorsement By Sohag SarkarSohag Sarkar
This Business Paper tries to look beyond the benefits that might be derived out of celebrity endorsement. It tries to understand the process of consumer psychology and impact of celebrity endorsement on the overall process of brand building. The in-depth study of various models brings to light the complexities pertaining to celebrity endorsement. Analyzing its success is as much a necessity as is the understanding of its need. The importance of celebrity management has been emphasized to realize success or failure in its true sense. A symbiotic model has been proposed to define: how to make celebrity endorsement a win-win situation for both the brand and the brand-endorser.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Monitoring Java Application Security with JDK Tools and JFR Events
Asian Giants Catching Up with the Global LTE Leaders
1. The Rise of the Wearables: Adding new fillip to M2M
By Sohag Sarkar (Manager - Strategy & Operations, KPMG Advisory Services)
Introduction
Over the last couple of years the term M2M (aka Machine-to-Machine) has become clichéd. In literary
sense it would mean the flow of data between machine-to-machine and ultimately machine-to-user. The
data would flow from a machine over a network, and then through a gateway to a system where it can be
analyzed and acted upon. The critics were still debating on the hype created by M2M; another avatar has
emerged that could potentially change the rules of the business: The Wearable Technology.
Wearable Technology
It represents the next-generation of connected gadgets or devices (earlier witnessed in the sci-fi movies)
that a user would wear for an extended period of time, which significantly enhancing the user’s
experience about self or the surrounding environment. A wearable device would typically include a
sensor(s) (with minimal level of independent processing capability), a wireless connectivity, a power
support and a user-interface or display where the user can interpret the data (raw or processed).
Sensors
To record or process one-
to-many dimensional data
like visual, motion, location
or biometric
Battery / Power
To provide the necessary
power backup to run the
software while the device is
still mobile (with its’ user)
User Interface
The primary user interface
to assess raw or processed
data either over the device
display, over a Smart
phone app and/or a
desktop application
Network / Connectivity
To communicate the data
over a network: wireless
(Bluetooth, Wi-Fi) or fixed
communication
Innovation prospers when ideas are conceptualized taking due cognizance of the consumer behaviour.
Technological evolution has, therefore, provided a new meaning to the hitherto wearables: watch,
spectacles, clothes, pendants, rings, etc.
2. Popular Wearables across Human body parts:
Wrist wear: Wrist wear computers, Smart watches, Bracelets
Eye wear: Smart glasses or goggles, contact lenses
Foot wear: Sports or activity sensors
Neck wear: Pendant or jewellery wear
Chest wear: Heartbeat monitors
Body wear: Smart fabric, arm or leg wear, smart tattoo on skin
Others: Ring /finger wear, Smart headsets
Business Drivers: Short to Long term
One of the critical aspects of present-day wearables is the ability to communicate and provide intelligent
or more meaningful data to the user. The significant buzzword here is that “smarter lifestyle requires
smarted devices”. The key success factors for early adoption and sustained usage of wearables includes:
Unique selling proposition: In a world full of smart phones, wearables come as an additional
cost or addendum device. Each of these wearables may address niche customer segments and
in order to expand the early adopters’ base; targeted communication should be made to
demonstrate the role, the relevance and the uniqueness of these devices. There should be a
proven benefit that the user can relate to, in order to make a purchase decision.
Lifestyle compatibility: The product should not warrant too many behavioural changes (like
frequent charging or complex setup) to adopt the device. It should provide seamless integration,
connectivity with the destination devices and/or the servers.
Popular Technology enablement: A closer interaction or interplay with social, mobile, location
and cloud based services makes the product more present day or relevant. “Social motivation” is
one of the required factors that are making wearables in-vogue.
Design Aesthetics: The aesthetics have a larger role to play when it comes to wearables and
their form factor shouldn’t address technological innovation over fashion & design.
User Engagement: The product that provides utility but fail to have a meaningful impact on users
for example an activity tracker that provides data but doesn’t inspire action -- end up failing in the
market. If the product is able to instil “habit formation” then only it would lead to long term user
engagement.
