The world is secretly full of embedded cellular applications. It's called M2M for machine-to-machine, and it leads to new efficiencies for everything from the office coffee machine to the burglar alarm.
Has the service person ever shown up for the coffee machine at your office, even though nobody called? The reason is that someone, or rather some thing, did call. Specifically the coffee machine called the service company and it used the cellular network to do it.
One piece of the picture behind this is a technological field called M2M or Machine to Machine. The defining characteristic of M2M is that it's about devices independently communicating wirelessly, as opposed to a user-driven device like a smart phone.
Smart meters often "phone home" to the utility to report and receive instructions.
Examples are everywhere: the coffee pot in your office; the glucose monitor you wear for your diabetes; the burglar alarm system that uses cellular as a backup for central station monitoring in case someone cuts the phone lines; and the freestanding ATM in the convenience store. Now that you know about it, you'll be seeing examples that you didn't notice before.
M2M was a fairly common buzzword at the recent CTIA Wireless conference in New Orleans. I spoke to Sierra Wireless at CTIA about the business. Sierra is in a number of wireless markets; I have one of their mobile hot spots and the technology obviously has a lot in common. In fact, I'm tempted to think that drawing a distinction for M2M because it's not user-driven is an artificial one. They're just another kind of embedded cellular controller. But the term has certainly caught on.
You might have heard of this phenomenon years ago as the "Internet of things," although that term wasn't restricted to mobile devices but to all embedded wireless applications that were not user driven.
An irrigation pump connected to a Web-to-wireless controller. (Source: smartgrid.gov)
Such devices increase efficiency and save cost by automating data collection and remote management. Instead of having to send a meter reader out, the meter sends its data in.
You might wonder at the cost of using the cellular network in this way, but it can be done quite reasonably. These devices generally don't need high-speed access and don't call that often. Sierra Wireless said that it could be done for $1 per device per month. That sure beats sending out a tech to work on the device.
Sierra Wireless' controller product line is called AirPrime and is used in conjunction with the company's AirVantage M2M management system. Through the management system you can decide what to do with the data coming in and what instructions to send to the devices.
M2M is more than just efficiency. Imagine a vending machine that is running out of Diet Coke the day before your historical data shows high traffic for that product. Now you know to send someone out to fill the machine. In fact, you probably don't have to send them; the management system can be programmed to do so.
Much innovation in technology happens under the covers, in places where normal people don't look. Peek under the cover these days and you might see some machine phoning home to the mothership.
The Dog Positioning System from Telit Wireless Solutions uses GPS and a cellular transmitter to locate lost dogs.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.