« | Main | »

23 November 2011

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d8341cc2f653ef0162fca83fe9970d

Listed below are links to weblogs that reference :

Comments

Nike Jordan Heels

Another point of concern is that connectivity leads to many other requirements and these are often underappreciated. As soon as you connect an embedded device, a string of requirements come into play. How will the device be managed? The devices may be deployed far from the IT department or in hard to reach locations, so don’t plan on a truck roll to plug in and troubleshoot. What protocols will be used? Some M2M protocols are more common, but others are just emerging. Sourcing components and then developing and integrating the software can be interesting. Security is a must have. What about the cloud, upgrades, etc.? Will there be some mission-critical aspects which require additional reliability or performance? Don’t forget about the second “M” as that’s important too. You can’t have M2M without it!


The comments to this entry are closed.

Subscribe in NewsGator Online

September 2014

Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30        

Become a Fan