3. Wearables: A specialized diversification
The wearables are finding relevance across multiple industries and opening up a world of opportunities
for the OEMs:
Industry Applications Product Portfolio
Heath care & Medical Vital signs monitoring, in vivo implants,
chronic disease management, brain-eye
movement, geo-tagging, unobtrusive
patient monitoring, self diagnostics
Bio feedback patch
Heading aids
Insulin pump patch
Wireless ECG Headset
Wellness Physiological monitoring, weight /
energy monitoring, posture correction
(general / driving), interactive
instructions
Sleep / emotion / stress tracker
Sensor bands / connected bracelet
Sports / Fitness Sports performance, fitness monitoring,
virtual coaching, outdoor navigation /
location tracking or sharing, activity
tracking, goal monitoring / management
Activity Tracker
Heat rate monitor / BioHarness
Heated Jacket
Smart shoes
GPS Ski Mask
Infotainment &
Communication
Data, voice/video & media access,
email/text/messaging, social media,
share experience, organizer, interactive
gaming, real time information /
navigation
Smart Watches
Smart Glasses / Goggles
Heads-up display
Augmented Reality Gaming
Industrial & Military Responsive / aided learning, quality
control & security, real time information
/ navigation, communication, work force
automation, military / emergency
services, identity recognition, rescue /
tracking, remote monitoring,
Hand worn terminals
Hand scanners
Smart clothing
Smart Glasses / Goggles
Heads-up display
Security & Safety Emergency services, identity
recognition, remote monitoring, security
profiling, real-time data, hazmat
detection
Connected fire-fighting jacket
Biometric insoles
Handheld scanners
Personal locator beacon
Source: IHS Electronic Media, Beecham Research (2013)
Wearables: The new threat to the Smart Phones?
Experts are debating if wearables would cause the
future displacement of presently popular smart phones
and in the process pose a threat to the technological
evolution of smart phones. A pure-play M2M device is
self sufficient and has the capability to communicate
directly with the server (Example: a passenger car
telematics device can automatically send emergency
assistance notification); on the other hand the present-
day wearable devices (Example: a fitness tracker
which can provide user activity summary) leverages
Cloud Web Server
Smart
Phones
(Hub)
M2M Device
Cloud
Wearable Device(s)
Web Server
4. the power of smart phones to communicate to the end server or cloud based application.
The key consideration here is that having cellular connectivity built into wearables makes it a redundant
feature. The wearable devices can connect to the smart phone via Bluetooth (or any other technology),
and send and receive data via the smart phone's Internet connectivity. Also, it would not be prudent to
expect an economic wearable device which is fully loaded and will provide the required battery life and
processing power of that of a smart phone. By offloading processing and connectivity onto a smart phone,
the cost of wearables can come down (considering the price of sensors keeps dropping). Therefore going
forward the smart phone - wearables combination (a symbiotic relationship) maybe more workable. And
multiple wearables can get connected via a single hub device (or the smart phone).
Wearables: What’s in it for the Operators?
The technology industry is bullish on the wearable technology as it has announced that the year 2014 will
be the “Year of the wearables” (during the Consumer Electronics Show and Mobile World Congress
earlier in the year). The operators have a vital role to play in the overall equation of Wearables or M2M
roadmap and should focus on the following considerations going forward:
Network experience: Though the wearables address only niche customer segments, the network
needs to be planned in accordance with the future data consumption of the tech-savvy customers.
Some of the wearables may introduce different packets which would require prioritization or different
routing. The current model of network testing to assure QoS involves deep network visibility into traffic
and packet inspection. With data traffic almost doubling on an annual basis the testing models need
to be extended further into the network to ensure data delivery.
Collaboration with Niche Players: In order to provide value addition to the subscribers (similar to
VAS), operators have to collaborate and define innovative business models with niche players so as
to provide specialized device and subscription based services. The operators can also leverage their
enterprise services to offer cloud based services to these players.
Heterogeneous Networks: Considering higher frequency bands for the next generation data
technologies (3G/LTE/BWA); the operators need to ensure efficient and seamless indoor coverage by
deploying small cells, DAS or Wi-Fi hotshots.
Bundled Offering: The operators have become the launch pad for most of the Smart phone OEMs
and wearables are being positioned as a bundled offering. The operators can thus leverage their
distribution and marketing skills to further cross-sell the wearables.
By ensuring an optimal network and providing a bouquet of technology devices; the Operators can define
a win-win value proposition with key players in the Wearables value chain. Needless to mention, a larger
portfolio of “always connected” devices would further enhance the data revenues and add to customer
loyalty & experience.