Machine to Machine Communication

Published on December 2016 | Categories: Documents | Downloads: 51 | Comments: 0 | Views: 291
of 4
Download PDF   Embed   Report

Comments

Content

Machine to Machine Communication - CIO.com

http://www.cio.com/article/14652/Machine_to_Machine_...

White Papers

Webcasts

Solution Centers

IT Jobs

Council

Events

Magazine

Newsletters

RSS Follow CIO:

NEWS
DR ILLD OW NS Applications Careers

ANALYSIS
Cloud Computing

BLOGS
Data Center

SLIDESHOWS
Mobile

VIDEOS

HOW TO
Security

Operating Systems

Outsourcing

Virtualization

Web 2.0

All topics

Machine to Machine Communication
on Fri, November 18, 2005 Leave a comment

You are here: Technology Topics » News Feature

Most Recent Technology Topics Stories

Tweet it!

Email

CIO — Imagine things like doorknobs, toasters and lightbulbs communicating with each other in a network that far exceeds anything we know today. The concept, often referred to as ubiquitous computing, isn’t new. What’s new is that technologies are now emerging to make it happen sooner than many of us imagine. That is the key message of a report "The Internet of Things," which was presented Thursday at the World Summit on the Information Society (WSIS) in Tunis, Tunisia. The report points to four key technologies, all at advanced stages, that will enable ubiquitous network connectivity: RFID (radio frequency identification) tags, sensor, embedded intelligence and nanotechnology. In this new world, for instance, clothes embedded with chips will communicate with sensor-equipped washing machines about colors and their suitable washing temperatures and bags will remind their owners that they have forgotten something. The result will be billions of new Internet "users" in the form of objects that will push humans into the minority as generators and receivers of ’Net traffic. "There are challenges, such as standards and governance of these resources, but we’re moving toward a world in which the many things around us will soon be communicating with each other without any interaction from us," said Lara Srivastava, telecommunications policy analyst at the ITU. Machine-to-machine communication, already happening today, will gain substantial traction over the next few years, said Srivastava, who presented the report at a news conference in Tunis. At a panel discussion, MIT Media Lab Chairman Nicholas Negroponte spoke of his vision of an entirely new networked world, far more ubiquitous than the network of computers that we now have linked to the Internet. "Things will play an important role in the Internet themselves," Negroponte said. "The future is a meshed network of things. Objects will speak to other objects via other objects." A big advantage of a meshed network, according to Negroponte, is that all these connected, embedded devices can cooperate and help each other. "Failure won’t be as binary," he said. A similar view is held by Jonathan Murray, vice president and chief technology officer of Microsoft Corp.’s EMEA (Europe, Middle East, Africa) region. "Software will make these devices smart and able to communicate end to end," he said. "In this new world, it’s not about personal computing but about community computing and sharing information." Despite all the benefits such a ubiquitous network society could bring, John Gage, chief researcher and director of the science office at Sun MicrosystemsInc., warned of "the very deep implications" of this new world. He pointed to the ability of technology to gather increasingly more information about us. "Every Google search you do is retained forever," Gage said. "And look at how RFID tags can track your location. When identity and location structures overlap, we’re no longer anonymous." A big concern, according to Gage, is that certain groups, like the police, are predestined to want to know everything. "So privacy, get over it; we’re going to become a different kind of society," he said.

Digg

Share this article

Newsletter Sign-Up

White Papers »
Enterprise Enabler & The Microsoft Integration Stack
Understanding the Microsoft integration stack and how Enterprise Enabler® connectivity software easily fills gaps in specific verticals for areas Microsoft has not yet developed.

Paradigm Geophysical Gains New Perspective on Critical Business Data
Leading provider of software solutions to the global oil and natural gas exploration and production industry enhances management of global operations with timely and efficient reporting of business performance across multiple departments through Microsoft Office SharePoint combined with Enterprise Enabler.

