With M2M, A Little Bit Goes A Long Way

Smith, Brad
October 2004
Wireless Week;10/1/2004, Vol. 10 Issue 20, p38
Trade Publication
Assesses the emerging market for machine-to-machine (M2M) communications as of October 2004. Use of M2M communications for vehicle and asset tracking or monitoring utilities; Benefits from using M2M communications; List of M2M module providers.


Related Articles

  • How to collect data at its source. Anand, Valerie // Accountancy;Dec1972, Vol. 83 Issue 952, p100 

    The article presents information about source data collection. Source data capture is a method of converting information into ready-for-processing form at the point where the information in question originates. The most common ways of sending source documents to the processing center are through...

  • Error-control coding options abound. Jacobsmeyer, Jay M. // Mobile Radio Technology;Feb2006, Vol. 24 Issue 2, p38 

    The article focuses on the coding techniques for modern land mobile radios. These techniques include the automatic repeat request, forward error correction and interleaving and concatenation. An error-detection code is used to request repeated transmission of errored code words until they are...

  • NYSE picks Netezza for marketing monitoring.  // Data Strategy;Jun2009, Vol. 6 Issue 6, p5 

    The article focuses on the use by NYSE Euronet of its Netezza data warehouse appliance for daily tracking of 400 terabytes of information. It is stated that the company needs to perform data processing without the addition of processes. The running of surveillances at Netezza between the day's...

  • RFID data cleaning tips. Brandl, Dennis // Control Engineering;Aug2006, Vol. 53 Issue 8, p28 

    The article focuses on the need for clean data transfer from the radio frequency identification (RFID) tags to the reader. Angles, interfering environmental materials and phantom tags are the main factors affecting the level of accuracy required for gathering clean RFID data. It suggests that...

  • Dunking the data. Petersen, Scot // eWeek;6/16/2008, Vol. 25 Issue 19, p28 

    The article offers detailed information on how the data during National Basketball Association (NBA) Finals was being collected. Data collection starts right at courtside where NBA's Precision Time System connects the scoreboard and shots clocks right to the referees' belt units and whistles and...

  • To 40 Gigabits and beyond. Anderson, Stephen G. // Laser Focus World;Feb2008, Vol. 44 Issue 2, p9 

    The article reports developments surrounding the data transmission systems in the U.S. One recent advancement is transmission of single-channel data streams at 40 Gigabit per second. Also seeing serious commercial deployment is fiber to the home/node/business. Meanwhile, work continues in the...

  • Understanding your options when implementing RF in 802.16. Hamid, Zatil // Portable Design;Jun2005, Vol. 11 Issue 6, p14 

    This article discusses options in the implementation of RF in 802.16, which aims to enable affordable high-bandwidth wireless broadband access to a broad base of customers. The design of an 802.16 RF system naturally varies between the customer premises equipment (CPE) and base transceiver...

  • DAB data-casting holds potential for high bandwidth. Prabakaran, D. // Portable Design;May2004, Vol. 10 Issue 5, p36 

    Digital convergence allows content and service providers to deliver their services through multiple delivery channels. As such, consumers can access services over various terminals capable of consuming multimedia content. That blurs the lines between the conventional broadcasting industry and...

  • Symmetric Adiabatic Logic Circuits against Differential Power Analysis. Byong-Deok Choi; Kyung Eun Kim; Ki-Seok Chung; Dong Kyue Kim // ETRI Journal;2010, Vol. 32 Issue 1, p166 

    We investigate the possibility of using adiabatic logic as a countermeasure against differential power analysis (DPA) style attacks to make use of its energy efficiency. Like other dual-rail logics, adiabatic logic exhibits a current dependence on input data, which makes the system vulnerable to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics