Machine-to-Machine Communication (M2M)

March 1, 2016

M2M as an application holds the promise of bringing benefit to both telecom operators and vendors. For service providers it is an opportunity as low-bandwidth M2M services can be readily overlaid onto the current user services network. Vendors are expected to profit from selling both M2M-capable devices, and from the network expansion brought about by increased throughput. However, it comes with change in business model and value chain. There are questions regarding the role of operators in the value chain. Also, M2M services may have their own specific characteristics which might be different from services in which humans directly influence communication flow. The standardization in the direction of special handling or optimization of the network for M2M specific service will lead for better support of M2M communications.

Spotlight

Data I/O

Data I/O is the world’s leading global provider of advanced data and security programming solutions for flash, flash-memory based intelligent devices and microcontrollers. Since 1972 Data I/O has developed innovative solutions to enable the design and manufacture of electronic products for automotive, Internet-of-Things, medical, wireless, consumer electronics, industrial controls and other markets.

OTHER WHITEPAPERS
news image

Exploring the future of the network

whitePaper | January 6, 2023

The 5TONIC co-creation laboratory was launched in 2015 to provide an open environment where members from services, users and SMEs can collaborate with the telecom community on specific 5G mobile research and innovation projects. The aim is to support innovation and help organizations work together to develop and deliver market-ready 5G solutions, technology applications and business ventures. 5TONIC promotes joint project development, entrepreneurial ventures, discussion fora, events and conferences with focus on 5G mobile technology, supporting members along the technological cycle from research to practical business application.

Read More
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

Scaling IoT Solutions through the Power of Strategic Alliance

whitePaper | May 4, 2022

The COVID-19 pandemic has undoubtedly pushed organizations over the tipping point for digital transformation. The growing need for remote access, online monitoring, distributed manufacturing processes, and predictive maintenance is accelerating the adoption of next generation technologies by years.

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More
news image

Securing Devices in Advanced Metering Infrastructures

whitePaper | January 8, 2020

Smart grid managers and Head End System (HES) vendors depend on data to drive their business. Receiving and analyzing accurate data from grid endpoints - the smart meters - is the main element that determines business success. Their customers, Distribution System Operators (DSOs) and Advanced Metering Infrastructures (AMI) managers, then use this data for crucial processes: monitoring energy demand and production, load shifting to maintain a persistent grid balance at all times and billing customers. Each tiny bit of data is the starting point for monetization and asset management and it must be accurate and trusted in order to keep power flowing.

Read More
news image

IoT Redefines Brand Experience and Customer Engagement

whitePaper | February 8, 2023

The Internet of Things (IoT), with its ability to connect devices and enable data exchange through embedded sensors, is garnering much interest across industries. TCS Global Trend 1 Study 2015 , highlights some of the major business model changes that are taking place across industries due to the adoption of the IoT. For the Consumer Packaged Goods (CPG) industry, the IoT offers widespread applicability across the value chain. CPG companies are likely to benefit the most by embedding sensors in products or services that touch end users directly, helping them drive consumer engagement throughout the consumption lifecycle. The IoT will also enable CPG companies to understand consumer needs better, thereby improving product designs or service models, leading to better brand loyalty and top-line growth.

Read More

Spotlight

Data I/O

Data I/O is the world’s leading global provider of advanced data and security programming solutions for flash, flash-memory based intelligent devices and microcontrollers. Since 1972 Data I/O has developed innovative solutions to enable the design and manufacture of electronic products for automotive, Internet-of-Things, medical, wireless, consumer electronics, industrial controls and other markets.

Events