SlideShare a Scribd company logo
1
M2M SUMMARY FOR ALL
Though M2M exist since many years, as many new technologies entered into market takes time to be
accepted, adapt and matured, it is becoming more popular day by day.
One of the reasons why it took so much time to be accepted is that the GSM operator were happy
with their voice ARPU’s. However after the liberation of telecom services and the entrance of new GSM
players into market beside the incumbents, ARPU’s have gone down. GSM operators had to find new
sources of income. Value added services were one of many. At this point M2M services started to take off.
However now wee are at the turning point for M2M users with the new MVNO players.
As can be guessed GSM operators are not willing to share voice and SMS incomes with MNVO’s.
Therefore, MVNO’s are bound by basically with M2M solutions. We think that this is where MVNO’s may
pass operators.
Some of the possible M2M applications MVNO’s will provide beside the GSM operators are as
follows:
Fleet Management
Using automated GPS technology, companies can remotely locate, navigate and track their fleet
vehicles, to improve management and customer service. Mobile assets can be tracked not only for location,
but also for vehicle performance and driver safety.
Security:
The Security market is arguably the largest M2M segment to date, primarily with the adoption of
wireless technology based on antiquated analog cellular and proprietary data networks. Most of these security
applications have been designed to eliminate fixed line services to transmit alarm information to an alarm
company. But, the shutdown of the analog networks in 2008, coupled with customer demand for higher
value services including video monitoring is driving rapid migration to flexible digital network approaches.
According to ABI Research, the North American market for home security systems will reach almost 10
million devices by 2010. However, the real growth in Security will shift to digital wireless as the preferred
network technology as the legacy networks are retired and new security applications drive the bandwidth
requirement far beyond that supported on those older networks.
2
Beyond basic alarm, monitoring, new capabilities are being added to enhance and improve security
solutions. The use of video and still picture transmission allows alarm and security companies to view a
location, in real-time, prior to taking action. This allows false alarms to be disregarded without incurring the
cost of going to the location as well as avoiding false law enforcement dispatch. In addition, user interaction
with home or business security systems, via any mobile device, will allow for notifications to a mobile phone
as well as remote user control.
Healthcare and Telemedicine
Patients can be remotely monitored from their homes, with medical professionals able to monitor
diabetes, cardiac issues, prescription usage, and many other conditions and concerns
Vending
Inventory management, remote monitoring, alarm status, security, cash shortages and fleet
management are some of the important aspects of vending machine management. M2M applications can
improve that management, enhance customer service, assure consistent inventories, and enable companies to
pay the greatest attention to their high-revenue brands.
Digital Signage
This is the delivery of strategic information when and where it is needed. These solutions are popular
in markets such as retail, leisure, sports, security, traffic management and others, with innovations such as
video messaging, communication of important or entertaining real-time information, and mobile advertising.
Public transport
Organizations can better manage their vehicles through M2M solutions that leverage GPS technology
for location, navigation, and vehicle movement. The status of the vehicles can be gauged remotely to
minimize out-of-service time and improve driver safety.
Remote Monitoring and Control
M2M takes traditional applications such as SCADA, building automation, and remote diagnostics to
the next level. Today’s embedded routers and modems help assure reliable connectivity for critical
applications. Time and cost limited the actual amount of monitoring that could be accomplished, with
systems largely limited to occasional inspections by humans, with those sites that absolutely required
3
monitoring paying a high price. The use of M2M wireless technology, able to be delivered in often hostile
locations, yet with low power devices, both facilitates reduced monitoring costs while increasing the amount
of data that can be captured and transmitted. As Environmental Protection Agency (EPA) initiatives increase
the pressure on industry to report and file detailed and regular – not simply exception – reports on critical
facilities, wireless M2M is the obvious answer. One of the ‘original’ M2M markets, SCADA (Supervisory,
Control and Data Acquisition) control systems have been widely used in oil, gas and other process
management industries for more than 15 years. However, Industrial Monitoring and Control is a rapidly
growing M2M segment that is predicted to grow annually by almost 35% through 2010 to an estimated 5.76
million devices (ABI Research). Through SCADA standards, M2M technology is being used to extract data
from non-IT devices such as electrical, gas and oil meters as well as a myriad of other devices and deliver the
data to critical business and monitoring systems.
The ability to monitor and control electrical power systems, water, oil and gas networks provides
utility industries with a more cost-effective way to measure utilization (in real time), the ability to manage
supply and demand and to more effectively anticipate, identify and fix problems. The cost savings associated
with measuring utilization and providing maintenance functions is greatly enhanced when meters and other
network elements are in remote or hard-to-reach locations.
Harbor Research has called this “Pervasive Intelligence”; allowing businesses to make immediate decisions
based on accurate, real-time, data.
Nevertheless, this market is broadening to also include the use of a wireless networks to connect
specialized devices in a variety of new businesses, from retail outlets and fast-food restaurants to major
production and business facilities. For example, Burger King has implemented wireless M2M solutions where
devices capture alarms, send notifications, receive and process remote energy and security information and
then uploads this to centralized business systems. The implementation of these solutions drives cost savings
associated with energy efficiency, reduced peak demands and protection of perishable inventory or any other
