SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
1
M2M SUMMARY FOR ALL
Though M2M exist since many years, as many new technologies entered into market takes time to be
accepted, adapt and matured, it is becoming more popular day by day.
One of the reasons why it took so much time to be accepted is that the GSM operator were happy
with their voice ARPU’s. However after the liberation of telecom services and the entrance of new GSM
players into market beside the incumbents, ARPU’s have gone down. GSM operators had to find new
sources of income. Value added services were one of many. At this point M2M services started to take off.
However now wee are at the turning point for M2M users with the new MVNO players.
As can be guessed GSM operators are not willing to share voice and SMS incomes with MNVO’s.
Therefore, MVNO’s are bound by basically with M2M solutions. We think that this is where MVNO’s may
pass operators.
Some of the possible M2M applications MVNO’s will provide beside the GSM operators are as
follows:
Fleet Management
Using automated GPS technology, companies can remotely locate, navigate and track their fleet
vehicles, to improve management and customer service. Mobile assets can be tracked not only for location,
but also for vehicle performance and driver safety.
Security:
The Security market is arguably the largest M2M segment to date, primarily with the adoption of
wireless technology based on antiquated analog cellular and proprietary data networks. Most of these security
applications have been designed to eliminate fixed line services to transmit alarm information to an alarm
company. But, the shutdown of the analog networks in 2008, coupled with customer demand for higher
value services including video monitoring is driving rapid migration to flexible digital network approaches.
According to ABI Research, the North American market for home security systems will reach almost 10
million devices by 2010. However, the real growth in Security will shift to digital wireless as the preferred
network technology as the legacy networks are retired and new security applications drive the bandwidth
requirement far beyond that supported on those older networks.
2
Beyond basic alarm, monitoring, new capabilities are being added to enhance and improve security
solutions. The use of video and still picture transmission allows alarm and security companies to view a
location, in real-time, prior to taking action. This allows false alarms to be disregarded without incurring the
cost of going to the location as well as avoiding false law enforcement dispatch. In addition, user interaction
with home or business security systems, via any mobile device, will allow for notifications to a mobile phone
as well as remote user control.
Healthcare and Telemedicine
Patients can be remotely monitored from their homes, with medical professionals able to monitor
diabetes, cardiac issues, prescription usage, and many other conditions and concerns
Vending
Inventory management, remote monitoring, alarm status, security, cash shortages and fleet
management are some of the important aspects of vending machine management. M2M applications can
improve that management, enhance customer service, assure consistent inventories, and enable companies to
pay the greatest attention to their high-revenue brands.
Digital Signage
This is the delivery of strategic information when and where it is needed. These solutions are popular
in markets such as retail, leisure, sports, security, traffic management and others, with innovations such as
video messaging, communication of important or entertaining real-time information, and mobile advertising.
Public transport
Organizations can better manage their vehicles through M2M solutions that leverage GPS technology
for location, navigation, and vehicle movement. The status of the vehicles can be gauged remotely to
minimize out-of-service time and improve driver safety.
Remote Monitoring and Control
M2M takes traditional applications such as SCADA, building automation, and remote diagnostics to
the next level. Today’s embedded routers and modems help assure reliable connectivity for critical
applications. Time and cost limited the actual amount of monitoring that could be accomplished, with
systems largely limited to occasional inspections by humans, with those sites that absolutely required
3
monitoring paying a high price. The use of M2M wireless technology, able to be delivered in often hostile
locations, yet with low power devices, both facilitates reduced monitoring costs while increasing the amount
of data that can be captured and transmitted. As Environmental Protection Agency (EPA) initiatives increase
the pressure on industry to report and file detailed and regular – not simply exception – reports on critical
facilities, wireless M2M is the obvious answer. One of the ‘original’ M2M markets, SCADA (Supervisory,
Control and Data Acquisition) control systems have been widely used in oil, gas and other process
management industries for more than 15 years. However, Industrial Monitoring and Control is a rapidly
growing M2M segment that is predicted to grow annually by almost 35% through 2010 to an estimated 5.76
million devices (ABI Research). Through SCADA standards, M2M technology is being used to extract data
from non-IT devices such as electrical, gas and oil meters as well as a myriad of other devices and deliver the
data to critical business and monitoring systems.
The ability to monitor and control electrical power systems, water, oil and gas networks provides
utility industries with a more cost-effective way to measure utilization (in real time), the ability to manage
supply and demand and to more effectively anticipate, identify and fix problems. The cost savings associated
with measuring utilization and providing maintenance functions is greatly enhanced when meters and other
network elements are in remote or hard-to-reach locations.
Harbor Research has called this “Pervasive Intelligence”; allowing businesses to make immediate decisions
based on accurate, real-time, data.
Nevertheless, this market is broadening to also include the use of a wireless networks to connect
specialized devices in a variety of new businesses, from retail outlets and fast-food restaurants to major
production and business facilities. For example, Burger King has implemented wireless M2M solutions where
devices capture alarms, send notifications, receive and process remote energy and security information and
then uploads this to centralized business systems. The implementation of these solutions drives cost savings
associated with energy efficiency, reduced peak demands and protection of perishable inventory or any other
