Sensors gather minute bits of data that are valuable when aggregated and processed to extract intelligence. A whole new generation of business solutions are emerging from the data gathered from M2M.
The green revolution sweeping the commercial vehicle market is creating new revenue streams for truck industry participants- see how you can benefit from it.
Download a free copy from our website at www.firstpartner.net. The 2015 M2M & IoT Market Map addresses the different roles of M2M and IoT, along with the emerging areas of cloud delivered solution components. It identifies how these will impact the value chain in offering a variety of methods to address different solution specification requirements.
The expansion of the Internet of Things IoT implies progressively dynamic client gadgets on the Internet. IoT devices can be ordinary articles from vehicles, advanced mobile phones to wearable sensors. Huge measures of information are produced by IoT devices through the assortment and transmission of information required for the yield of valuable results and in this way, an ef cient approach to work is significant. In the public eye today, mobile communication and mobile computing play a critical job in each part of our lives, both individual and open correspondence. By utilizing Cloud Computing with IoT, data computations are situated outside the devices henceforth diminishing the strain on the devices themselves. IoT devices are additionally frequently portable and with versatility comes the need to have wireless connections to the cloud. Therefore, Mobile Cloud Computing MCC gets appropriate. However, the development in mobile computing use can be improved by coordinating portable figuring into distributed computing. This will bring about developing another model called Mobile Cloud Computing MCC that has as of late pulled in a lot of consideration in the academic sector. This paper investigates its features, advantages, applications, and difficulties of Mobile Cloud Computing. Research endeavours towards the execution of Mobile Computing are additionally talked about giving an understanding of the fate of the innovation. Sujay Sudhakar Parkhe "Smart Computing: Mobile + Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30340.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30340/smart-computing-mobile--cloud/sujay-sudhakar-parkhe
Connected Cars Are the Next Must Have Consumer Electronics DeviceCisco Jasper
The focus of connected services by car manufacturers lately has been building out the connected services suite. The next transformation of services won’t be in the services themselves but in the business models of offering the services. If the car is to become a true consumer internet device, it will require real internet style monetization models.
In this talk, Mark Thomas, head of connected car product marketing for Cisco Jasper, explores internet monetization models, the infrastructure needed to monetize internet style and also learn about the vocabulary a vehicle knows when it’s an always on connected IoT device.
A lot has been said and written about M2M communication over the last few years. The idea behind this paper is to present the concept in a lucid and compact manner, to understand its potential impact, and to clear the misconceptions surrounding the acronym.
The green revolution sweeping the commercial vehicle market is creating new revenue streams for truck industry participants- see how you can benefit from it.
Download a free copy from our website at www.firstpartner.net. The 2015 M2M & IoT Market Map addresses the different roles of M2M and IoT, along with the emerging areas of cloud delivered solution components. It identifies how these will impact the value chain in offering a variety of methods to address different solution specification requirements.
The expansion of the Internet of Things IoT implies progressively dynamic client gadgets on the Internet. IoT devices can be ordinary articles from vehicles, advanced mobile phones to wearable sensors. Huge measures of information are produced by IoT devices through the assortment and transmission of information required for the yield of valuable results and in this way, an ef cient approach to work is significant. In the public eye today, mobile communication and mobile computing play a critical job in each part of our lives, both individual and open correspondence. By utilizing Cloud Computing with IoT, data computations are situated outside the devices henceforth diminishing the strain on the devices themselves. IoT devices are additionally frequently portable and with versatility comes the need to have wireless connections to the cloud. Therefore, Mobile Cloud Computing MCC gets appropriate. However, the development in mobile computing use can be improved by coordinating portable figuring into distributed computing. This will bring about developing another model called Mobile Cloud Computing MCC that has as of late pulled in a lot of consideration in the academic sector. This paper investigates its features, advantages, applications, and difficulties of Mobile Cloud Computing. Research endeavours towards the execution of Mobile Computing are additionally talked about giving an understanding of the fate of the innovation. Sujay Sudhakar Parkhe "Smart Computing: Mobile + Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30340.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30340/smart-computing-mobile--cloud/sujay-sudhakar-parkhe
Connected Cars Are the Next Must Have Consumer Electronics DeviceCisco Jasper
The focus of connected services by car manufacturers lately has been building out the connected services suite. The next transformation of services won’t be in the services themselves but in the business models of offering the services. If the car is to become a true consumer internet device, it will require real internet style monetization models.
In this talk, Mark Thomas, head of connected car product marketing for Cisco Jasper, explores internet monetization models, the infrastructure needed to monetize internet style and also learn about the vocabulary a vehicle knows when it’s an always on connected IoT device.