asset that may negatively impacted by loss of electricity, refrigeration or light.
The use of M2M technology in Environmental monitoring has started expanding significantly, as wireless
technology is being applied to more and more monitoring applications. There are many already in early
adoption phases, using M2M technology:
• Measurement of air quality
• Irrigation, temperature and chemical monitoring
• Collection of water samples in rivers, lakes and even coral reefs
• Monitoring of gas and pollutant levels in landfills
• Measuring of water levels in wastewater treatment
4
• Flood management of bacterial and water levels
In the case of air quality and many other environmental conditions, the monitoring is required and
regulated by the EPA and other government agencies. Compliance to regulations at the lowest possible cost
will continue to drive the adoption of M2M technology as will the ability to more quickly identify and
respond to events where out-of-control conditions could be dangerous to people or property.
Automatic Teller Machines/Point of Sale
Wireless M2M communication can increase transaction speeds and enable new products such as
wireless card transactions, tableside payment, and more.
Public safety
M2M solutions help assure that the wireless equipment used by first responders and others is
operational at all times, as well as manage medical equipment, vehicles, and more.
Utilities
M2M enables a vast range of utility, SmartGrid, and automated metering applications. Customers
can use these applications to remotely monitor critical utility applications and track, monitor, and manage
assets.
Asset tracking
Asset tracking permits a user to determine the locations of virtually any type of asset 7x24 anywhere
in the world. Businesses can track delivery and repair vehicles, cargo containers, construction equipment and
even its own personnel, especially those living or working in areas where there is threat of crime or
kidnapping.
For businesses and consumers, the asset tracking provides the functionality known as “geo-fencing”.
This allows the user to set a “logical fence” as a boundary. If the asset goes outside of the boundary, the user is
immediately notified via a message (call, email, text). This is useful in terms of theft protection. One
application of particular focus for SkyTrace is tracking laptops. This application is material due to the theft in
the market. Some statistics to support this effort are:
• Safeware The Insurance Agency claims that over 600,000 laptops are stolen annually, resulting in
an estimated $5.4 billion loss of proprietary information.
• According to the FBI, 97% of stolen computers are never recovered.
5
• Laptop theft accounted for 50% of reported security attacks. CSI, The 12th Annual Computer
Crime and Security Survey, 2007
• Lost or stolen laptops and mobile devices are the most frequent cause of a data breach, accounting
for 49% of data breaches in 2007. Ponemon Institute, U.S. Costs of a Data Breach, November 2007
• 12,000 laptops are lost in U.S. airports each week, and two-thirds are never returned. (Dell &
Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008)
Cargo / Asset Protection
• Web or PDA Web locate capabilities – immediate results
• Can also locate from cell phone for immediate results
• Geo-Fence – pre-set border control by the user
• Connect with expensive shipping materials that require security measures
Telematics
Public Transportation Management, Intelligent Transportation Systems (ITS), workflow, mobile job
planning, M2M Applications – Pay As You Drive.
Here is a true M2M Application that is being rolled out commercially that will impact you. The
application allows users to pay for car insurance based on usage. You pay for as much as you consume – you
drive 100 miles you pay insurance for 100 miles – you drive 100,000 miles you pay insurance for 100,000
miles. This is could change the face of the car insurance industry and if widely adopted / deployed on a
standardized platform will allow other ancillary products and services to be offered to car drivers – Internet,
Yellow Pages, Drive By/Localized Ad’s (won’t we love that), Streaming Music (everyone one wants a radio
on the car) and more.
The application (PAYD) as you go is being used by insures in UK/Europe to offer drivers a means to
pay for insurance based on actual miles driven. The cars have a built in GPS system that track the movement
of the vehicle in real time – where you drive, when you drive and how often you drive (AKA Big Brother).
Cool technology concept – but to make it a commercial success it needs to assuage consumer fears about Big
Brother is watching.
SmartGrid initiative
The Smart Grid refers to the introduction of new information and control technologies to the
electricity system that allow the system to be planned and operated in a dynamically-optimized manner. An
example of such technology is the smart meter, which provides new information and communication ability
6
for utilities to use to better manage and reduce the cost of their business operations. Another example is new
technology that automates and increases the operational efficiency of substations and other parts of the utility
infrastructure.
The smart grid is not limited, however, to infrastructure or the smart meter. It goes into the home
or business by way of new pricing, control, and information options that help users reduce their usage and
their bill. It will also connect to smart appliances that will automatically accept price and control signals that
allow them to be used in a way that better supports grid optimization and attainment of climate change
goals.
Demand Response, for example, is the practice of incentivizing customers to modify their electricity
usage in ways that help make the electric grid more efficient and reliable, particularly during periods of peak
demand. Because demand response reduces peak demand, it complements resources that tend to be available
during off-peak periods, such as wind energy. Demand response, in this way, supports the use of greater
amounts of renewable energy.
The smart grid also includes important new technologies such as energy storage and plug-in hybrid
electric vehicles (PHEVs). Energy storage is a form of demand response that allows renewable energy to be
used not only when it is produced but also when it is needed. With storage options, peak demand can be met
by renewable energy generated during off-peak periods. PHEVs, meanwhile, have the potential to be mobile
energy storage units. They charge from the grid, store electricity they don’t use, and have the ability to
return excess electricity to the grid during peak demand periods.