asset that may negatively impacted by loss of electricity, refrigeration or light.
The use of M2M technology in Environmental monitoring has started expanding significantly, as wireless
technology is being applied to more and more monitoring applications. There are many already in early
adoption phases, using M2M technology:
• Measurement of air quality
• Irrigation, temperature and chemical monitoring
• Collection of water samples in rivers, lakes and even coral reefs
• Monitoring of gas and pollutant levels in landfills
• Measuring of water levels in wastewater treatment
4
• Flood management of bacterial and water levels
In the case of air quality and many other environmental conditions, the monitoring is required and
regulated by the EPA and other government agencies. Compliance to regulations at the lowest possible cost
will continue to drive the adoption of M2M technology as will the ability to more quickly identify and
respond to events where out-of-control conditions could be dangerous to people or property.
Automatic Teller Machines/Point of Sale
Wireless M2M communication can increase transaction speeds and enable new products such as
wireless card transactions, tableside payment, and more.
Public safety
M2M solutions help assure that the wireless equipment used by first responders and others is
operational at all times, as well as manage medical equipment, vehicles, and more.
Utilities
M2M enables a vast range of utility, SmartGrid, and automated metering applications. Customers
can use these applications to remotely monitor critical utility applications and track, monitor, and manage
assets.
Asset tracking
Asset tracking permits a user to determine the locations of virtually any type of asset 7x24 anywhere
in the world. Businesses can track delivery and repair vehicles, cargo containers, construction equipment and
even its own personnel, especially those living or working in areas where there is threat of crime or
kidnapping.
For businesses and consumers, the asset tracking provides the functionality known as “geo-fencing”.
This allows the user to set a “logical fence” as a boundary. If the asset goes outside of the boundary, the user is
immediately notified via a message (call, email, text). This is useful in terms of theft protection. One
application of particular focus for SkyTrace is tracking laptops. This application is material due to the theft in
the market. Some statistics to support this effort are:
• Safeware The Insurance Agency claims that over 600,000 laptops are stolen annually, resulting in
an estimated $5.4 billion loss of proprietary information.
• According to the FBI, 97% of stolen computers are never recovered.
5
• Laptop theft accounted for 50% of reported security attacks. CSI, The 12th Annual Computer
Crime and Security Survey, 2007
• Lost or stolen laptops and mobile devices are the most frequent cause of a data breach, accounting
for 49% of data breaches in 2007. Ponemon Institute, U.S. Costs of a Data Breach, November 2007
• 12,000 laptops are lost in U.S. airports each week, and two-thirds are never returned. (Dell &
Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008)
Cargo / Asset Protection
• Web or PDA Web locate capabilities – immediate results
• Can also locate from cell phone for immediate results
• Geo-Fence – pre-set border control by the user
• Connect with expensive shipping materials that require security measures
Telematics
Public Transportation Management, Intelligent Transportation Systems (ITS), workflow, mobile job
planning, M2M Applications – Pay As You Drive.
Here is a true M2M Application that is being rolled out commercially that will impact you. The
application allows users to pay for car insurance based on usage. You pay for as much as you consume – you
drive 100 miles you pay insurance for 100 miles – you drive 100,000 miles you pay insurance for 100,000
miles. This is could change the face of the car insurance industry and if widely adopted / deployed on a
standardized platform will allow other ancillary products and services to be offered to car drivers – Internet,
Yellow Pages, Drive By/Localized Ad’s (won’t we love that), Streaming Music (everyone one wants a radio
on the car) and more.
The application (PAYD) as you go is being used by insures in UK/Europe to offer drivers a means to
pay for insurance based on actual miles driven. The cars have a built in GPS system that track the movement
of the vehicle in real time – where you drive, when you drive and how often you drive (AKA Big Brother).
Cool technology concept – but to make it a commercial success it needs to assuage consumer fears about Big
Brother is watching.
SmartGrid initiative
The Smart Grid refers to the introduction of new information and control technologies to the
electricity system that allow the system to be planned and operated in a dynamically-optimized manner. An
example of such technology is the smart meter, which provides new information and communication ability
6
for utilities to use to better manage and reduce the cost of their business operations. Another example is new
technology that automates and increases the operational efficiency of substations and other parts of the utility
infrastructure.
The smart grid is not limited, however, to infrastructure or the smart meter. It goes into the home
or business by way of new pricing, control, and information options that help users reduce their usage and
their bill. It will also connect to smart appliances that will automatically accept price and control signals that
allow them to be used in a way that better supports grid optimization and attainment of climate change
goals.
Demand Response, for example, is the practice of incentivizing customers to modify their electricity
usage in ways that help make the electric grid more efficient and reliable, particularly during periods of peak
demand. Because demand response reduces peak demand, it complements resources that tend to be available
during off-peak periods, such as wind energy. Demand response, in this way, supports the use of greater
amounts of renewable energy.
The smart grid also includes important new technologies such as energy storage and plug-in hybrid
electric vehicles (PHEVs). Energy storage is a form of demand response that allows renewable energy to be
used not only when it is produced but also when it is needed. With storage options, peak demand can be met
by renewable energy generated during off-peak periods. PHEVs, meanwhile, have the potential to be mobile
energy storage units. They charge from the grid, store electricity they don’t use, and have the ability to
return excess electricity to the grid during peak demand periods.

