SlideShare a Scribd company logo
The Rise of the Wearables: Adding new fillip to M2M
By Sohag Sarkar (Manager - Strategy & Operations, KPMG Advisory Services)
Introduction
Over the last couple of years the term M2M (aka Machine-to-Machine) has become clichéd. In literary
sense it would mean the flow of data between machine-to-machine and ultimately machine-to-user. The
data would flow from a machine over a network, and then through a gateway to a system where it can be
analyzed and acted upon. The critics were still debating on the hype created by M2M; another avatar has
emerged that could potentially change the rules of the business: The Wearable Technology.
Wearable Technology
It represents the next-generation of connected gadgets or devices (earlier witnessed in the sci-fi movies)
that a user would wear for an extended period of time, which significantly enhancing the user’s
experience about self or the surrounding environment. A wearable device would typically include a
sensor(s) (with minimal level of independent processing capability), a wireless connectivity, a power
support and a user-interface or display where the user can interpret the data (raw or processed).
Sensors
To record or process one-
to-many dimensional data
like visual, motion, location
or biometric
Battery / Power
To provide the necessary
power backup to run the
software while the device is
still mobile (with its’ user)
User Interface
The primary user interface
to assess raw or processed
data either over the device
display, over a Smart
phone app and/or a
desktop application
Network / Connectivity
To communicate the data
over a network: wireless
(Bluetooth, Wi-Fi) or fixed
communication
Innovation prospers when ideas are conceptualized taking due cognizance of the consumer behaviour.
Technological evolution has, therefore, provided a new meaning to the hitherto wearables: watch,
spectacles, clothes, pendants, rings, etc.
Popular Wearables across Human body parts:
 Wrist wear: Wrist wear computers, Smart watches, Bracelets
 Eye wear: Smart glasses or goggles, contact lenses
 Foot wear: Sports or activity sensors
 Neck wear: Pendant or jewellery wear
 Chest wear: Heartbeat monitors
 Body wear: Smart fabric, arm or leg wear, smart tattoo on skin
 Others: Ring /finger wear, Smart headsets
Business Drivers: Short to Long term
One of the critical aspects of present-day wearables is the ability to communicate and provide intelligent
or more meaningful data to the user. The significant buzzword here is that “smarter lifestyle requires
smarted devices”. The key success factors for early adoption and sustained usage of wearables includes:
 Unique selling proposition: In a world full of smart phones, wearables come as an additional
cost or addendum device. Each of these wearables may address niche customer segments and
in order to expand the early adopters’ base; targeted communication should be made to
demonstrate the role, the relevance and the uniqueness of these devices. There should be a
proven benefit that the user can relate to, in order to make a purchase decision.
 Lifestyle compatibility: The product should not warrant too many behavioural changes (like
frequent charging or complex setup) to adopt the device. It should provide seamless integration,
connectivity with the destination devices and/or the servers.
 Popular Technology enablement: A closer interaction or interplay with social, mobile, location
and cloud based services makes the product more present day or relevant. “Social motivation” is
one of the required factors that are making wearables in-vogue.
 Design Aesthetics: The aesthetics have a larger role to play when it comes to wearables and
their form factor shouldn’t address technological innovation over fashion & design.
 User Engagement: The product that provides utility but fail to have a meaningful impact on users
for example an activity tracker that provides data but doesn’t inspire action -- end up failing in the
market. If the product is able to instil “habit formation” then only it would lead to long term user
engagement.
Wearables: A specialized diversification
The wearables are finding relevance across multiple industries and opening up a world of opportunities
for the OEMs:
Industry Applications Product Portfolio
Heath care & Medical Vital signs monitoring, in vivo implants,
chronic disease management, brain-eye
movement, geo-tagging, unobtrusive
patient monitoring, self diagnostics
 Bio feedback patch
 Heading aids
 Insulin pump patch
 Wireless ECG Headset
Wellness Physiological monitoring, weight /
energy monitoring, posture correction
(general / driving), interactive
instructions
 Sleep / emotion / stress tracker
 Sensor bands / connected bracelet
Sports / Fitness Sports performance, fitness monitoring,