More Related Content

What's hot

My blogs on machine to-machine business solutions
My blogs on machine to-machine business solutionsMy blogs on machine to-machine business solutions
My blogs on machine to-machine business solutions
Kishore Jethanandani, MBA, MA, MPhil,
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in Nigeria
IRJET Journal
 
Digital lifestyle evolution
Digital lifestyle evolutionDigital lifestyle evolution
Digital lifestyle evolution
Gareth Price-Jones (PGCert)
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
Parviz Iskhakov, PhD
 
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...Amir Mehdi Ahmadian
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
Prof. Dr. K. Adisesha
 
IoT In Smart Everything
IoT In Smart EverythingIoT In Smart Everything
IoT In Smart Everything
Dr. Shivananda Koteshwar
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
Ahmed Banafa
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Turvallisuus2013
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
Rob Van Den Dam
 
Telecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureTelecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different future
Rob Van Den Dam
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesIDATE DigiWorld
 
B017531518
B017531518B017531518
B017531518
IOSR Journals
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
GSTF
 
Energy Management Services for the Connected Home
Energy Management Services for the Connected HomeEnergy Management Services for the Connected Home
Energy Management Services for the Connected Home
Ericsson
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
Lilian Edwards
 
Global mobile trends
Global mobile trendsGlobal mobile trends
Global mobile trends
Smich Butcharoen
 
Global mobile trends
Global mobile trends Global mobile trends
Global mobile trends
Tuan Anh Nguyen
 
End-to-End M2M, Fifth Edition
End-to-End M2M, Fifth EditionEnd-to-End M2M, Fifth Edition
End-to-End M2M, Fifth Edition
ReportLinker.com
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET Journal
 

What's hot (20)

My blogs on machine to-machine business solutions
My blogs on machine to-machine business solutionsMy blogs on machine to-machine business solutions
My blogs on machine to-machine business solutions
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in Nigeria
 
Digital lifestyle evolution
Digital lifestyle evolutionDigital lifestyle evolution
Digital lifestyle evolution
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
IoT In Smart Everything
IoT In Smart EverythingIoT In Smart Everything
IoT In Smart Everything
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
 
Telecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureTelecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different future
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stages
 
B017531518
B017531518B017531518
B017531518
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Energy Management Services for the Connected Home
Energy Management Services for the Connected HomeEnergy Management Services for the Connected Home
Energy Management Services for the Connected Home
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
Global mobile trends
Global mobile trendsGlobal mobile trends
Global mobile trends
 
Global mobile trends
Global mobile trends Global mobile trends
Global mobile trends
 
End-to-End M2M, Fifth Edition
End-to-End M2M, Fifth EditionEnd-to-End M2M, Fifth Edition
End-to-End M2M, Fifth Edition
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 

Viewers also liked

Integração Postfix Active Directory
Integração Postfix Active DirectoryIntegração Postfix Active Directory
Integração Postfix Active Directory
Thiago Cavalcante
 
спортивное ориентирование
спортивное ориентированиеспортивное ориентирование
спортивное ориентированиеYanina
 
Великий ученый М.В.Ломоносов
Великий ученый М.В.ЛомоносовВеликий ученый М.В.Ломоносов
Великий ученый М.В.ЛомоносовYanina
 
Fuel summary
Fuel summaryFuel summary
Fuel summary
OneChange
 
2В класс
2В класс2В класс
2В классYanina
 
Это интересно!
Это интересно!Это интересно!
Это интересно!Yanina
 
Толерантность, классный час
Толерантность, классный часТолерантность, классный час
Толерантность, классный часYanina
 
Новогоднее предсталение
Новогоднее предсталениеНовогоднее предсталение
Новогоднее предсталениеYanina
 
Краски осени
Краски осениКраски осени
Краски осениYanina
 
St. Valentine's Day
St. Valentine's DaySt. Valentine's Day
St. Valentine's DayYanina
 
Спортивное ориентирование
Спортивное ориентированиеСпортивное ориентирование
Спортивное ориентированиеYanina
 
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
etouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcastetouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcast
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE WebcastSuzanne Carawan
 
Transition from secondary school to adulthood
Transition from secondary school to adulthoodTransition from secondary school to adulthood
Transition from secondary school to adulthoodRita May Tagalog
 
Результаты
РезультатыРезультаты
РезультатыYanina
 
Why do we include students with special needs
Why do we include students with special needsWhy do we include students with special needs
Why do we include students with special needsRita May Tagalog
 
Итоги ученического голосования
Итоги ученического голосованияИтоги ученического голосования
Итоги ученического голосованияYanina
 
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Bach Tran
 

Viewers also liked (20)

Integração Postfix Active Directory
Integração Postfix Active DirectoryIntegração Postfix Active Directory
Integração Postfix Active Directory
 
спортивное ориентирование
спортивное ориентированиеспортивное ориентирование
спортивное ориентирование
 
Великий ученый М.В.Ломоносов
Великий ученый М.В.ЛомоносовВеликий ученый М.В.Ломоносов
Великий ученый М.В.Ломоносов
 
Fuel summary
Fuel summaryFuel summary
Fuel summary
 
2В класс
2В класс2В класс
2В класс
 
Это интересно!
Это интересно!Это интересно!
Это интересно!
 
Толерантность, классный час
Толерантность, классный часТолерантность, классный час
Толерантность, классный час
 
Новогоднее предсталение
Новогоднее предсталениеНовогоднее предсталение
Новогоднее предсталение
 
Краски осени
Краски осениКраски осени
Краски осени
 
St. Valentine's Day
St. Valentine's DaySt. Valentine's Day
St. Valentine's Day
 
Спортивное ориентирование
Спортивное ориентированиеСпортивное ориентирование
Спортивное ориентирование
 
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
etouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcastetouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcast
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
 
Notes forapplefit
Notes forapplefitNotes forapplefit
Notes forapplefit
 
Traumatic brain injury
Traumatic brain injuryTraumatic brain injury
Traumatic brain injury
 
Transition from secondary school to adulthood
Transition from secondary school to adulthoodTransition from secondary school to adulthood
Transition from secondary school to adulthood
 
Результаты
РезультатыРезультаты
Результаты
 
Why do we include students with special needs
Why do we include students with special needsWhy do we include students with special needs
Why do we include students with special needs
 