A lot has been said and written about M2M communication over the last few years. The idea behind this paper is to present the concept in a lucid and compact manner, to understand its potential impact, and to clear the misconceptions surrounding the acronym.
In today’s complex, competitive landscape, it is no longer enough to have a basic M2M solution in place. For more details visit https://www.calamp.com/
"How Standardization Enables The Next Internet Evolution," 1st in a series of 4 webcasts introducing oneM2M, the global standards initiative for Machine-to-Machine communications and the Internet of Things, delivered via BrightTALK on October 16th, 2014.
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...Alan Quayle
Simfony: Building a Global IoT Service Provider using Programmable Telecoms
Stefan Anghel, Product Architect, Simfony Mobile
Where does IoT make sense? Cutting through the hype to real business and real solutions.
Review of the IoT Landscape, understanding the enablers and ecosystem.
Simfony's IoT Platform: an M2M focused MVNO. Delivering solutions to business problems.
The Future of IoT service providers.
How technology is impacting the logistics industryNatalie Jones
Technology evolution is pushing the boundaries and changing the way business is done around the world. Advanced technology in the supply chain has improved productivity, minimizing expenses and failures.
The internet of things (IoT) is a steadily growing billion-dollar market largely driven by companies undergoing digitization for greater efficiency and transparency, as well as by 5G and emerging applications like smart cities. Satellite’s inherent capabilities — such as its ability to reach remote areas, its ability to scale, to extend coverage for other providers — make it an essential part of a hybrid network needed to support an interoperable IoT system.
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxdrandy1
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS 2
Maintaining a strong security system in the networking environment to prevent any form of attack and compromise information has been a formidable problem in recent times. There is fairly a small number of operating systems compared to the vast number of computer systems that are in operation. This situation has created a leeway for cyber attackers to target the systems easily (Palmer, 2010). Cyber attackers have formulated diverse techniques to exploit the homogeneity of the network environment. This article will explore the benefits related to diversity and commonality in the event of a malicious attack.
The purpose of any security strategy is to completely eliminate or at least limit the impact of damage to a successful attack on a particular system. At some point, any computer can be vulnerable to malware attacks, and the most important aspect in a case like this is to achieve an optimum level of preparedness. Diversity of the operating systems is beneficial in several ways, though an organization could incur an extra operational cost. Moving some groups of users to various different operating systems helps avert the overall damage caused by the SQL Slammer and MSBlast worms. Malicious-code attacks directed towards the commonly used operating system, windows, have been so rampant, thereby necessitating the need for improved security procedures of the computers (Anderson & Anderson, 2010).
Significant operational damages have been incurred before by businesses and enterprise to extensive downtime, brought about by malware attacks. Adopting diversity in operating systems comes along with several security benefits;
· Helps contain malicious-code attacks- Virus and worm attacks target and exploit the flaws in windows operating systems. In a case like this, availing an alternative operating system would be critical in helping to contain the spread to other PCs owned by the business. The impact of the attack is leveled down since some core business can be carried out in the event of an attack.
· Directing some pressure towards Microsoft- Health competition among service and commodity provider is beneficial for the consumers. Being diversified in terms of operating systems pushes dominant companies like Microsoft to try so hard to meet the security needs of their customers.
· It helps speed up innovations in the sense that other operating system developers will work towards improving their operating systems to match that of the windows. Such innovations include stable security systems that prevent malware from instilling too much damage to the computer system.
Exercising commonality in the usage of operating systems comes with its own benefits, too, especially when dealing with a malicious attack. The business would not incur too much cost, in the event of a .
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxcargillfilberto
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS 2
Maintaining a strong security system in the networking environment to prevent any form of attack and compromise information has been a formidable problem in recent times. There is fairly a small number of operating systems compared to the vast number of computer systems that are in operation. This situation has created a leeway for cyber attackers to target the systems easily (Palmer, 2010). Cyber attackers have formulated diverse techniques to exploit the homogeneity of the network environment. This article will explore the benefits related to diversity and commonality in the event of a malicious attack.
The purpose of any security strategy is to completely eliminate or at least limit the impact of damage to a successful attack on a particular system. At some point, any computer can be vulnerable to malware attacks, and the most important aspect in a case like this is to achieve an optimum level of preparedness. Diversity of the operating systems is beneficial in several ways, though an organization could incur an extra operational cost. Moving some groups of users to various different operating systems helps avert the overall damage caused by the SQL Slammer and MSBlast worms. Malicious-code attacks directed towards the commonly used operating system, windows, have been so rampant, thereby necessitating the need for improved security procedures of the computers (Anderson & Anderson, 2010).