Hosted Virtual Desktops Are the Catalyst Behind Changing How Organizations Manage Storage
Hosted virtual desktops (HVDs) will oblige organizations in provisioning significantly more storage for end-user data. As such, the expected growth in storage needs will likely force a re-evaluation of current tools, budgets, support and processes associated with PC data.

NetApp And VMware vSphere Storage Best Practices
NetApp technology enables companies to extend their virtual infrastructures to include the benefits of advanced storage virtualization. NetApp unified storage platforms provide industry-leading technologies in the areas of storage efficiencies, instantaneous virtual machine and datastore cloning for virtual servers and virtual desktops, and virtual data-center backup and business-continuance solutions.

Storage Infrastructure Considerations in a Virtual Server Environment
his Gartner research indicates which storage considerations need to be taken into account by an IT manager when starting server virtualization projects or improving the productivity of existing server-virtualized environments. It also highlights what can and cannot be achieved with today's storage technologies and solutions.

Tucson Electric Power Saves with Server and Storage Virtualization
Find out how NetApp and VMware enable customers to

1/4

2010/8/27 11:49

Machine to Machine Communication - CIO.com

http://www.cio.com/article/14652/Machine_to_Machine_...

Governance could also be a challenge in such a massive peer-to-peer network, Gage said. By John Blau, IDG News Service
© 2010 CXO Media Inc.

improve disaster preparedness while saving money. Today, at customer Tucson Electric Power, almost 90% of servers are virtual, 100% of daily backups can be performed within a 24-hour window, disaster preparedness is greatly improved, regulatory requirements are met, and the IT infrastructure is ready for the future. Download this report to learn more.

Comments | Add yours below

Share this article

Print

Webcasts »
CTO Perspective on Virtualizing
Brian Denton, CTO of ExamWorks, discusses his organization's technology solution that utilizes NetApp®, VMware®, Cisco, and secure multi-tenancy. He also explains ExamWorks' strategy of virtualizing Microsoft applications and using a virtual desktop infrastructure.

$firstKeyword

More Technology Topics Articles »

View All

Women Adopt Mobile Web At Growing Rates, Says Opera Google Overtakes Microsoft in Japan Brand Ranking Facebook Pledges to Improve Chat Feature EMC Offers Upgrades to Automated Tiering, Clariion and Celerra Arrays Microsoft Leaks IE9 Look, Reveals 'Chromifying' Ring! it's Gmail's New Voice Feature Calling Red Hat Offers Its Cloud APIs As Industry Standard Windows and Linux Servers Grow At Unix's Expense Social Security Administration to Award Massive Network Deal Get this RSS feed

Escalating Threats and Exploding Social Media are Increasing the Cyber Security Challenge
With almost everything now connected through the Internet, organizations become more vulnerable to cyber intrusion. As a result, cyber security is a senior management issue, not just a technical problem. Join Accenture and Forrester to explore the current global cyber security situation and learn how your organization can adopt a proactive cyber security approach.

Consolidate and Virtualize Windows Applications
Listen to this on-demand Webcast and hear Chris Rima of Tucson Electric Power discuss how his organization managed data growth and improved performance with storage and server virtualization. You'll also hear Brian Garrett from ESG and NetApp experts discuss ways to consolidate your Windows® application data, files, and virtual machines to help you: * Simplify daily management tasks, reducing overhead by up to 60% * Better protect Windows data, reducing disruptions by up to 50% * Provision storage within minutes and efficiently meet data growth within budget

The Emerging Future: System of Systems

White Papers »

All White Papers

The emergence of ultra-large System of Systems (SoS) promises efficiencies and capabilities for the creation and delivery of societal services. This smarter planet requires new ways of thinking, planning, development, delivery, deployment and operation. Bruce Powel Douglass will talk about the issues and potential solutions for the System of Systems space.

Staying Ahead of the Enterprise Mobility Curve
Join Lee Weiner, Director, Support and Collaboration Technologies, LogMeIn, and guest speaker Ben Grey, Senior Anal...