Итоги ученического голосования
Итоги ученического голосованияИтоги ученического голосования
Итоги ученического голосования
 
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
 
Xtcppitchv3
Xtcppitchv3Xtcppitchv3
Xtcppitchv3
 

Similar to M2 m summary for all

25 sumit 2
25 sumit 225 sumit 2
25 sumit 2SRJIS
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
Martyn Taylor
 
M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter worldScott Pollard
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital Connect
Grafic.guru
 
M2 m communication whitepaper
M2 m communication whitepaperM2 m communication whitepaper
M2 m communication whitepaper
Research48
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementThe Marketing Distillery
 
Always online
Always onlineAlways online
Always online
Juhani Lehtonen
 
Ravi i ot-impact
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impact
skumartarget
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
Martyn Taylor
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
Marc Jadoul
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdf
TarekHassan840678
 
Capgemini ses - smart grid operational services - going mobile is smart fac...
Capgemini   ses - smart grid operational services - going mobile is smart fac...Capgemini   ses - smart grid operational services - going mobile is smart fac...
Capgemini ses - smart grid operational services - going mobile is smart fac...
Gord Reynolds
 
Zpryme Report on Asset Monitoring
Zpryme Report on Asset MonitoringZpryme Report on Asset Monitoring
Zpryme Report on Asset MonitoringPaula Smith
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
Bernard Kufluk
 
Internet of things
Internet of thingsInternet of things
Internet of things
Amol Pawar
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
Qian Li Jin
 

Similar to M2 m summary for all (20)

25 sumit 2
25 sumit 225 sumit 2
25 sumit 2
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
 
M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter world
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital Connect
 
M2 m communication whitepaper
M2 m communication whitepaperM2 m communication whitepaper
M2 m communication whitepaper
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
 
Always online
Always onlineAlways online
Always online
 
Ravi i ot-impact
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impact
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdf
 
Capgemini ses - smart grid operational services - going mobile is smart fac...
Capgemini   ses - smart grid operational services - going mobile is smart fac...Capgemini   ses - smart grid operational services - going mobile is smart fac...
Capgemini ses - smart grid operational services - going mobile is smart fac...
 
Zpryme Report on Asset Monitoring
Zpryme Report on Asset MonitoringZpryme Report on Asset Monitoring
Zpryme Report on Asset Monitoring
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
 

More from Tarik KUCUK

Xtc Pdiscussionv2
Xtc Pdiscussionv2Xtc Pdiscussionv2
Xtc Pdiscussionv2
Tarik KUCUK
 
Xtcp Performance Brochure
Xtcp Performance BrochureXtcp Performance Brochure
Xtcp Performance Brochure
Tarik KUCUK
 
Windesk Porta
Windesk PortaWindesk Porta
Windesk Porta
Tarik KUCUK
 
Windesk Concento
Windesk ConcentoWindesk Concento
Windesk Concento
Tarik KUCUK
 
Windesk Sunum
Windesk SunumWindesk Sunum
Windesk Sunum
Tarik KUCUK
 
Windesk
WindeskWindesk
Windesk
Tarik KUCUK
 
Integra
IntegraIntegra
Integra
Tarik KUCUK
 
Voip
VoipVoip
üRüN Hizmet şEması
üRüN Hizmet şEmasıüRüN Hizmet şEması
üRüN Hizmet şEması
Tarik KUCUK
 
AnkesöR çöZüMü
AnkesöR çöZüMüAnkesöR çöZüMü
AnkesöR çöZüMü
Tarik KUCUK
 
Info Mobil Net
Info Mobil NetInfo Mobil Net
Info Mobil Net
Tarik KUCUK
 
Appy Go
Appy GoAppy Go
Appy Go
Tarik KUCUK
 
Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012
Tarik KUCUK
 
Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3
Tarik KUCUK
 
Agis öZet 2012 Sk
Agis öZet 2012 SkAgis öZet 2012 Sk
Agis öZet 2012 Sk
Tarik KUCUK
 
Telecom dictionary
Telecom dictionaryTelecom dictionary
Telecom dictionary
Tarik KUCUK
 
Web social media strategy sample
Web social media strategy sampleWeb social media strategy sample
Web social media strategy sample
Tarik KUCUK
 