Mais conteúdo relacionado

Mais procurados

Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir Mehdi Ahmadian
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
Turvallisuus2013
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stages
IDATE DigiWorld
 

Mais procurados (20)

My blogs on machine to-machine business solutions
My blogs on machine to-machine business solutionsMy blogs on machine to-machine business solutions
My blogs on machine to-machine business solutions
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in Nigeria
 
Digital lifestyle evolution
Digital lifestyle evolutionDigital lifestyle evolution
Digital lifestyle evolution
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
Amir ahmadian m2 m communications as part of wireless sensor networks-final v...
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
IoT In Smart Everything
IoT In Smart EverythingIoT In Smart Everything
IoT In Smart Everything
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013Safe City Tekes Safety and Security programme 2013
Safe City Tekes Safety and Security programme 2013
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
 
Telecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureTelecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different future
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stages
 
B017531518
B017531518B017531518
B017531518
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Energy Management Services for the Connected Home
Energy Management Services for the Connected HomeEnergy Management Services for the Connected Home
Energy Management Services for the Connected Home
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
Global mobile trends
Global mobile trendsGlobal mobile trends
Global mobile trends
 
Global mobile trends
Global mobile trends Global mobile trends
Global mobile trends
 
End-to-End M2M, Fifth Edition
End-to-End M2M, Fifth EditionEnd-to-End M2M, Fifth Edition
End-to-End M2M, Fifth Edition
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 

Destaque

спортивное ориентирование
спортивное ориентированиеспортивное ориентирование
спортивное ориентирование
Yanina
 
Великий ученый М.В.Ломоносов
Великий ученый М.В.ЛомоносовВеликий ученый М.В.Ломоносов
Великий ученый М.В.Ломоносов
Yanina
 
2В класс
2В класс2В класс
2В класс
Yanina
 
Это интересно!
Это интересно!Это интересно!
Это интересно!
Yanina
 
Толерантность, классный час
Толерантность, классный часТолерантность, классный час
Толерантность, классный час
Yanina
 
Новогоднее предсталение
Новогоднее предсталениеНовогоднее предсталение
Новогоднее предсталение
Yanina
 