virtual coaching, outdoor navigation /
location tracking or sharing, activity
tracking, goal monitoring / management
 Activity Tracker
 Heat rate monitor / BioHarness
 Heated Jacket
 Smart shoes
 GPS Ski Mask
Infotainment &
Communication
Data, voice/video & media access,
email/text/messaging, social media,
share experience, organizer, interactive
gaming, real time information /
navigation
 Smart Watches
 Smart Glasses / Goggles
 Heads-up display
 Augmented Reality Gaming
Industrial & Military Responsive / aided learning, quality
control & security, real time information
/ navigation, communication, work force
automation, military / emergency
services, identity recognition, rescue /
tracking, remote monitoring,
 Hand worn terminals
 Hand scanners
 Smart clothing
 Smart Glasses / Goggles
 Heads-up display
Security & Safety Emergency services, identity
recognition, remote monitoring, security
profiling, real-time data, hazmat
detection
 Connected fire-fighting jacket
 Biometric insoles
 Handheld scanners
 Personal locator beacon
Source: IHS Electronic Media, Beecham Research (2013)
Wearables: The new threat to the Smart Phones?
Experts are debating if wearables would cause the
future displacement of presently popular smart phones
and in the process pose a threat to the technological
evolution of smart phones. A pure-play M2M device is
self sufficient and has the capability to communicate
directly with the server (Example: a passenger car
telematics device can automatically send emergency
assistance notification); on the other hand the present-
day wearable devices (Example: a fitness tracker
which can provide user activity summary) leverages
Cloud Web Server
Smart 
Phones 
(Hub)
M2M Device
Cloud
Wearable Device(s)
Web Server
the power of smart phones to communicate to the end server or cloud based application.
The key consideration here is that having cellular connectivity built into wearables makes it a redundant
feature. The wearable devices can connect to the smart phone via Bluetooth (or any other technology),
and send and receive data via the smart phone's Internet connectivity. Also, it would not be prudent to
expect an economic wearable device which is fully loaded and will provide the required battery life and
processing power of that of a smart phone. By offloading processing and connectivity onto a smart phone,
the cost of wearables can come down (considering the price of sensors keeps dropping). Therefore going
forward the smart phone - wearables combination (a symbiotic relationship) maybe more workable. And
multiple wearables can get connected via a single hub device (or the smart phone).
Wearables: What’s in it for the Operators?
The technology industry is bullish on the wearable technology as it has announced that the year 2014 will
be the “Year of the wearables” (during the Consumer Electronics Show and Mobile World Congress
earlier in the year). The operators have a vital role to play in the overall equation of Wearables or M2M
roadmap and should focus on the following considerations going forward:
 Network experience: Though the wearables address only niche customer segments, the network
needs to be planned in accordance with the future data consumption of the tech-savvy customers.
Some of the wearables may introduce different packets which would require prioritization or different
routing. The current model of network testing to assure QoS involves deep network visibility into traffic
and packet inspection. With data traffic almost doubling on an annual basis the testing models need
to be extended further into the network to ensure data delivery.
 Collaboration with Niche Players: In order to provide value addition to the subscribers (similar to
VAS), operators have to collaborate and define innovative business models with niche players so as
to provide specialized device and subscription based services. The operators can also leverage their
enterprise services to offer cloud based services to these players.
 Heterogeneous Networks: Considering higher frequency bands for the next generation data
technologies (3G/LTE/BWA); the operators need to ensure efficient and seamless indoor coverage by
deploying small cells, DAS or Wi-Fi hotshots.
 Bundled Offering: The operators have become the launch pad for most of the Smart phone OEMs
and wearables are being positioned as a bundled offering. The operators can thus leverage their
distribution and marketing skills to further cross-sell the wearables.
By ensuring an optimal network and providing a bouquet of technology devices; the Operators can define
a win-win value proposition with key players in the Wearables value chain. Needless to mention, a larger
portfolio of “always connected” devices would further enhance the data revenues and add to customer
loyalty & experience.

