Subscribe to daily Feed

Delivered by Google Feedburner...


posted 5 months 4 weeks ago
Handoff procedures The process of transferring a call from one base station to another when a users radio signal becomes weaker at the first and strongest at the second base station. Weaker and stronger is quantified by a signal threshold level, which is above the minimum signal level for acceptable voice communication. Selecting this threshold level is critical to ensure f a. Unnecessary hand offs do not occur b. Call dropping does not occur Minimum acceptable signal level is between -90dbm and -100dbm, a slightly stringer signal is consider as handoff threshold. This margin is given by,  which is 0 to 6dbm.  cannot be too small or too large. If  is too large, unnecessary handoffs which burden the MSC may occur, and if  too small there may be insufficient time to complete the handoff before a call is lost due to weak signal conditions. Thus  has to be selected carefully. In diagram of improper handoff it is shown that handoff is not made and the signal drops below the minimum acceptable level to keep the channel active. This dropped event happens when excessive time is taken by MSC to assign handoff or when  is very small. To decide when to handoff it is important to ensure that the drop in signal level is not due the momentary fading but it is due to mobile moving away from base station. In order to ensure that base station monitors the signal level for a certain period of time before handoff is made. There are four types of hand off a. Hard hand off b. Soft hand off c. Mobile assisted hand off d. Intersystem hand off A. Hard hand off: Frequency channels are taken back by the older base station before new connection is established. This is break before make type of handoff. In this frequency channels are utilized properly but chances of drops are more. B. Soft hand off: Frequency channels are taken back by the older base station after new connection is established. This is break after make type of handoff. This is reliable but frequency channels are not utilized properly. C. Mobile Assisted hand off: In this a mobile scan signal strength of all base stations near to it and continuously reports the results of these measurements to the serving base station. Whenever signal strength of its current base station decreases and becomes less than the power received from the neighbouring cell, it initiates handoff. D. Intersystem hand off: This hand off occurs when the user moves from one MSC to another MSC i.e. from one cellular system to another cellular system while on a voice call. When mobile signal becomes weak in a given cell and the MSC cannot find another cell within its system to which it can transfer the call in progress intersystem handoff is implemented.
Like | 9 View | 818