Краски осени
Краски осениКраски осени
Краски осени
Yanina
 
St. Valentine's Day
St. Valentine's DaySt. Valentine's Day
St. Valentine's Day
Yanina
 
Спортивное ориентирование
Спортивное ориентированиеСпортивное ориентирование
Спортивное ориентирование
Yanina
 
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
etouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcastetouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcast
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
Suzanne Carawan
 
Transition from secondary school to adulthood
Transition from secondary school to adulthoodTransition from secondary school to adulthood
Transition from secondary school to adulthood
Rita May Tagalog
 
Результаты
РезультатыРезультаты
Результаты
Yanina
 
Why do we include students with special needs
Why do we include students with special needsWhy do we include students with special needs
Why do we include students with special needs
Rita May Tagalog
 
Итоги ученического голосования
Итоги ученического голосованияИтоги ученического голосования
Итоги ученического голосования
Yanina
 

Destaque (20)

Integração Postfix Active Directory
Integração Postfix Active DirectoryIntegração Postfix Active Directory
Integração Postfix Active Directory
 
спортивное ориентирование
спортивное ориентированиеспортивное ориентирование
спортивное ориентирование
 
Великий ученый М.В.Ломоносов
Великий ученый М.В.ЛомоносовВеликий ученый М.В.Ломоносов
Великий ученый М.В.Ломоносов
 
Fuel summary
Fuel summaryFuel summary
Fuel summary
 
2В класс
2В класс2В класс
2В класс
 
Это интересно!
Это интересно!Это интересно!
Это интересно!
 
Толерантность, классный час
Толерантность, классный часТолерантность, классный час
Толерантность, классный час
 
Новогоднее предсталение
Новогоднее предсталениеНовогоднее предсталение
Новогоднее предсталение
 
Краски осени
Краски осениКраски осени
Краски осени
 
St. Valentine's Day
St. Valentine's DaySt. Valentine's Day
St. Valentine's Day
 
Спортивное ориентирование
Спортивное ориентированиеСпортивное ориентирование
Спортивное ориентирование
 
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
etouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcastetouches'CEO  Leonora Valvo Moderates the May 2011 ACTE  Webcast
etouches'CEO Leonora Valvo Moderates the May 2011 ACTE Webcast
 
Notes forapplefit
Notes forapplefitNotes forapplefit
Notes forapplefit
 
Traumatic brain injury
Traumatic brain injuryTraumatic brain injury
Traumatic brain injury
 
Transition from secondary school to adulthood
Transition from secondary school to adulthoodTransition from secondary school to adulthood
Transition from secondary school to adulthood
 
Результаты
РезультатыРезультаты
Результаты
 
Why do we include students with special needs
Why do we include students with special needsWhy do we include students with special needs
Why do we include students with special needs
 
Итоги ученического голосования
Итоги ученического голосованияИтоги ученического голосования
Итоги ученического голосования
 
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
Master Thesis - Solutions to mitigate card fraud risks for commercial banks i...
 
Xtcppitchv3
Xtcppitchv3Xtcppitchv3
Xtcppitchv3
 

Semelhante a M2 m summary for all

25 sumit 2
25 sumit 225 sumit 2
25 sumit 2
SRJIS
 
M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter world
Scott Pollard
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
The Marketing Distillery
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
Daniel Mateos P
 
Zpryme Report on Asset Monitoring
Zpryme Report on Asset MonitoringZpryme Report on Asset Monitoring
Zpryme Report on Asset Monitoring
Paula Smith
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
Ranjit Kumar
 

Semelhante a M2 m summary for all (20)

25 sumit 2
25 sumit 225 sumit 2
25 sumit 2
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
 
M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter world
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital Connect
 
M2 m communication whitepaper
M2 m communication whitepaperM2 m communication whitepaper
M2 m communication whitepaper
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
 
Always online
Always onlineAlways online
Always online
 
Ravi i ot-impact
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impact
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdf
 
Capgemini ses - smart grid operational services - going mobile is smart fac...
Capgemini   ses - smart grid operational services - going mobile is smart fac...Capgemini   ses - smart grid operational services - going mobile is smart fac...
Capgemini ses - smart grid operational services - going mobile is smart fac...
 
