Welcome!

Mobile IoT Authors: Jason Bloomberg, Zakia Bouachraoui, Kevin Benedict, Pat Romanski, Yeshim Deniz

Related Topics: Mobile IoT

Mobile IoT: Blog Feed Post

SAP Enterprise Mobility and M2M in Your Company

Canal and irrigation management systems are regularly using M2M technology today

Last week I spent some time with SAP's Sanjay Poonen discussing M2M (machine-to-machine) communications.  I came away from that discussion excited that SAP was focusing on this emerging market that I have found so fascinating. Most IT departments have been so focused on figuring out how to implement enterprise mobility and support communicating with people using smartphones, tablets and other mobile devices, that they have not yet thought about communicating with mobile and/or remote machines.

Here is an excerpt from the article I wrote last week about my discussions with SAP's Sanjay Poonen on the topic of M2M.  "Sanjay and I spent quite a bit of time talking about where mobile security is going, beyond MDM.  From MDM to Mobile App Management, to Secure Content Management, to eventually M2M (machine-to-machine) communications.  He talked about how this field will have a big impact in SAP’s plans.  In fact, Sanjay had just chaired a conference call with about 50 SAP internal people to brainstorm about M2M, and there is a great deal of excitement around SAP’s plans in this area."

Perhaps it is early, but not too early to begin pondering the strategic value of M2M in your company.  What machines, sensors, facilities, security systems, vehicles, plant equipment, supplies and materials would it be valuable for your ERP and other systems to automatically communicate with?  What automatic monitoring data would be useful for your operations?

Canal and irrigation management systems are regularly using M2M technology today in remote sensors to record and wirelessly transmit water levels, the statuses of gates and to adjust water levels.

Utility companies are one of the biggest users of M2M technologies.  Their assets (lines, substations, transformers, pipelines, storage tanks etc) are in remote locations and remote M2M sensors and wireless chips can monitor their statuses and report to a central location.


Fleet management systems also take advantage of M2M.  Vehicles report their location, speed, fuel usage, hours of operation, repair and maintenance needs all automatically using M2M.  This is machine's sending data automatically to other machines.

Vending machine companies today are widely using M2M technologies that enable their vending machines to automatically report inventory levels and other information from the kiosk or vending machine.  You can imagine the savings in efficiencies if the route driver knows in advance exactly what each vending machine needs, and when it needs it to maximize sales and productivity.

Manufacturing plants can be revolutionized by the use of M2M technologies.  Can you imagine having a central team managing plants around the world from one location that is receiving and processing M2M communications from all of the equipment in all the plants?  Wow!

Large companies can end up having massive amounts of M2M data flowing into the company.  The next challenge of course is what to do with it.  M2M data looks just like data coming in from a smartphone.  The data from a Yes or No answer on a smartphone app, looks just like M2M data reporting the gate is open in yard #3.  IT departments need to ensure the data is secure and accurate.  They need to monitor and track all of their M2M technologies and wireless embedded chips to ensure they are working properly and the data is good.  This data needs to be integrated with the right systems.  The systems need to understand what to do with it.

M2M communications can be the front-end data collection mechanisms for many systems. The automated inputs for all kinds of business processes.  Big Data technologies and business analytics to quickly interpret the meaning of all the data and to translate it into a form that can help managers make good real-time data driven decisions in the field.  These alerts and notifications can be sent to the mobile devices of managers no matter their locations for quick and immediate responses.

M2M systems can reuse many of the same mobile middleware, mobile device management, integration, provisioning and security components that are used for supporting enterprise mobility today.  The main challenge will be developing an enterprise-wide M2M strategy, and since this is also the big challenge with enterprise mobility, we may have to wait in line.

ILS Technology is an SAP Partner

*************************************************************

Kevin Benedict, Mobile Industry Analyst, Mobile Strategy Consultant and SAP Mentor Alumnus
Follow me on Twitter @krbenedict
Full Disclosure: I am an independent mobility analyst, consultant and blogger. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...