Social media business_tips
Social media business_tipsSocial media business_tips
Social media business_tips
Tarik KUCUK
 
mobile marketing glosaary
mobile marketing glosaarymobile marketing glosaary
mobile marketing glosaary
Tarik KUCUK
 
All It Standards Guidelines And Tools
All It Standards Guidelines And ToolsAll It Standards Guidelines And Tools
All It Standards Guidelines And ToolsTarik KUCUK
 

More from Tarik KUCUK (20)

Xtc Pdiscussionv2
Xtc Pdiscussionv2Xtc Pdiscussionv2
Xtc Pdiscussionv2
 
Xtcp Performance Brochure
Xtcp Performance BrochureXtcp Performance Brochure
Xtcp Performance Brochure
 
Windesk Porta
Windesk PortaWindesk Porta
Windesk Porta
 
Windesk Concento
Windesk ConcentoWindesk Concento
Windesk Concento
 
Windesk Sunum
Windesk SunumWindesk Sunum
Windesk Sunum
 
Windesk
WindeskWindesk
Windesk
 
Integra
IntegraIntegra
Integra
 
Voip
VoipVoip
Voip
 
üRüN Hizmet şEması
üRüN Hizmet şEmasıüRüN Hizmet şEması
üRüN Hizmet şEması
 
AnkesöR çöZüMü
AnkesöR çöZüMüAnkesöR çöZüMü
AnkesöR çöZüMü
 
Info Mobil Net
Info Mobil NetInfo Mobil Net
Info Mobil Net
 
Appy Go
Appy GoAppy Go
Appy Go
 
Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012
 
Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3
 
Agis öZet 2012 Sk
Agis öZet 2012 SkAgis öZet 2012 Sk
Agis öZet 2012 Sk
 
Telecom dictionary
Telecom dictionaryTelecom dictionary
Telecom dictionary
 
Web social media strategy sample
Web social media strategy sampleWeb social media strategy sample
Web social media strategy sample
 
Social media business_tips
Social media business_tipsSocial media business_tips
Social media business_tips
 
mobile marketing glosaary
mobile marketing glosaarymobile marketing glosaary
mobile marketing glosaary
 
All It Standards Guidelines And Tools
All It Standards Guidelines And ToolsAll It Standards Guidelines And Tools
All It Standards Guidelines And Tools
 

Recently uploaded

20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 

Recently uploaded (20)