Zpryme Report on Asset Monitoring
Zpryme Report on Asset MonitoringZpryme Report on Asset Monitoring
Zpryme Report on Asset Monitoring
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
 

Mais de Tarik KUCUK

All It Standards Guidelines And Tools
All It Standards Guidelines And ToolsAll It Standards Guidelines And Tools
All It Standards Guidelines And Tools
Tarik KUCUK
 

Mais de Tarik KUCUK (20)

Xtc Pdiscussionv2
Xtc Pdiscussionv2Xtc Pdiscussionv2
Xtc Pdiscussionv2
 
Xtcp Performance Brochure
Xtcp Performance BrochureXtcp Performance Brochure
Xtcp Performance Brochure
 
Windesk Porta
Windesk PortaWindesk Porta
Windesk Porta
 
Windesk Concento
Windesk ConcentoWindesk Concento
Windesk Concento
 
Windesk Sunum
Windesk SunumWindesk Sunum
Windesk Sunum
 
Windesk
WindeskWindesk
Windesk
 
Integra
IntegraIntegra
Integra
 
Voip
VoipVoip
Voip
 
üRüN Hizmet şEması
üRüN Hizmet şEmasıüRüN Hizmet şEması
üRüN Hizmet şEması
 
AnkesöR çöZüMü
AnkesöR çöZüMüAnkesöR çöZüMü
AnkesöR çöZüMü
 
Info Mobil Net
Info Mobil NetInfo Mobil Net
Info Mobil Net
 
Appy Go
Appy GoAppy Go
Appy Go
 
Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012Xtcp Sunum Ekim2012
Xtcp Sunum Ekim2012
 
Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3Dim Era Urun Ve Servis Seti V3
Dim Era Urun Ve Servis Seti V3
 
Agis öZet 2012 Sk
Agis öZet 2012 SkAgis öZet 2012 Sk
Agis öZet 2012 Sk
 
Telecom dictionary
Telecom dictionaryTelecom dictionary
Telecom dictionary
 
Web social media strategy sample
Web social media strategy sampleWeb social media strategy sample
Web social media strategy sample
 
Social media business_tips
Social media business_tipsSocial media business_tips
Social media business_tips
 
mobile marketing glosaary
mobile marketing glosaarymobile marketing glosaary
mobile marketing glosaary
 
All It Standards Guidelines And Tools
All It Standards Guidelines And ToolsAll It Standards Guidelines And Tools
All It Standards Guidelines And Tools
 

Último

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Último (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 