Significant operational damages have been incurred before by businesses and enterprise to extensive downtime, brought about by malware attacks. Adopting diversity in operating systems comes along with several security benefits;
· Helps contain malicious-code attacks- Virus and worm attacks target and exploit the flaws in windows operating systems. In a case like this, availing an alternative operating system would be critical in helping to contain the spread to other PCs owned by the business. The impact of the attack is leveled down since some core business can be carried out in the event of an attack.
· Directing some pressure towards Microsoft- Health competition among service and commodity provider is beneficial for the consumers. Being diversified in terms of operating systems pushes dominant companies like Microsoft to try so hard to meet the security needs of their customers.
· It helps speed up innovations in the sense that other operating system developers will work towards improving their operating systems to match that of the windows. Such innovations include stable security systems that prevent malware from instilling too much damage to the computer system.
Exercising commonality in the usage of operating systems comes with its own benefits, too, especially when dealing with a malicious attack. The business would not incur too much cost, in the event of a .
A fresh approach to remote IoT connectivity | by Podsystem Kira Ugai
There are a huge number of IoT devices, often roaming across countries and continents, that are located outside urban areas.
This poses significant challenges to both the design and connectivity of the device, the biggest concern being that there is no room for error, as troubleshooting and maintenance of remote and roaming devices is complicated and costly.
As part of the Internet Of Things North America conference in Chicago Illinois (April 13th – 14th 2016), Podsystem Inc. CEO Sam Colley will be presenting ‘A Fresh Approach to Remote IoT Connectivity’ at 11:30 on April 14th.
Sam will address the challenges faced by remote IoT applications developers and discuss ways of overcoming them.
His presentation is centered around an infographic which outlines the main issues involved in developing remote IoT applications and explains how to make the correct choices in terms of device design, connectivity and future proofing to prolong the lifespan of the application and avoid costly mistakes.
A fresh approach to remote IoT Connectivity by Podsystempodsystem1
There are a huge number of IoT devices, often roaming across countries and continents, that are located outside urban areas.
This poses significant challenges to both the design and connectivity of the device, the biggest concern being that there is no room for error, as troubleshooting and maintenance of remote and roaming devices is complicated and costly.
As part of the Internet of Things North America conference in Chicago Illinois (April 13th – 14th 2016), Podsystem Inc. CEO Sam Colley will be presenting ‘A Fresh Approach to Remote IoT Connectivity’ at 11:30 on April 14th.
Sam will address the challenges faced by remote IoT applications developers and discuss ways of overcoming them.
His presentation is centered around an infographic which outlines the main issues involved in developing remote IoT applications and explains how to make the correct choices in terms of device design, connectivity and future proofing to prolong the lifespan of the application and avoid costly mistakes.
Similar to My blogs on machine to-machine business solutions (20)
Predictive analytics reaps the value from CRM databases aided by customer segmentation, competitive intelligence, and learning from marketing campaigns.
Firewalls have proved to be ineffective for cyber-security. Instead, a new category of security applications has emerged which learn from the criminal behavior of intruders and use data in combination with deception to trap hackers.
The cloud eases the burden of compliance for financial and health services companies but it also extracts valuable data for analytical and decision-making purposes.
The reputational and financial damage from cyber security breaches for banks are so enormous that they cannot any longer afford to be reactive. Big Data Analytics lets them preempt attacks.
A white paper written for Bluepoint Solutions that discusses the context for enterprise content management. Regulatory compliance demands have grown in recent years as a result of Dodd-Frank regulations rendering the old IT systems obsolete.
Labor arbitrage benefits of global outsourcing are often offset by the costs of co-ordinating and managing far-flung operations. The downside can be mitigated by aggregating data on operations and real-time decision.
Multinationals are challenged by changing tax laws, accounting practices, valuation methods and penalties as administrations around the world clamp down on tax avoidance
The winners among vendors will have exceptional capability in implementation of large projects pulling together capabilities in reporting and querying, multidimensional analysis, analytics, data management, visualization and business process management
Real time responses to events will be feasible when enterprises are designed to be maneuverable and their flow of activity is not disrupted by a breakdown in any one component in the chain of business processes that enable the completion of an activity.
