M2M Communications Turn Potential into Profit

| March 1, 2016

article image
Machine-to-machine technology offers infinite possibilities. With M2M, every raindrop, heartbeat and object in our daily lives can become part of a global, semi-autonomous mesh of digital interactions. M2M can bring order to a vast, non-sentient world. All of this makes M2M exciting – and problematic. There is no such thing as a ‘typical’ M2M deal, tariff or profit margin. But communication service providers need to understand the dynamics of value and cost in order to secure a successful role in M2M. This white paper sheds light on today’s M2M market and predicts its potential evolution, based on analysis of current ecosystem development. It draws on a global survey of more than 250 M2M stakeholders across 50 countries and 15 field interviews conducted by Informa Telecoms & Media.

Spotlight

Marchwood Integrated Ltd

Marchwood Integrated is a specialist IOT system designer and integrator with a range of solutions geared towards Industrial and Commercial Industry applications. Rather than focusing on ‘Big Data’ Marchwood Integrated aims to provide a “Practical Solution for the ‘Internet of Things’” by focusing on how our technology can be used to streamline business applications and solve existing problems on sites.

Employing knowledge from Technology, Business Development and Fire & Safety Sectors Marchwood Integrated is uniquely suited to provide a complete solution that takes into account the many factors at play on any particular site.

Innovation is a key requirement at Marchwood Integrated, and we pride ourselves on innovative applications of technology to meet a variety of objectives. Currently our main focus is on wireless mesh systems that due to the versatility of the technology can be applied to any situation where a number of different values or states requir

OTHER ARTICLES

Why You Need Contextual IoT Device Management

Article | February 13, 2020

In my previous post, I gave an explanation of basic IoT device management and why it’s insufficient for certain kinds of massive-scale IoT deployments. In addition to basic IoT device management, contextual IoT device management is necessary to ensure success when dealing with IoT solutions involving thousands to millions of devices. In this post, I explore some of the key aspects of contextual IoT device management, with real examples that demonstrate why you need to manage devices contextually if you’re building, buying, and/or implementing massive-scale IoT solutions.

Read More

From outside-in to inside-out: My take on IoT

Article | March 31, 2020

At IDC I co-founded a practice that studied the three dimensions of IoT: industry technology platforms, industry verticals and industry geographies. As an industry analyst, I had a front-row ticket to the IoT market and continually witnessed incredible innovations. Like many other experts, I kept my seatbelt buckled for what we expected to be IoT’s massive and dramatic take-off. While there has been uptake, real-world adoption and implementation have lagged the “hype.” In time, I found myself growing increasingly frustrated at the disconnect. What was the holdup? Knowing that industry analysts are beholden to the marketing messages that each company shares, I welcomed an opportunity to make the move from an outside-in analyst to an inside-out contributor.

Read More

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Spotlight

Marchwood Integrated Ltd

Marchwood Integrated is a specialist IOT system designer and integrator with a range of solutions geared towards Industrial and Commercial Industry applications. Rather than focusing on ‘Big Data’ Marchwood Integrated aims to provide a “Practical Solution for the ‘Internet of Things’” by focusing on how our technology can be used to streamline business applications and solve existing problems on sites.

Employing knowledge from Technology, Business Development and Fire & Safety Sectors Marchwood Integrated is uniquely suited to provide a complete solution that takes into account the many factors at play on any particular site.

Innovation is a key requirement at Marchwood Integrated, and we pride ourselves on innovative applications of technology to meet a variety of objectives. Currently our main focus is on wireless mesh systems that due to the versatility of the technology can be applied to any situation where a number of different values or states requir

Events