Remote - M2M Special Issue 2013 - (Page 8)

Feature Article Optimizing Remote Monitoring in the Cloud Laurent Assaf, Director, Cinterion SensorLogic Application Enablement Platform, Gemalto The media seems to agree that the next big thing in the world of technology is the Internet of Things (IoT), which allows equipment, devices and objects to ‘talk’ to each other, allowing smart decisions and more efficient operations. The IoT market more than tripled between 2010 and 2012 to 15 billion connected devices and machines worldwide, according to a recent study by IDATE1. By 2020, IDATE predicts that 50 billion objects will be integrated into the growing web of connected machines. It’s easy to imagine how a world of smart buildings, road signs, vehicles and objects could save money, time and resources and make life easier and safer. What is much less clear is how it all works together and what is the best way forward. Machine-to-Machine (M2M) technology that utilizes cellular networks is one of the major components in the engine behind the IoT. In M2M, traditional value chains have been fragmented, complex, and the time-tomarket has been long. But the marketplace is changing and M2M leaders are introducing new solutions and services that simplify and speed development. Sensors, wireless modules, security solutions and cloud computing. All these technologies are coming together to pave the way for innovative applications, especially in remote monitoring, that were simply not practical just a few short years ago. For instance, the latest M2M technology makes it possible to instantly update digital road signs with real time traffic information based on data captured from sensors embedded along roadways. It enables industrial automation solutions that allow plant managers to monitor equipment in real time via a web portal and to remotely adjust operations to optimize productivity. It can be used in smart energy solutions to integrate solar and other sustainable sources into the grid. Simplify and Streamline: End-to-End M2M At last year’s Mobile World Congress, Gemalto presented a new paradigm for building the IoT by introducing a unique combination of compatible, end-to-end Cinterion M2M technologies. These include: a range of advanced M2M wireless modules enabling reliable communications, ruggedized Machine Identification Modules (MIMs) for secure connectivity to mobile networks, flexible subscription management services for wireless subscription management, and an enhanced cloud-based platform for application enablement that seamlessly connects assets and enterprises. This unique, full-spectrum offering provides a one-stop shop for enterprises looking to simplify M2M technology integration. The Cinterion technology platform can be used for any vertical market application whether in remote asset management, smart building technology, tracking or tracing, smart energy applications and beyond. Gemalto’s intelligent integration of embedded Java technology serves as a hub connecting all technology elements and it helps to simplify and speed M2M solution development, which in turn, accelerates the ever-growing IoT. With Java, software application development is decoupled from the long cellular device approval process allowing simultaneous development of hardware and applications, which eliminates many months from the overall timeline. 8 Equally important, it opens the M2M playing field to the massive Java development community. Gemalto recently launched a new cost effective Java-based development kit that allows M2M prototyping within hours versus weeks or months. And as the M2M groundswell finally hits this creative and passionate group of technology developers, one can guess that the marketplace will surge even more. Integrating “Big Data” with Cloud Based Application Enablement Until recently, integrating big data from M2M applications back into the enterprise was one of the biggest sticking points of M2M development requiring individual software applications for every M2M solution. However, a new breed of cloud-based services is revolutionizing the method for accessing M2M intelligence. The SensorLogic application enablement platform marries a cloud-based infrastructure and a ‘platformas-a-service’ delivery model. In addition to MNOs, it can also be used by system integrators, enterprise IT teams, equipment manufacturers, network operators, software vendors or anyone else who wants to deliver managed M2M services. By handling the complex underlying architecture required in virtually all enterprisegrade M2M applications, cloud-based platforms allow development teams to move forward faster and more effectively with their M2M initiatives. To be optimally effective, platforms should be device agnostic allowing enterprises to build innovative, flexible and scalable applications regardless of the hardware and at a fraction of the cost of other alternatives. Most top-tier solutions allow hosting in-house by the integrator or outsourced to a dedicated data center. The Cinterion SensorLogic Application Enablement Platform: A Layered Approach The SensorLogic platform connects virtually any type of device over SMS/IP connection and moves beyond simple connectivity to produce actionable business intelligence and provide commands and events to manage remote assets in real time. Layer One: Network and Device Management The SensorLogic platform facilitates gathering and normalizing of data from any type of device or sensor. This normalization process allows applications to apply common software code to the incoming data regardless of source or format. It also enables data to move fluidly and cohesively across different kinds of networks. At this layer, the platform enables integrated management of multiple devices as well as network provisioning and activation services. These capabilities can work across different wireless network operators’ environments across the globe allowing integrators to remotely add, manage or delete devices from backend systems. Layer Two: Event Processing As the brains of the platform, this layer is where collected data is augmented, from web applications or enterprise systems, and processed and analyzed. Event processing, starting with simple rule-based processing, can identify important criteria such as when device data has surpassed

Table of Contents for the Digital Edition of Remote - M2M Special Issue 2013

Towards Right-Sizing Security for M2M Solutions: A Practical Approach
Intelligent Power Distribution for M2M Communications
Optimizing Remote Monitoring in the Cloud
Exponential M2M Market Growth Calls for Innovative RF and Antenna Solutions
Benefits of Using Wireless Networks to Automate FAA-Mandated Obstruction Light Monitoring Requirements
Energy Management Systems For Green Buildings
M2M Products and Services
Industry News

Remote - M2M Special Issue 2013