The New Normal Imperative: Secure Mobility
The economic downtown has forced many companies to rethink the way they approach IT. CIOs are increasingly being asked how they can drive competitive advantage through technology. Many organizations have recognized that workforce mobility and collaboration are important drivers of increased productivity. These forces are creating a new challenge: the need for dynamic security. In this webcast, Phil Go, CIO of Barton Malow, discusses how this leading national construction firm is tackling these issues, along with the technology he is adopting to ensure mobile security.

Newsletter Sign-Up »
Receive the latest news test, reviews and trends on your favorite technology topics

2/4

2010/8/27 11:49

Machine to Machine Communication - CIO.com

http://www.cio.com/article/14652/Machine_to_Machine_...

IT Jobs »
See All Jobs » Post a job for $295 »

Jobs powered by SimplyHired

Enterprise Enabler & The Microsoft Integration Stack Paradigm Geophysical Gains New Perspective on Critical Business Data Hosted Virtual Desktops Are the Catalyst Behind Changing How Organizations Manage Storage NetApp And VMware vSphere Storage Best Practices

Best Practices for Design, Architecture and Management Windows Data Consolidation in Mid-Sized Virtual Server Environments Consolidate and Virtualize Your Windows Environment with NetApp and VMware NetApp Storage for Windows Environments: Challenges and Solutions ESG Lab Report: Unified Windows Storage Consolidation

Storage Infrastructure Considerations in a Virtual Server Environment TechOnTap: Consolidating Windows Storage and Servers Yields Big Benefits Tucson Electric Power Saves with Server and Storage Virtualization Keeping Your Data in the Clouds and Your Feet on the Ground Top Considerations for Virtualizing Microsoft Applications on VMware and NetApp The Extended Enterprise: Manage Complexity, Cost and Compliance Communications: The Next Wave in Cloud-Bound Applications Five Network Security Threats and How to Protect Your Business Discovering Improved Data Protection Strategies Mobile Security: The Essential Ingredient for Today's Enterprise ESG Report: Shared IT Infrastructure Considerations

Sponsored Links
How Does Your IT Environment Measure Up? The Benefits of an Advanced Storage System Get High-Performance Storage while Lowering Costs Special report on how business analytics links to ROI. Fastforward server ROI. Realize all the possibilities of virtualization. Choose imageRUNNER ADVANCE for effortless print device management. Can mobile workforce solutions reduce cost without Business Analytics at the Speed of Thought. 10-75x Performance Gains. Learn More. SecureWorks: See why 85 of the Fortune 500® trust us with their info security Compuware optimizes app performance across the Enterprise Reduce Storage Costs through Virtualization Top 10 Storage Initiatives IT is Undertaking this Year Introducing free BlackBerry Enterprise Server Express Download the Forrester Study to learn how 305 IT decision makers are protecting their corporate secrets

Resource Center
buy a link »

3/4

2010/8/27 11:49

Machine to Machine Communication - CIO.com

http://www.cio.com/article/14652/Machine_to_Machine_...

compromise? View Now Information for the Mobile Workforce. Learn More Here. Learn how to maximize your website search in four easy steps

and Internet Google Search Appliance Helps Make Government More Efficient Simplifying Risk Management: Is Your Company Measuring Up?

Skip to top

Follow CIO on Twitter Fan CIO on Facebook Sign up for Newsletters Subscribe to CIO magazine Watch Videos
© 1994 - 2010 CXO Media Inc. a subsidiary of IDG Enterprise About CIO

Join CIOs on LinkedIn Get CIO on Mobile View Slideshows

The IDG Network
CIO Computerworld IDC IDG CSO DEMO Game Pro Games.net IDG Connect IDG Ventures

IDG Knowledge Hub InfoWorld LinuxWorld

IDG TechNetwork ITworld

ITwhitepapers Macworld

JavaWorld PC World

Network World

Contact

Privacy Policy

Terms of Service

Sitemap

Advertising

Executive Programs

Subscription Services

4/4

2010/8/27 11:49

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close