20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 

M2 m summary for all

  • 1. 1 M2M SUMMARY FOR ALL Though M2M exist since many years, as many new technologies entered into market takes time to be accepted, adapt and matured, it is becoming more popular day by day. One of the reasons why it took so much time to be accepted is that the GSM operator were happy with their voice ARPU’s. However after the liberation of telecom services and the entrance of new GSM players into market beside the incumbents, ARPU’s have gone down. GSM operators had to find new sources of income. Value added services were one of many. At this point M2M services started to take off. However now wee are at the turning point for M2M users with the new MVNO players. As can be guessed GSM operators are not willing to share voice and SMS incomes with MNVO’s. Therefore, MVNO’s are bound by basically with M2M solutions. We think that this is where MVNO’s may pass operators. Some of the possible M2M applications MVNO’s will provide beside the GSM operators are as follows: Fleet Management Using automated GPS technology, companies can remotely locate, navigate and track their fleet vehicles, to improve management and customer service. Mobile assets can be tracked not only for location, but also for vehicle performance and driver safety. Security: The Security market is arguably the largest M2M segment to date, primarily with the adoption of wireless technology based on antiquated analog cellular and proprietary data networks. Most of these security applications have been designed to eliminate fixed line services to transmit alarm information to an alarm company. But, the shutdown of the analog networks in 2008, coupled with customer demand for higher value services including video monitoring is driving rapid migration to flexible digital network approaches. According to ABI Research, the North American market for home security systems will reach almost 10 million devices by 2010. However, the real growth in Security will shift to digital wireless as the preferred network technology as the legacy networks are retired and new security applications drive the bandwidth requirement far beyond that supported on those older networks.
  • 2. 2 Beyond basic alarm, monitoring, new capabilities are being added to enhance and improve security solutions. The use of video and still picture transmission allows alarm and security companies to view a location, in real-time, prior to taking action. This allows false alarms to be disregarded without incurring the cost of going to the location as well as avoiding false law enforcement dispatch. In addition, user interaction with home or business security systems, via any mobile device, will allow for notifications to a mobile phone as well as remote user control. Healthcare and Telemedicine Patients can be remotely monitored from their homes, with medical professionals able to monitor diabetes, cardiac issues, prescription usage, and many other conditions and concerns Vending Inventory management, remote monitoring, alarm status, security, cash shortages and fleet management are some of the important aspects of vending machine management. M2M applications can improve that management, enhance customer service, assure consistent inventories, and enable companies to pay the greatest attention to their high-revenue brands. Digital Signage This is the delivery of strategic information when and where it is needed. These solutions are popular in markets such as retail, leisure, sports, security, traffic management and others, with innovations such as video messaging, communication of important or entertaining real-time information, and mobile advertising. Public transport Organizations can better manage their vehicles through M2M solutions that leverage GPS technology for location, navigation, and vehicle movement. The status of the vehicles can be gauged remotely to minimize out-of-service time and improve driver safety. Remote Monitoring and Control M2M takes traditional applications such as SCADA, building automation, and remote diagnostics to the next level. Today’s embedded routers and modems help assure reliable connectivity for critical applications. Time and cost limited the actual amount of monitoring that could be accomplished, with systems largely limited to occasional inspections by humans, with those sites that absolutely required
  • 3. 3 monitoring paying a high price. The use of M2M wireless technology, able to be delivered in often hostile locations, yet with low power devices, both facilitates reduced monitoring costs while increasing the amount of data that can be captured and transmitted. As Environmental Protection Agency (EPA) initiatives increase the pressure on industry to report and file detailed and regular – not simply exception – reports on critical facilities, wireless M2M is the obvious answer. One of the ‘original’ M2M markets, SCADA (Supervisory, Control and Data Acquisition) control systems have been widely used in oil, gas and other process management industries for more than 15 years. However, Industrial Monitoring and Control is a rapidly growing M2M segment that is predicted to grow annually by almost 35% through 2010 to an estimated 5.76 million devices (ABI Research). Through SCADA standards, M2M technology is being used to extract data from non-IT devices such as electrical, gas and oil meters as well as a myriad of other devices and deliver the data to critical business and monitoring systems. The ability to monitor and control electrical power systems, water, oil and gas networks provides utility industries with a more cost-effective way to measure utilization (in real time), the ability to manage supply and demand and to more effectively anticipate, identify and fix problems. The cost savings associated with measuring utilization and providing maintenance functions is greatly enhanced when meters and other network elements are in remote or hard-to-reach locations. Harbor Research has called this “Pervasive Intelligence”; allowing businesses to make immediate decisions based on accurate, real-time, data. Nevertheless, this market is broadening to also include the use of a wireless networks to connect specialized devices in a variety of new businesses, from retail outlets and fast-food restaurants to major production and business facilities. For example, Burger King has implemented wireless M2M solutions where devices capture alarms, send notifications, receive and process remote energy and security information and then uploads this to centralized business systems. The implementation of these solutions drives cost savings associated with energy efficiency, reduced peak demands and protection of perishable inventory or any other asset that may negatively impacted by loss of electricity, refrigeration or light. The use of M2M technology in Environmental monitoring has started expanding significantly, as wireless technology is being applied to more and more monitoring applications. There are many already in early adoption phases, using M2M technology: • Measurement of air quality • Irrigation, temperature and chemical monitoring • Collection of water samples in rivers, lakes and even coral reefs • Monitoring of gas and pollutant levels in landfills • Measuring of water levels in wastewater treatment
