This sounds like a James Cameron futurist movie where the machine would take over the world, right? No, we are far from fighting with guns to survive our technology evolution.
The last decade we saw explosion of Internet services which helped in the development of companies businesses by boosting their sales processes, advertisement, services or product promotion. The infrastructure putted in place is opening the gate to a new area: technology convergence. We are seeing the TV going Web, the Web going Cell phone, the cell phone going computer (Windows CE, iPhone) which is the intersection results of different infrastructure and services: Telecom, information and broadcasting networks.
1. What’s the deal with M2M or M2M2H?
By T Laurent, CEO @ TopTechies.net
MACHINE TO MACHINE?
MACHINE TO MACHINE TO HUMAN?
This sounds like a James Cameron futurist movie where the machine would take over the world,
right? No, we are far from fighting with guns to survive our technology evolution.
The last decade we saw explosion of Internet services which helped in the development of
companies businesses by boosting their sales processes, advertisement, services or product
promotion. The infrastructure putted in place is opening the gate to a new area: technology
convergence. We are seeing the TV going Web, the Web going Cell phone, the cell phone going
computer (Windows CE, iPhone) which is the intersection results of different infrastructure and
services: Telecom, information and broadcasting networks.
The first participants of this chain of value were the consumers, craving for information vector of
every day’s life facilitation, entertainment (Easy access to music, video), in a nut shell the B2C
(business to consumers), then companies understood the Internet would be a great way to interact
with others: the B2B (Business to Business). So what was really missing here? The next missing link of
this value chain is the way that machines would interact with each other to provide intelligence in
the decision processes, in the optimization of industrial processes, in bringing comfort of services to
human with instant valuable information… The M2M and the M2M2H was born.
Factors of M2M/M2M2H development
Several factors were necessary to boost the development of this technology, and we will discover
that was not related to a factor of processing power but linked to miniaturization in telecom
capacity. The cell phone technologies evolution of was quite surprising the last decade, cell phone
Size shrank from a military talkie walkie to the dimension of a credit card to grow back to the size of a
70TH Ti mini- computer. Going through this variation process we gained autonomy, power and
intelligence for the best of our everyday life’s organization. But we gain also the capacity to move
this technology to others domains such as the industrial processes. We can bring small processor to
run minimal computer services to the gate of the Internet. That was the key point of M2M genesis,
bringing information capacity to devices. Therefore giving data capacity transport to industrial
processes will lead to better control processing, servicing. The convergence of the industry with
information world is opening the gate to a tremendous growing market opportunity. The’ M2M or
M2M2H represented about $20 Billion market in 2009 and is poised to grow to more than $200 b.
2. M2M, so what?
Now that we can make machine speaking with each other what do we do with it? Let’s understand
the real implication through the following schema:
schema
ENVIRONMENT
Lighting
Fridge
HVAC
RFID
Server room
Data measure
Temperature Thermostat
hermostat Humidity Switch GSM Alert Motion Monitoring
Control by
sensor
MACHINE TO MACHINE
Connectivity
Ethernet cable
Gateway
Execution dispatch
Internet Intranet
Communication
Infrastructure
Information GSM
Decision
WEB APPS & Services
AND/OR
Business Intelligence
Information
Decision
MACHINE TO HUMAN
5. How far can we go using M2M, M2M2H?
We can talk about philosophy in the next hundred pages, it would not help to understand how far we
t
can go. Therefore through a set of examples we will try to demonstrate in some extend the footprint
and the potential complexity of M2M/M2M2H solutions.
Moto-Taxi on the run… Who hasn’t be struggling with Taxi in Paris?
… hasn
I walk in the street and suddenly I realize I am horribly late to my meeting. I do need a
solution… A moto Taxi! I pull out of pocket my iPhone, check “myBikes” application sending a
request to their services, their web site monitor in real time the location of their driver
their
because each of them is equipped with an iPhone apps tracker incorporating their status
(free/booked). The platform is receiving my geo-localization by satellite. The first Moto-Taxi
geo zation Moto
available in my closest radius is receiving a message per my request. Meanwhile I receive the
name and picture of my driver including the Id of the vehicle. Few minutes later, I was on my
way straight to meeting… I will not be late.
We almost can
consider the Human
terminal (smart phone)
at that point like a
“machine”, this is
simple example of
merging & convergent
services
Geo-Localization Geo-Localization
Localization
Matching Service
Tracking info
Customer Info
Tracking info
Taxi Moto Info
6. Medical services…
My patient is diabetic and this is quite stressful to be obliged to check his status every two
hours was is his blood sugar level. His results can be communicated directly to a decision
center which would dispatch an alert to any available doctors in a specific radius if an
anomaly was detected…
Geo-Localization
Matching Service
Euglycemia
uglycemia
Measurement info
Tracking info
Doctor Info
Patient Info
There might be some ethical/security issue to debate regarding such type of applications, we
understand it very well, but this is not the subject we would treat as our goal is about to
show the diverse possibilities, domains and services to develop.
Energy consumption monitoring…
monitoring
Energy price climbing, is a great generator of idea to shut down the facet of waste in dollar
which is leading to solution involving a great example of full and complex M2M2H example.
Energy consumption in industrial/enterprise world is linked to business needs (computer,
industrial/enterprise
lighting, machine, chemistry/ industrial processes) but also to Human behavior. This is a great
example of antonymic network Energy and information does not mix easily even thought
electrical network is able to carry information with smart plugs. We will leverage in such an
example the very powerful capacity such a solution is involving. To control consumption the
first necessary thing to do is to assess how, when, where this energy is consumed but a also
what needs to be done to solve definitively the problem and how can we anticipate a future
defini
economy by establishing automated constraints and rules of management but also re re-
organizing the way tasks are scheduled to optimize electric supplier contrac contract.
7. Bathroom
Lighting
HVAC
Server room
Thermostat control
hermostat Switch
Temperature sensor
Motion
Control
Command Control
Command
Measurement info Status
Control
Internet Intelligent
Gateway
Data collection
command transfer
Alert emission
Master constraint
scheduler Alert Transfer
Business intelligence
Consumption analytics
SOAP complement platform
information services SAAS Registration
Constraint
Re-adjusting Platform
Information
Decision
9. RISKS AND OPPORTUNITIES…
FINAL CONCLUSION
Globally M2M or M2M2H is involving optimization processing and it is just a key piece of major
services asking for global business process vision. This can asks for consequent investments in
hardware, software, talented human resources and investment capitals. We are at the beginning of
this emerging technology and the business potential is absolutely incredible. Nevertheless of the
great value it will bring to the society, M2M/M2M2H is going to raise new serious ethic and security
issues. Intelligence is link to data processing which means a gate to new strings of viruses or cyber
attacks by hackers which consequences can be certainly more dramatic. We can easily imagine
Hackers trying to get control of all HVACs located in the Silicon Valley and trigger a major blackout.
Let’s not even imagine the consequences when human beings life is involved in the process... A new
source of revenue for anti-virus development firm for sure. After all, the worse enemy would be
what men are asking machines to execute…