More Related Content

What's hot

Digital Platforms | Digital Transformation | Intense Technologies
Digital Platforms | Digital Transformation | Intense TechnologiesDigital Platforms | Digital Transformation | Intense Technologies
Digital Platforms | Digital Transformation | Intense Technologies
Intense Technologies Limited
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
reneznet105
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
reneznet105
 
Top Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
Louis F Vargas Business Development•Marketing Executive
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
reneznet105
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
reneznet105
 
IOT Environment & Business Value
IOT Environment & Business ValueIOT Environment & Business Value
IOT Environment & Business Value
Mahua Chatterjee
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
Social Friendly
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
Mahbubul Alam
 
Mec@CES 2016 - Key Takeaways
Mec@CES 2016 - Key TakeawaysMec@CES 2016 - Key Takeaways
Mec@CES 2016 - Key Takeaways
MEC_Interaction
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
openi_ict
 
DWX2018 IoT lecture
DWX2018 IoT lectureDWX2018 IoT lecture
DWX2018 IoT lecture
Alon Fliess
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
EMC
 
Connecting the Everyday: How the Internet of Things is Reshaping our World
Connecting the Everyday: How the Internet of Things is Reshaping our WorldConnecting the Everyday: How the Internet of Things is Reshaping our World
Connecting the Everyday: How the Internet of Things is Reshaping our World
Ericsson
 
WiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-OperatorsWiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-Operators
Green Packet
 
M2M for slideshare
M2M for slideshareM2M for slideshare
M2M for slideshareBillingViews
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 
2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms
CM Research
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart cities
Soumya Kanti Datta
 

What's hot (19)

Digital Platforms | Digital Transformation | Intense Technologies
Digital Platforms | Digital Transformation | Intense TechnologiesDigital Platforms | Digital Transformation | Intense Technologies
Digital Platforms | Digital Transformation | Intense Technologies
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Top Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 articleTop Tech & Business Trends for 2017 article
Top Tech & Business Trends for 2017 article
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
IOT Environment & Business Value
IOT Environment & Business ValueIOT Environment & Business Value
IOT Environment & Business Value
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
 
Mec@CES 2016 - Key Takeaways
Mec@CES 2016 - Key TakeawaysMec@CES 2016 - Key Takeaways
Mec@CES 2016 - Key Takeaways
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
 
DWX2018 IoT lecture
DWX2018 IoT lectureDWX2018 IoT lecture
DWX2018 IoT lecture
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Connecting the Everyday: How the Internet of Things is Reshaping our World
Connecting the Everyday: How the Internet of Things is Reshaping our WorldConnecting the Everyday: How the Internet of Things is Reshaping our World
Connecting the Everyday: How the Internet of Things is Reshaping our World
 
WiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-OperatorsWiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-Operators
 
M2M for slideshare
M2M for slideshareM2M for slideshare
M2M for slideshare
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 
2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart cities
 

Viewers also liked

Parcial informática
Parcial informáticaParcial informática
Parcial informática
Joaquín Rodíguez Martínez
 
распечатываем презентацию
распечатываем презентациюраспечатываем презентацию
распечатываем презентацию
sofiaislevskaya
 
Minister of BJP
Minister of BJPMinister of BJP
Minister of BJP
kalajain123
 
TIK Bab 1 Kelas 9 Semester 1
TIK Bab 1 Kelas 9 Semester 1TIK Bab 1 Kelas 9 Semester 1
TIK Bab 1 Kelas 9 Semester 1
Alfina Putri Darmanto
 
Система фасадных навесных модулей G-tech
Система фасадных навесных модулей G-techСистема фасадных навесных модулей G-tech
Система фасадных навесных модулей G-tech
Татьяна Гусева
 
Conferencia 1 La identidad
Conferencia 1   La identidadConferencia 1   La identidad
Conferencia 1 La identidad
Meritxell Castells
 
20160917 ocif LT_きんにく
20160917 ocif LT_きんにく20160917 ocif LT_きんにく
20160917 ocif LT_きんにく
Yuuki Mori
 
SIGA casos prácticos
SIGA casos prácticosSIGA casos prácticos
SIGA casos prácticos
RC Consulting
 
Strengthening Child Participation in AU Peace Support Operations Project
Strengthening Child Participation in AU Peace Support Operations ProjectStrengthening Child Participation in AU Peace Support Operations Project
Strengthening Child Participation in AU Peace Support Operations Project
rmcpu
 