As it incorporates a gamut of functions from business activity monitoring to performance management and business planning, business intelligence attracts a growing number of companies who earlier specialized in individual functions
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Leading Change strategies and insights for effective change management pdf 1.pdf
My blogs on machine to-machine business solutions
1. On the road to pervasive intelligence
By Kishore Jethanandani
Machine-to-Machine (M2M), the tiny radio devices, sensors that feed bits of data
from activities of objects such as moving trucks, have a whole lot more value
when the data from each of them is aggregated to draw intelligence such as their
expected time of arrival and monitor, in real-time, variables like the temperature
in trucks carrying perishables.
The accident rates and corresponding insurance costs have been drastically
lowered with detailed monitoring of driving behavior and real-time feedback on
acceleration, brake use, maneuvers and turns. Studies undertaken by Trimble
show accident rates were lowered by 45% and corresponding insurance and
related costs cut by 50%.
A big picture view of vehicle and vessel movements all along the supply chain
uncovers opportunities for business gains that would otherwise be not available.
Portvision, for example, gained visibility into the movement of vessels by taking
advantage of the AIS (Automated Identification System) which is otherwise used
for collision avoidance by the Coast Guard. The data can tell, in real time, when
the vessel is close enough to the shore to benefit from switching to cellular
2. communications. Ships tend to spend a great deal of time close to the shore,
before the cargo is unloaded, and can significantly lower the use of the more
expensive satellite communications. The expanded data of arrivals and departures
of vessels can be used for other purposes such as logistics management for trucks
and inventory management by customers as they get real-time data on expected
time of arrival for trucks.
Telecom carriers, specialist M2M solution providers, strategic alliances and M2M
marketplaces are coming together to interconnect sensors, devices and networks
so that the data can flow seamlessly to central databases where it can be parsed
for information. A global alliance of KPN, NTT DoCoMo, Rogers Communications,
SingTel, Telefónica, through its Telefónica Digital unit, Telstra, and Vimpelcom will
use a distinctive SIM card, a common web interface and will centrally manage
M2M devices. They will all collaborate with Jasper Wireless to manage the M2M
network. Verizon acquired Hughes Telematics in June 2012 for its fleet
management solutions. Orange acquired Data and Mobile in January 2012 for its
fleet management software. Masternaut entered into a strategic alliance with
Telefonica for joint marketing of M2M and related fleet management solutions.
Deutsche Telecom created a global M2M marketplace where the thousands of
3. vendors could find selling opportunities and for customers to do comparison
shopping.
Transportation and Logistics leads as the target market by Communication Service
Providers for their M2M services. A survey conducted by Informa found that 52%
of the carriers are targeting this industry.
Real-time M2M powered fleet management enables new services, cuts costs and
speeds up regulatory compliance. In times of disasters or just adverse weather,
vehicles can be lost in accidents, stranded or rerouted. Software, such as that
available from Agile Access Control, provides data on the status of fleets in real-
time to make alternative plans.
Trust was important for compliance with hours-of-service requirements for
drivers and was prone to errors and omissions as it was largely documented
manually. With M2M enabled fleet management software like Qualcomm’s hours
of service application, tracking of hours of service is automated.
FMCSA (Federal Motor Carrier Safety Administration) governed rules require
drivers to a daily DVIR (Driver Vehicle Inspection Report) and its submission to
headquarters to detect any maintenance or safety issues. With M2M enabled
4. software like Cadec Global, the tedium is cut and processing of the data happens
continually in real-time.
The Marriage of M2M and Platforms Breeds Services
By Kishore Jethanandani
M2M and its evolved version--Internet of Things/Everything—is beginning to scale
aided by application enablement and related platforms. Early adoption was
confined to a few use cases of remote monitoring that had limited interest.
The recent evolution of M2M is reflected in applications for vending machines
which accounted for most of the investment in the past. Sensors embedded in
vending machines were used for isolating counterfeit dollar bills during
purchases. Deutsche Telecom’s machine-to-machine communications added
refilling capabilities for vending machines--inventory levels are automatically
reported to vendors’ computers when stocks deplete. Internet of
Things/Everything (IOT/E) augments the value of vending machines as
applications, such as SAP Hana’s mobile payments and offers based on past
purchase history, proliferate.
5. Isolated sensor-based use cases are hard to scale and have been financially
unattractive to carriers. The ARPUs are low for M2M ranging from $1.5 per month
for networks and services in the retail industry to a high of $5 for networks and
$48.9 for services in the healthcare industry. For most industries, they are less
than $10 per month for networks and services. By contrast, the Average Revenue
per Connection for mobile devices is $45 per month and the Average Revenue per
User is $69 per month. M2M, IOT and IOE will be an attractive business for
carriers when multiple devices and services, the long-tail of applications, are
served by a common infrastructure of networks and platforms.