M2 m summary for all

  • 1. 1 M2M SUMMARY FOR ALL Though M2M exist since many years, as many new technologies entered into market takes time to be accepted, adapt and matured, it is becoming more popular day by day. One of the reasons why it took so much time to be accepted is that the GSM operator were happy with their voice ARPU’s. However after the liberation of telecom services and the entrance of new GSM players into market beside the incumbents, ARPU’s have gone down. GSM operators had to find new sources of income. Value added services were one of many. At this point M2M services started to take off. However now wee are at the turning point for M2M users with the new MVNO players. As can be guessed GSM operators are not willing to share voice and SMS incomes with MNVO’s. Therefore, MVNO’s are bound by basically with M2M solutions. We think that this is where MVNO’s may pass operators. Some of the possible M2M applications MVNO’s will provide beside the GSM operators are as follows: Fleet Management Using automated GPS technology, companies can remotely locate, navigate and track their fleet vehicles, to improve management and customer service. Mobile assets can be tracked not only for location, but also for vehicle performance and driver safety. Security: The Security market is arguably the largest M2M segment to date, primarily with the adoption of wireless technology based on antiquated analog cellular and proprietary data networks. Most of these security applications have been designed to eliminate fixed line services to transmit alarm information to an alarm company. But, the shutdown of the analog networks in 2008, coupled with customer demand for higher value services including video monitoring is driving rapid migration to flexible digital network approaches. According to ABI Research, the North American market for home security systems will reach almost 10 million devices by 2010. However, the real growth in Security will shift to digital wireless as the preferred network technology as the legacy networks are retired and new security applications drive the bandwidth requirement far beyond that supported on those older networks.
  • 2. 2 Beyond basic alarm, monitoring, new capabilities are being added to enhance and improve security solutions. The use of video and still picture transmission allows alarm and security companies to view a location, in real-time, prior to taking action. This allows false alarms to be disregarded without incurring the cost of going to the location as well as avoiding false law enforcement dispatch. In addition, user interaction with home or business security systems, via any mobile device, will allow for notifications to a mobile phone as well as remote user control. Healthcare and Telemedicine Patients can be remotely monitored from their homes, with medical professionals able to monitor diabetes, cardiac issues, prescription usage, and many other conditions and concerns Vending Inventory management, remote monitoring, alarm status, security, cash shortages and fleet management are some of the important aspects of vending machine management. M2M applications can improve that management, enhance customer service, assure consistent inventories, and enable companies to pay the greatest attention to their high-revenue brands. Digital Signage This is the delivery of strategic information when and where it is needed. These solutions are popular in markets such as retail, leisure, sports, security, traffic management and others, with innovations such as video messaging, communication of important or entertaining real-time information, and mobile advertising. Public transport Organizations can better manage their vehicles through M2M solutions that leverage GPS technology for location, navigation, and vehicle movement. The status of the vehicles can be gauged remotely to minimize out-of-service time and improve driver safety. Remote Monitoring and Control M2M takes traditional applications such as SCADA, building automation, and remote diagnostics to the next level. Today’s embedded routers and modems help assure reliable connectivity for critical applications. Time and cost limited the actual amount of monitoring that could be accomplished, with systems largely limited to occasional inspections by humans, with those sites that absolutely required
  • 3. 3 monitoring paying a high price. The use of M2M wireless technology, able to be delivered in often hostile locations, yet with low power devices, both facilitates reduced monitoring costs while increasing the amount of data that can be captured and transmitted. As Environmental Protection Agency (EPA) initiatives increase the pressure on industry to report and file detailed and regular – not simply exception – reports on critical facilities, wireless M2M is the obvious answer. One of the ‘original’ M2M markets, SCADA (Supervisory, Control and Data Acquisition) control systems have been widely used in oil, gas and other process management industries for more than 15 years. However, Industrial Monitoring and Control is a rapidly growing M2M segment that is predicted to grow annually by almost 35% through 2010 to an estimated 5.76 million devices (ABI Research). Through SCADA standards, M2M technology is being used to extract data from non-IT devices such as electrical, gas and oil meters as well as a myriad of other devices and deliver the data to critical business and monitoring systems. The ability to monitor and control electrical power systems, water, oil and gas networks provides utility industries with a more cost-effective way to measure utilization (in real time), the ability to manage supply and demand and to more effectively anticipate, identify and fix problems. The cost savings associated with measuring utilization and providing maintenance functions is greatly enhanced when meters and other network elements are in remote or hard-to-reach locations. Harbor Research has called this “Pervasive Intelligence”; allowing businesses to make immediate decisions based on accurate, real-time, data. Nevertheless, this market is broadening to also include the use of a wireless networks to connect specialized devices in a variety of new businesses, from retail outlets and fast-food restaurants to major production and business facilities. For example, Burger King has implemented wireless M2M solutions where devices capture alarms, send notifications, receive and process remote energy and security information and then uploads this to centralized business systems. The implementation of these solutions drives cost savings associated with energy efficiency, reduced peak demands and protection of perishable inventory or any other asset that may negatively impacted by loss of electricity, refrigeration or light. The use of M2M technology in Environmental monitoring has started expanding significantly, as wireless technology is being applied to more and more monitoring applications. There are many already in early adoption phases, using M2M technology: • Measurement of air quality • Irrigation, temperature and chemical monitoring • Collection of water samples in rivers, lakes and even coral reefs • Monitoring of gas and pollutant levels in landfills • Measuring of water levels in wastewater treatment