Ways to improve Social enterpreurship in Ethiopian Dairy Farming
Ways to improve Social enterpreurship in Ethiopian Dairy Farming Ways to improve Social enterpreurship in Ethiopian Dairy Farming
Ways to improve Social enterpreurship in Ethiopian Dairy Farming
Daniel Temesgen Gelan
 

Viewers also liked (14)

Parcial informática
Parcial informáticaParcial informática
Parcial informática
 
Marwiyah 21313 167_a
Marwiyah 21313 167_aMarwiyah 21313 167_a
Marwiyah 21313 167_a
 
GoInnovate! Brochure
GoInnovate! BrochureGoInnovate! Brochure
GoInnovate! Brochure
 
распечатываем презентацию
распечатываем презентациюраспечатываем презентацию
распечатываем презентацию
 
Minister of BJP
Minister of BJPMinister of BJP
Minister of BJP
 
TIK Bab 1 Kelas 9 Semester 1
TIK Bab 1 Kelas 9 Semester 1TIK Bab 1 Kelas 9 Semester 1
TIK Bab 1 Kelas 9 Semester 1
 
55750-FLIER
55750-FLIER55750-FLIER
55750-FLIER
 
Система фасадных навесных модулей G-tech
Система фасадных навесных модулей G-techСистема фасадных навесных модулей G-tech
Система фасадных навесных модулей G-tech
 
Conferencia 1 La identidad
Conferencia 1   La identidadConferencia 1   La identidad
Conferencia 1 La identidad
 
20160917 ocif LT_きんにく
20160917 ocif LT_きんにく20160917 ocif LT_きんにく
20160917 ocif LT_きんにく
 
SIGA casos prácticos
SIGA casos prácticosSIGA casos prácticos
SIGA casos prácticos
 
Strengthening Child Participation in AU Peace Support Operations Project
Strengthening Child Participation in AU Peace Support Operations ProjectStrengthening Child Participation in AU Peace Support Operations Project
Strengthening Child Participation in AU Peace Support Operations Project
 
lucky report
lucky reportlucky report
lucky report
 
Ways to improve Social enterpreurship in Ethiopian Dairy Farming
Ways to improve Social enterpreurship in Ethiopian Dairy Farming Ways to improve Social enterpreurship in Ethiopian Dairy Farming
Ways to improve Social enterpreurship in Ethiopian Dairy Farming
 

Similar to Asian Giants Catching Up with the Global LTE Leaders

Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radar
iosrjce
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
Wavestone
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
XDuce Corporation
 
Mobile security
Mobile securityMobile security
Mobile security
Saieesha Chitoori
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
XDuce Corporation
 
Internet of things
Internet of thingsInternet of things
Internet of things
Devdutta Chakrabarti
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Wheatstone
 
Wearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital FrontierWearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital Frontier
Cognizant
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Connected Products for the Industrial World
Connected Products for the Industrial WorldConnected Products for the Industrial World
Connected Products for the Industrial World
Cognizant
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloud
ijtsrd
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
Claudia Toscano
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaNetcetera
 
Wearable Devices: The Next Big Thing in CRM
Wearable Devices: The Next Big Thing in CRMWearable Devices: The Next Big Thing in CRM
Wearable Devices: The Next Big Thing in CRM
Cognizant
 
Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
Louis F Vargas Business Development•Marketing Executive
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
IT trends – 2013 & beyond
IT trends – 2013 & beyondIT trends – 2013 & beyond
IT trends – 2013 & beyond
Neha Mehta
 

Similar to Asian Giants Catching Up with the Global LTE Leaders (20)

Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radar
 
SCMR.Wearables
SCMR.WearablesSCMR.Wearables
SCMR.Wearables
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Mobile security
Mobile securityMobile security
Mobile security
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Wearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital FrontierWearable Technology: Automotive's Next Digital Frontier
Wearable Technology: Automotive's Next Digital Frontier
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Connected Products for the Industrial World
Connected Products for the Industrial WorldConnected Products for the Industrial World
Connected Products for the Industrial World
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloud
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberla
 
