Advertisement

Rabu, 20 Juni 2012

It's Not the Airflow but the Dataflow of the Car for Airbiquity - M2M Evolution

If you have trouble viewing this email, click here to view online.
6/20/2012

  Featured Articles



  Sponsored By: M2M Evolution Conference & Expo - Austin, Texas


At M2M Evolution Conference in Austin, Texas, you can meet and mingle with experts in transportation, security, health, cold chain, automotive, and safety to discuss the strategies for M2M growth as well as the new business of proactive response centers - people who use M2M technology to buy time and avoid risk.

Technology companies ranging from wireless carriers, platform companies, and device manufacturers will present and discuss their roles in creating effective technologies and procedures that work to create an ecosystem for actionable data and information. At M2M Evolution, you are face-to-face with companies merging M2M Technology with the business needs of the deploying enterprise.



  Top Stories



  From The Expert Corner


June 20, 2012

It's Not the Airflow but the Dataflow of the Car for Airbiquity


When it comes to M2M, the automotive industry has been leading the pack in managing multiple requirements from multiple sources. The manufacturer, the insurance agency, the fleet owner and of course the driver have a lot of disparate needs.


Getting a handle on what is needed brings us to Airbiquity, who has a role in supporting solutions in various degrees for BMW, Ford, GM’s OnStar and Nissan.  I had the chance to interview Leo McCloskey, VP of marketing, at Airbiquity, to discover what is driving the company’s success.  If you have ever wondered about how M2M is impacting telematics, Leo is a great resource to find out (as you will see in this interview).  


CF: Airbiquity provides policy control for telematics services via the cloud and you have pointed out an expansion of cars enabled with network services. What is your expectation for the information flow?

LM: Well, there are multiple information flows, each with its own security profile. For example, there will be embedded radios in vehicles that enable the product to report its operational performance to the manufacturer. This requires data flows to and from the vehicle systems, which requires a more exacting level of security. After all, a compromised vehicle is a serious risk to road safety for everyone... Read More


   Featured Videos



   Featured Resources



  Featured Channels



  Visit www.m2mevolution.com for the Latest Machine to Machine News & Info



  Advertise With Us


  General advertising Info: Click here   


  Become a TMCnet columnist!


Interested in reaching M2M Evolution's Global M2M Communications and Technology Audience of 80,000 Unique Visitors? Please contact Matthew Gleeson to learn how at mgleeson@tmcnet.com or 1 (203) 852-6800 x145.



This email was distributed by: Technology Marketing Corporation, 800 Connecticut Avenue, Norwalk, CT 06854 As a valued reader or attendee of TMC's publications and events, you will occasionally receive carefully-screened offers and free product information via email. If you no longer wish to receive this type of email, please go to http://www.tmcnet.com/enews/subs.aspx?eml=ipat39@gmail.com to adjust your preferences.


Tidak ada komentar:

Posting Komentar