  • 4. 4 • Flood management of bacterial and water levels In the case of air quality and many other environmental conditions, the monitoring is required and regulated by the EPA and other government agencies. Compliance to regulations at the lowest possible cost will continue to drive the adoption of M2M technology as will the ability to more quickly identify and respond to events where out-of-control conditions could be dangerous to people or property. Automatic Teller Machines/Point of Sale Wireless M2M communication can increase transaction speeds and enable new products such as wireless card transactions, tableside payment, and more. Public safety M2M solutions help assure that the wireless equipment used by first responders and others is operational at all times, as well as manage medical equipment, vehicles, and more. Utilities M2M enables a vast range of utility, SmartGrid, and automated metering applications. Customers can use these applications to remotely monitor critical utility applications and track, monitor, and manage assets. Asset tracking Asset tracking permits a user to determine the locations of virtually any type of asset 7x24 anywhere in the world. Businesses can track delivery and repair vehicles, cargo containers, construction equipment and even its own personnel, especially those living or working in areas where there is threat of crime or kidnapping. For businesses and consumers, the asset tracking provides the functionality known as “geo-fencing”. This allows the user to set a “logical fence” as a boundary. If the asset goes outside of the boundary, the user is immediately notified via a message (call, email, text). This is useful in terms of theft protection. One application of particular focus for SkyTrace is tracking laptops. This application is material due to the theft in the market. Some statistics to support this effort are: • Safeware The Insurance Agency claims that over 600,000 laptops are stolen annually, resulting in an estimated $5.4 billion loss of proprietary information. • According to the FBI, 97% of stolen computers are never recovered.
  • 5. 5 • Laptop theft accounted for 50% of reported security attacks. CSI, The 12th Annual Computer Crime and Security Survey, 2007 • Lost or stolen laptops and mobile devices are the most frequent cause of a data breach, accounting for 49% of data breaches in 2007. Ponemon Institute, U.S. Costs of a Data Breach, November 2007 • 12,000 laptops are lost in U.S. airports each week, and two-thirds are never returned. (Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008) Cargo / Asset Protection • Web or PDA Web locate capabilities – immediate results • Can also locate from cell phone for immediate results • Geo-Fence – pre-set border control by the user • Connect with expensive shipping materials that require security measures Telematics Public Transportation Management, Intelligent Transportation Systems (ITS), workflow, mobile job planning, M2M Applications – Pay As You Drive. Here is a true M2M Application that is being rolled out commercially that will impact you. The application allows users to pay for car insurance based on usage. You pay for as much as you consume – you drive 100 miles you pay insurance for 100 miles – you drive 100,000 miles you pay insurance for 100,000 miles. This is could change the face of the car insurance industry and if widely adopted / deployed on a standardized platform will allow other ancillary products and services to be offered to car drivers – Internet, Yellow Pages, Drive By/Localized Ad’s (won’t we love that), Streaming Music (everyone one wants a radio on the car) and more. The application (PAYD) as you go is being used by insures in UK/Europe to offer drivers a means to pay for insurance based on actual miles driven. The cars have a built in GPS system that track the movement of the vehicle in real time – where you drive, when you drive and how often you drive (AKA Big Brother). Cool technology concept – but to make it a commercial success it needs to assuage consumer fears about Big Brother is watching. SmartGrid initiative The Smart Grid refers to the introduction of new information and control technologies to the electricity system that allow the system to be planned and operated in a dynamically-optimized manner. An example of such technology is the smart meter, which provides new information and communication ability
  • 6. 6 for utilities to use to better manage and reduce the cost of their business operations. Another example is new technology that automates and increases the operational efficiency of substations and other parts of the utility infrastructure. The smart grid is not limited, however, to infrastructure or the smart meter. It goes into the home or business by way of new pricing, control, and information options that help users reduce their usage and their bill. It will also connect to smart appliances that will automatically accept price and control signals that allow them to be used in a way that better supports grid optimization and attainment of climate change goals. Demand Response, for example, is the practice of incentivizing customers to modify their electricity usage in ways that help make the electric grid more efficient and reliable, particularly during periods of peak demand. Because demand response reduces peak demand, it complements resources that tend to be available during off-peak periods, such as wind energy. Demand response, in this way, supports the use of greater amounts of renewable energy. The smart grid also includes important new technologies such as energy storage and plug-in hybrid electric vehicles (PHEVs). Energy storage is a form of demand response that allows renewable energy to be used not only when it is produced but also when it is needed. With storage options, peak demand can be met by renewable energy generated during off-peak periods. PHEVs, meanwhile, have the potential to be mobile energy storage units. They charge from the grid, store electricity they don’t use, and have the ability to return excess electricity to the grid during peak demand periods.