Wearable Devices: The Next Big Thing in CRM
Wearable Devices: The Next Big Thing in CRMWearable Devices: The Next Big Thing in CRM
Wearable Devices: The Next Big Thing in CRM
 
Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017Top 20 Tech & Business Trends for 2017
Top 20 Tech & Business Trends for 2017
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
IT trends – 2013 & beyond
IT trends – 2013 & beyondIT trends – 2013 & beyond
IT trends – 2013 & beyond
 

More from Sohag Sarkar

Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag SarkarBlockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
Sohag Sarkar
 
Live Streaming becomes Mainstream by Sohag Sarkar
Live Streaming becomes Mainstream by Sohag SarkarLive Streaming becomes Mainstream by Sohag Sarkar
Live Streaming becomes Mainstream by Sohag Sarkar
Sohag Sarkar
 
From Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
From Gloom to Boom: The Return of the growing Telecom Market by Sohag SarkarFrom Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
From Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
Sohag Sarkar
 
The Spectrum Auction: Survival of the richest? by Sohag Sarkar
The Spectrum Auction: Survival of the richest? by Sohag SarkarThe Spectrum Auction: Survival of the richest? by Sohag Sarkar
The Spectrum Auction: Survival of the richest? by Sohag Sarkar
Sohag Sarkar
 
Rise of the wearables by sohag sarkar (april 2014)
Rise of the wearables by sohag sarkar (april 2014)Rise of the wearables by sohag sarkar (april 2014)
Rise of the wearables by sohag sarkar (april 2014)Sohag Sarkar
 
Exuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
Exuberance of Prowess: Spectrum Auction 2014 by Sohag SarkarExuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
Exuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
Sohag Sarkar
 
Indian Telecom in 2014: Marching towards glory or willfully retreating back
Indian Telecom in 2014: Marching towards glory or willfully retreating backIndian Telecom in 2014: Marching towards glory or willfully retreating back
Indian Telecom in 2014: Marching towards glory or willfully retreating back
Sohag Sarkar
 
Plunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
Plunging Currency in Times of Growing Telecom Industry by Sohag SarkarPlunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
Plunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
Sohag Sarkar
 
Art of Business Transformation by Sohag Sarkar
Art of Business Transformation by Sohag SarkarArt of Business Transformation by Sohag Sarkar
Art of Business Transformation by Sohag Sarkar
Sohag Sarkar
 
Curious Case of Indian Telecom Industry by Sohag Sarkar
Curious Case of Indian Telecom Industry by Sohag SarkarCurious Case of Indian Telecom Industry by Sohag Sarkar
Curious Case of Indian Telecom Industry by Sohag Sarkar
Sohag Sarkar
 
Monetization of Mobile Social Media in India
Monetization of Mobile Social Media in IndiaMonetization of Mobile Social Media in India
Monetization of Mobile Social Media in India
Sohag Sarkar
 
Telecom Outlook 2011-12 by Sohag Sarkar
Telecom Outlook 2011-12 by Sohag SarkarTelecom Outlook 2011-12 by Sohag Sarkar
Telecom Outlook 2011-12 by Sohag Sarkar
Sohag Sarkar
 
3G in India by Sohag Sarkar
3G in India by Sohag Sarkar3G in India by Sohag Sarkar
3G in India by Sohag Sarkar
Sohag Sarkar
 
Kiosks in India by Sohag Sarkar
Kiosks in India by Sohag SarkarKiosks in India by Sohag Sarkar
Kiosks in India by Sohag Sarkar
Sohag Sarkar
 
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
Sohag Sarkar
 
Telecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag SarkarTelecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag Sarkar
Sohag Sarkar
 
Using E Commerce To Fuel Rural Growth In India by Sohag Sarkar
Using E Commerce To Fuel Rural Growth In India by Sohag SarkarUsing E Commerce To Fuel Rural Growth In India by Sohag Sarkar
Using E Commerce To Fuel Rural Growth In India by Sohag Sarkar
Sohag Sarkar
 
Impact Of Celebrity Endorsement By Sohag Sarkar
Impact Of Celebrity Endorsement By Sohag SarkarImpact Of Celebrity Endorsement By Sohag Sarkar
Impact Of Celebrity Endorsement By Sohag Sarkar
Sohag Sarkar
 