Application Enablement Platforms (AEP) have the toolset, with the common
objects of code used for a broad range of applications, to rapidly generate new
applications for revenue generation all working within an integrated network of
devices. Fragmentation in the M2M world is of a higher order of magnitude due
to a variety of embedded platforms, programming languages, connection types
whether Bluetooth, WiFi, radio or cellular, and communication protocols. AEPs
play a role in the integration along with M2M connectivity platforms.
AT&T, for example, is partnering with Axeda to churn out applications for
automation in several verticals. In the past, equipment in factories was monitored
6. by sensors to detect an impending breakdown. Now M2M applications
automatically order parts, send alerts, and schedule an appointment for a
technician to attend to the maintenance of the equipment.
Some platforms go beyond providing a framework for generating applications for
a vertical and build components for development of applications across a variety
of industries. Cumulocity is one platform that builds cross-industry applications.
Data feeds from smart meters, for example, can be used not only by the utility
industry but could have other uses such as the management of appliances.
Jones Lang Lasalle, a commercial property management company, integrated the
disparate building management systems that came with its numerous
acquisitions. Its partnership with Intellicommand, an M2M platform company,
helped to interlink BACNet, LonWorks, Modbus that were used for remotely
controlling heating, ventilation and air-conditioning as well as equipment such as
chillers and boilers. The controls help to track energy consumption and failing
equipment that might lead to a breakdown. Energy savings of twenty four percent
were realized in eleven months in just one site.
The numerous data feeds from M2M open new possibilities, for applications
development, as they can be mashed to create new services. Application
7. platforms are helping to break down the boundaries that kept the data streams
apart and are fusing them to generate new applications and services. Sensors are
able to read every event, activity, beat that occurs on this earth. The possibilities
of applications development are enormous if the daunting challenges of
integration are overcome.
M2M is taproot for Cloud watered enterprise applications
By Kishore Jethanandani
Cloud platforms are helping to bridge the world of dispersed and pervasive
sensing devices or machines and centralized enterprise application platforms.
Enterprises have a virtual view of their assets anywhere on their control screens
to help them respond to customers and partners.
Mobile service providers can now wirelessly stream sensor and machine data to
enterprise applications enabling cloud platforms of companies like Axeda,
Devicewise, Gemalto or Eurotech. Machine vendors can remotely monitor the
status of equipment installed by them and conduct diagnostics and maintenance,
at a moment’s notice, without waiting for field staff or customer contacts to be
available. To be sure, the full benefits of remote control of assets are contingent
on resolving data quality issues of M2M integration with cloud platforms.
8. EMC’s Isilon integrated its internal Salesforce application with the Axeda’s
machine cloud. Isilon’s customer support application, Support IQ, appears as a
button on Salesforce application and can remotely activate the diagnostic routine
on storage arrays at customer sites. A great deal of time is saved because EMC
does not have to wait for its contacts on customer premises to arrive to help
them with diagnosis of incidents that need their support. The relevant data on
configuration of the storage arrays is stored on the Salesforce application.
The applications built on the cloud platforms generate a growing choice of
services. New services are generated by meshing several streams of data from
sensor devices. A typical service is the twittering ferries developed by Eurotech.
The data from the GPS of ferries estimates data on speed and automatically sends
tweets informing passengers about their arrival and departure time.
Clients of M2M solutions are able to increase productivity with automated
business processes. Diebold reduced a great deal of downtime with automatic
software upgrades. The time lost on downtime in maintenance of ATM terminals
was lowered with automated status updates of machine performance and
predicting failures before an outage happens. The diagnosis of problem situations
is completed before the visits of field staff. The technicians go prepared with the
9. right tools, accessories and information avoiding the multiple visits that were
common in the past.
Carriers are well positioned to be the intermediaries between the several
partners, enterprise customers, vendors of devices, platforms and software
developers, and cloud services providers and deliver a composite service. They
will potentially gain more from ensuring quality of service, enhancing user
experience by designing the portals and the user interfaces for self-service. Their
current role is largely as a communication pipe but they are expected to expand;
the share of revenues from professional services, service management and
analytics is expected to more than double by 2015.
Carriers’ choice of technologies will make a key difference to the profitability of
M2M applications. The revenue earned from individual sensors and devices is low
and costs are high. The costs can be lowered with the use of local gateways and
middleware to reduce administrative costs.
Carriers will have to think anew about their strategy towards using M2M data
feeds and the applications that can be generated with help from applications
enabling cloud platforms. In contrast to the mass delivery of generic services like
internet access, they will need the skills of consultants and system integrators on
10. the operations side and marketing skills of consumer companies for customer
acquisition.