  • 4. 4 • Flood management of bacterial and water levels In the case of air quality and many other environmental conditions, the monitoring is required and regulated by the EPA and other government agencies. Compliance to regulations at the lowest possible cost will continue to drive the adoption of M2M technology as will the ability to more quickly identify and respond to events where out-of-control conditions could be dangerous to people or property. Automatic Teller Machines/Point of Sale Wireless M2M communication can increase transaction speeds and enable new products such as wireless card transactions, tableside payment, and more. Public safety M2M solutions help assure that the wireless equipment used by first responders and others is operational at all times, as well as manage medical equipment, vehicles, and more. Utilities M2M enables a vast range of utility, SmartGrid, and automated metering applications. Customers can use these applications to remotely monitor critical utility applications and track, monitor, and manage assets. Asset tracking Asset tracking permits a user to determine the locations of virtually any type of asset 7x24 anywhere in the world. Businesses can track delivery and repair vehicles, cargo containers, construction equipment and even its own personnel, especially those living or working in areas where there is threat of crime or kidnapping. For businesses and consumers, the asset tracking provides the functionality known as “geo-fencing”. This allows the user to set a “logical fence” as a boundary. If the asset goes outside of the boundary, the user is immediately notified via a message (call, email, text). This is useful in terms of theft protection. One application of particular focus for SkyTrace is tracking laptops. This application is material due to the theft in the market. Some statistics to support this effort are: • Safeware The Insurance Agency claims that over 600,000 laptops are stolen annually, resulting in an estimated $5.4 billion loss of proprietary information. • According to the FBI, 97% of stolen computers are never recovered.
  • 5. 5 • Laptop theft accounted for 50% of reported security attacks. CSI, The 12th Annual Computer Crime and Security Survey, 2007 • Lost or stolen laptops and mobile devices are the most frequent cause of a data breach, accounting for 49% of data breaches in 2007. Ponemon Institute, U.S. Costs of a Data Breach, November 2007 • 12,000 laptops are lost in U.S. airports each week, and two-thirds are never returned. (Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008) Cargo / Asset Protection • Web or PDA Web locate capabilities – immediate results • Can also locate from cell phone for immediate results • Geo-Fence – pre-set border control by the user • Connect with expensive shipping materials that require security measures Telematics Public Transportation Management, Intelligent Transportation Systems (ITS), workflow, mobile job planning, M2M Applications – Pay As You Drive. Here is a true M2M Application that is being rolled out commercially that will impact you. The application allows users to pay for car insurance based on usage. You pay for as much as you consume – you drive 100 miles you pay insurance for 100 miles – you drive 100,000 miles you pay insurance for 100,000 miles. This is could change the face of the car insurance industry and if widely adopted / deployed on a standardized platform will allow other ancillary products and services to be offered to car drivers – Internet, Yellow Pages, Drive By/Localized Ad’s (won’t we love that), Streaming Music (everyone one wants a radio on the car) and more. The application (PAYD) as you go is being used by insures in UK/Europe to offer drivers a means to pay for insurance based on actual miles driven. The cars have a built in GPS system that track the movement of the vehicle in real time – where you drive, when you drive and how often you drive (AKA Big Brother). Cool technology concept – but to make it a commercial success it needs to assuage consumer fears about Big Brother is watching. SmartGrid initiative The Smart Grid refers to the introduction of new information and control technologies to the electricity system that allow the system to be planned and operated in a dynamically-optimized manner. An example of such technology is the smart meter, which provides new information and communication ability
  • 6. 6 for utilities to use to better manage and reduce the cost of their business operations. Another example is new technology that automates and increases the operational efficiency of substations and other parts of the utility infrastructure. The smart grid is not limited, however, to infrastructure or the smart meter. It goes into the home or business by way of new pricing, control, and information options that help users reduce their usage and their bill. It will also connect to smart appliances that will automatically accept price and control signals that allow them to be used in a way that better supports grid optimization and attainment of climate change goals. Demand Response, for example, is the practice of incentivizing customers to modify their electricity usage in ways that help make the electric grid more efficient and reliable, particularly during periods of peak demand. Because demand response reduces peak demand, it complements resources that tend to be available during off-peak periods, such as wind energy. Demand response, in this way, supports the use of greater amounts of renewable energy. The smart grid also includes important new technologies such as energy storage and plug-in hybrid electric vehicles (PHEVs). Energy storage is a form of demand response that allows renewable energy to be used not only when it is produced but also when it is needed. With storage options, peak demand can be met by renewable energy generated during off-peak periods. PHEVs, meanwhile, have the potential to be mobile energy storage units. They charge from the grid, store electricity they don’t use, and have the ability to return excess electricity to the grid during peak demand periods.