The Indian Telecom Success Story
The Indian Telecom Success StoryThe Indian Telecom Success Story
The Indian Telecom Success Story
Sohag Sarkar
 
India Telecom 2010 Report titled Broadband for All
India Telecom 2010 Report titled Broadband for AllIndia Telecom 2010 Report titled Broadband for All
India Telecom 2010 Report titled Broadband for All
Sohag Sarkar
 

More from Sohag Sarkar (20)

Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag SarkarBlockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
Blockchain in Telecom - Blockchain Summit Melbourne 2017 - Speaker: Sohag Sarkar
 
Live Streaming becomes Mainstream by Sohag Sarkar
Live Streaming becomes Mainstream by Sohag SarkarLive Streaming becomes Mainstream by Sohag Sarkar
Live Streaming becomes Mainstream by Sohag Sarkar
 
From Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
From Gloom to Boom: The Return of the growing Telecom Market by Sohag SarkarFrom Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
From Gloom to Boom: The Return of the growing Telecom Market by Sohag Sarkar
 
The Spectrum Auction: Survival of the richest? by Sohag Sarkar
The Spectrum Auction: Survival of the richest? by Sohag SarkarThe Spectrum Auction: Survival of the richest? by Sohag Sarkar
The Spectrum Auction: Survival of the richest? by Sohag Sarkar
 
Rise of the wearables by sohag sarkar (april 2014)
Rise of the wearables by sohag sarkar (april 2014)Rise of the wearables by sohag sarkar (april 2014)
Rise of the wearables by sohag sarkar (april 2014)
 
Exuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
Exuberance of Prowess: Spectrum Auction 2014 by Sohag SarkarExuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
Exuberance of Prowess: Spectrum Auction 2014 by Sohag Sarkar
 
Indian Telecom in 2014: Marching towards glory or willfully retreating back
Indian Telecom in 2014: Marching towards glory or willfully retreating backIndian Telecom in 2014: Marching towards glory or willfully retreating back
Indian Telecom in 2014: Marching towards glory or willfully retreating back
 
Plunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
Plunging Currency in Times of Growing Telecom Industry by Sohag SarkarPlunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
Plunging Currency in Times of Growing Telecom Industry by Sohag Sarkar
 
Art of Business Transformation by Sohag Sarkar
Art of Business Transformation by Sohag SarkarArt of Business Transformation by Sohag Sarkar
Art of Business Transformation by Sohag Sarkar
 
Curious Case of Indian Telecom Industry by Sohag Sarkar
Curious Case of Indian Telecom Industry by Sohag SarkarCurious Case of Indian Telecom Industry by Sohag Sarkar
Curious Case of Indian Telecom Industry by Sohag Sarkar
 
Monetization of Mobile Social Media in India
Monetization of Mobile Social Media in IndiaMonetization of Mobile Social Media in India
Monetization of Mobile Social Media in India
 
Telecom Outlook 2011-12 by Sohag Sarkar
Telecom Outlook 2011-12 by Sohag SarkarTelecom Outlook 2011-12 by Sohag Sarkar
Telecom Outlook 2011-12 by Sohag Sarkar
 
3G in India by Sohag Sarkar
3G in India by Sohag Sarkar3G in India by Sohag Sarkar
3G in India by Sohag Sarkar
 
Kiosks in India by Sohag Sarkar
Kiosks in India by Sohag SarkarKiosks in India by Sohag Sarkar
Kiosks in India by Sohag Sarkar
 
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
The Art of Socializing, Mobilizing, Localizing, & Monetizing: An Outlook on L...
 
Telecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag SarkarTelecom Billing Solutions By Sohag Sarkar
Telecom Billing Solutions By Sohag Sarkar
 
Using E Commerce To Fuel Rural Growth In India by Sohag Sarkar
Using E Commerce To Fuel Rural Growth In India by Sohag SarkarUsing E Commerce To Fuel Rural Growth In India by Sohag Sarkar
Using E Commerce To Fuel Rural Growth In India by Sohag Sarkar
 
Impact Of Celebrity Endorsement By Sohag Sarkar
Impact Of Celebrity Endorsement By Sohag SarkarImpact Of Celebrity Endorsement By Sohag Sarkar
Impact Of Celebrity Endorsement By Sohag Sarkar
 
The Indian Telecom Success Story
The Indian Telecom Success StoryThe Indian Telecom Success Story
The Indian Telecom Success Story
 
India Telecom 2010 Report titled Broadband for All
India Telecom 2010 Report titled Broadband for AllIndia Telecom 2010 Report titled Broadband for All
India Telecom 2010 Report titled Broadband for All
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Asian Giants Catching Up with the Global LTE Leaders

  • 1. The Rise of the Wearables: Adding new fillip to M2M By Sohag Sarkar (Manager - Strategy & Operations, KPMG Advisory Services) Introduction Over the last couple of years the term M2M (aka Machine-to-Machine) has become clichéd. In literary sense it would mean the flow of data between machine-to-machine and ultimately machine-to-user. The data would flow from a machine over a network, and then through a gateway to a system where it can be analyzed and acted upon. The critics were still debating on the hype created by M2M; another avatar has emerged that could potentially change the rules of the business: The Wearable Technology. Wearable Technology It represents the next-generation of connected gadgets or devices (earlier witnessed in the sci-fi movies) that a user would wear for an extended period of time, which significantly enhancing the user’s experience about self or the surrounding environment. A wearable device would typically include a sensor(s) (with minimal level of independent processing capability), a wireless connectivity, a power support and a user-interface or display where the user can interpret the data (raw or processed). Sensors To record or process one- to-many dimensional data like visual, motion, location or biometric Battery / Power To provide the necessary power backup to run the software while the device is still mobile (with its’ user) User Interface The primary user interface to assess raw or processed data either over the device display, over a Smart phone app and/or a desktop application Network / Connectivity To communicate the data over a network: wireless (Bluetooth, Wi-Fi) or fixed communication Innovation prospers when ideas are conceptualized taking due cognizance of the consumer behaviour. Technological evolution has, therefore, provided a new meaning to the hitherto wearables: watch, spectacles, clothes, pendants, rings, etc.
  • 2. Popular Wearables across Human body parts:  Wrist wear: Wrist wear computers, Smart watches, Bracelets  Eye wear: Smart glasses or goggles, contact lenses  Foot wear: Sports or activity sensors  Neck wear: Pendant or jewellery wear  Chest wear: Heartbeat monitors  Body wear: Smart fabric, arm or leg wear, smart tattoo on skin  Others: Ring /finger wear, Smart headsets Business Drivers: Short to Long term One of the critical aspects of present-day wearables is the ability to communicate and provide intelligent or more meaningful data to the user. The significant buzzword here is that “smarter lifestyle requires smarted devices”. The key success factors for early adoption and sustained usage of wearables includes:  Unique selling proposition: In a world full of smart phones, wearables come as an additional cost or addendum device. Each of these wearables may address niche customer segments and in order to expand the early adopters’ base; targeted communication should be made to demonstrate the role, the relevance and the uniqueness of these devices. There should be a proven benefit that the user can relate to, in order to make a purchase decision.  Lifestyle compatibility: The product should not warrant too many behavioural changes (like frequent charging or complex setup) to adopt the device. It should provide seamless integration, connectivity with the destination devices and/or the servers.  Popular Technology enablement: A closer interaction or interplay with social, mobile, location and cloud based services makes the product more present day or relevant. “Social motivation” is one of the required factors that are making wearables in-vogue.  Design Aesthetics: The aesthetics have a larger role to play when it comes to wearables and their form factor shouldn’t address technological innovation over fashion & design.  User Engagement: The product that provides utility but fail to have a meaningful impact on users for example an activity tracker that provides data but doesn’t inspire action -- end up failing in the market. If the product is able to instil “habit formation” then only it would lead to long term user engagement.
  • 3. Wearables: A specialized diversification The wearables are finding relevance across multiple industries and opening up a world of opportunities for the OEMs: Industry Applications Product Portfolio Heath care & Medical Vital signs monitoring, in vivo implants, chronic disease management, brain-eye movement, geo-tagging, unobtrusive patient monitoring, self diagnostics  Bio feedback patch  Heading aids  Insulin pump patch  Wireless ECG Headset Wellness Physiological monitoring, weight / energy monitoring, posture correction (general / driving), interactive instructions  Sleep / emotion / stress tracker  Sensor bands / connected bracelet Sports / Fitness Sports performance, fitness monitoring, virtual coaching, outdoor navigation / location tracking or sharing, activity tracking, goal monitoring / management  Activity Tracker  Heat rate monitor / BioHarness  Heated Jacket  Smart shoes  GPS Ski Mask Infotainment & Communication Data, voice/video & media access, email/text/messaging, social media, share experience, organizer, interactive gaming, real time information / navigation  Smart Watches  Smart Glasses / Goggles  Heads-up display  Augmented Reality Gaming Industrial & Military Responsive / aided learning, quality control & security, real time information / navigation, communication, work force automation, military / emergency services, identity recognition, rescue / tracking, remote monitoring,  Hand worn terminals  Hand scanners  Smart clothing  Smart Glasses / Goggles  Heads-up display Security & Safety Emergency services, identity recognition, remote monitoring, security profiling, real-time data, hazmat detection  Connected fire-fighting jacket  Biometric insoles  Handheld scanners  Personal locator beacon Source: IHS Electronic Media, Beecham Research (2013) Wearables: The new threat to the Smart Phones? Experts are debating if wearables would cause the future displacement of presently popular smart phones and in the process pose a threat to the technological evolution of smart phones. A pure-play M2M device is self sufficient and has the capability to communicate directly with the server (Example: a passenger car telematics device can automatically send emergency assistance notification); on the other hand the present- day wearable devices (Example: a fitness tracker which can provide user activity summary) leverages Cloud Web Server Smart  Phones  (Hub) M2M Device Cloud Wearable Device(s) Web Server
  • 4. the power of smart phones to communicate to the end server or cloud based application. The key consideration here is that having cellular connectivity built into wearables makes it a redundant feature. The wearable devices can connect to the smart phone via Bluetooth (or any other technology), and send and receive data via the smart phone's Internet connectivity. Also, it would not be prudent to expect an economic wearable device which is fully loaded and will provide the required battery life and processing power of that of a smart phone. By offloading processing and connectivity onto a smart phone, the cost of wearables can come down (considering the price of sensors keeps dropping). Therefore going forward the smart phone - wearables combination (a symbiotic relationship) maybe more workable. And multiple wearables can get connected via a single hub device (or the smart phone). Wearables: What’s in it for the Operators? The technology industry is bullish on the wearable technology as it has announced that the year 2014 will be the “Year of the wearables” (during the Consumer Electronics Show and Mobile World Congress earlier in the year). The operators have a vital role to play in the overall equation of Wearables or M2M roadmap and should focus on the following considerations going forward:  Network experience: Though the wearables address only niche customer segments, the network needs to be planned in accordance with the future data consumption of the tech-savvy customers. Some of the wearables may introduce different packets which would require prioritization or different routing. The current model of network testing to assure QoS involves deep network visibility into traffic and packet inspection. With data traffic almost doubling on an annual basis the testing models need to be extended further into the network to ensure data delivery.  Collaboration with Niche Players: In order to provide value addition to the subscribers (similar to VAS), operators have to collaborate and define innovative business models with niche players so as to provide specialized device and subscription based services. The operators can also leverage their enterprise services to offer cloud based services to these players.  Heterogeneous Networks: Considering higher frequency bands for the next generation data technologies (3G/LTE/BWA); the operators need to ensure efficient and seamless indoor coverage by deploying small cells, DAS or Wi-Fi hotshots.  Bundled Offering: The operators have become the launch pad for most of the Smart phone OEMs and wearables are being positioned as a bundled offering. The operators can thus leverage their distribution and marketing skills to further cross-sell the wearables. By ensuring an optimal network and providing a bouquet of technology devices; the Operators can define a win-win value proposition with key players in the Wearables value chain. Needless to mention, a larger portfolio of “always connected” devices would further enhance the data revenues and add to customer loyalty & experience.