posted 6 months 2 weeks ago
Telecommunications network, electronic system of links and switches, and the controls that govern their operation, that allows for data transfer and exchange among multiple users.
When several users of telecommunications media wish to communicate with one another, they must be organized into some form of network. In theory, each user can be given a direct point-to-point link to all the other users in what is known as a fully connected topology (similar to the connections employed in the earliest days of telephony), but in practice this technique is impractical and expensive—especially for a large and dispersed network. Furthermore, the method is inefficient, since most of the links will be idle at any given time. Modern telecommunications networks avoid these issues by establishing a linked network of switches, or nodes, such that each user is connected to one of the nodes. Each link in such a network is called a communications channel. Wire, fibre-optic cable, and radio waves may be used for different communications channels.
Switched communications network
A switched communications network transfers data from source to destination through a series of network nodes. Switching can be done in one of two ways. In a circuit-switched network, a dedicated physical path is established through the network and is held for as long as communication is necessary. An example of this type of network is the traditional (analog) telephone system. A packet-switched network, on the other hand, routes digital data in small pieces called packets, each of which proceeds independently through the network. In a process called store-and-forward, each packet is temporarily stored at each intermediate node, then forwarded when the next link becomes available. In a connection-oriented transmission scheme, each packet takes the same route through the network, and thus all packets usually arrive at the destination in the order in which they were sent. Conversely, each packet may take a different path through the network in a connectionless or datagram scheme. Since datagrams may not arrive at the destination in the order in which they were sent, they are numbered so that they can be properly reassembled. The latter is the method that is used for transmitting data through the Internet.
Broadcast network
A broadcast network avoids the complex routing procedures of a switched network by ensuring that each node’s transmissions are received by all other nodes in the network. Therefore, a broadcast network has only a single communications channel. A wired local area network (LAN), for example, may be set up as a broadcast network, with one user connected to each node and the nodes typically arranged in a bus, ring, or star topology, as shown in the figure. Nodes connected together in a wireless LAN may broadcast via radio or optical links. On a larger scale, many satellite radio systems are broadcast networks, since each Earth station within the system can typically hear all messages relayed by a satellite.
Since all nodes can hear each transmission in a broadcast network, a procedure must be established for allocating a communications channel to the node or nodes that have packets to transmit and at the same time preventing destructive interference from collisions (simultaneous transmissions). This type of communication, called multiple access, can be established either by scheduling (a technique in which nodes take turns transmitting in an orderly fashion) or by random access to the channel.
Scheduled access
In a scheduling method known as time-division multiple access (TDMA), a time slot is assigned in turn to each node, which uses the slot if it has something to transmit. If some nodes are much busier than others, then TDMA can be inefficient, since no data are passed during time slots allocated to silent nodes. In this case a reservation system may be implemented, in which there are fewer time slots than nodes and a node reserves a slot only when it is needed for transmission.
A variation of TDMA is the process of polling, in which a central controller asks each node in turn if it requires channel access, and a node transmits a packet or message only in response to its poll. “Smart” controllers can respond dynamically to nodes that suddenly become very busy by polling them more often for transmissions. A decentralized form of polling is called token passing. In this system a special “token” packet is passed from node to node. Only the node with the token is authorized to transmit; all others are listeners.
Random access
Scheduled access schemes have several disadvantages, including the large overhead required for the reservation, polling, and token passing processes and the possibility of long idle periods when only a few nodes are transmitting. This can lead to extensive delays in routing information, especially when heavy traffic occurs in different parts of the network at different times—a characteristic of many practical communications networks. Random-access algorithms were designed specifically to give nodes with something to transmit quicker access to the channel. Although the channel is vulnerable to packet collisions under random access, various procedures have been developed to reduce this probability.
Carrier sense multiple access
One random-access method that reduces the chance of collisions is called carrier sense multiple access (CSMA). In this method a node listens to the channel first and delays transmitting when it senses that the channel is busy. Because of delays in channel propagation and node processing, it is possible that a node will erroneously sense a busy channel to be idle and will cause a collision if it transmits. In CSMA, however, the transmitting nodes will recognize that a collision has occurred: the respective destinations will not acknowledge receipt of a valid packet. Each node then waits a random time before sending again (hopefully preventing a second collision). This method is commonly employed in packet networks with radio links, such as the system used by amateur radio operators.
It is important to minimize the time that a communications channel spends in a collision state, since this effectively shuts down the channel. If a node can simultaneously transmit and receive (usually possible on wire and fibre-optic links but not on radio links), then it can stop sending immediately upon detecting the beginning of a collision, thus moving the channel out of the collision state as soon as possible. This process is called carrier sense multiple access with collision detection (CSMA/CD), a feature of the popular wired Ethernet. (For more information on Ethernet, see computer: Local area networks.)
Spread-spectrum multiple access
Since collisions are so detrimental to network performance, methods have been developed to allow multiple transmissions on a broadcast network without necessarily causing mutual packet destruction. One of the most successful is called spread-spectrum multiple access (SSMA). In SSMA simultaneous transmissions will cause only a slight increase in bit error probability for each user if the channel is not too heavily loaded. Error-free packets can be obtained by using an appropriate control code. Disadvantages of SSMA include wider signal bandwidth and greater equipment cost and complexity compared with conventional CSMA.
Different communication requirements necessitate different network solutions, and these different network protocols can create significant problems of compatibility when networks are interconnected with one another. In order to overcome some of these interconnection problems, the open systems interconnection (OSI) was approved in 1983 as an international standard for communications architecture by the International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee (CCITT). The OSI model, as shown in the figure, consists of seven layers, each of which is selected to perform a well-defined function at a different level of abstraction. The bottom three layers provide for the timely and correct transfer of data, and the top four ensure that arriving data are recognizable and useful. While all seven layers are usually necessary at each user location, only the bottom three are normally employed at a network node, since nodes are concerned only with timely and correct data transfer from point to point.
Data recognition and use
The application layer is difficult to generalize, since its content is specific to each user. For example, distributed databases used in the banking and airline industries require several access and security issues to be solved at this level. Network transparency (making the physical distribution of resources irrelevant to the human user) also is handled at this level. The presentation layer, on the other hand, performs functions that are requested sufficiently often that a general solution is warranted. These functions are often placed in a software library that is accessible by several users running different applications. Examples are text conversion, data compression, and data encryption.
User interface with the network is performed by the session layer, which handles the process of connecting to another computer, verifying user authenticity, and establishing a reliable communication process. This layer also ensures that files which can be altered by several network users are kept in order. Data from the session layer are accepted by the transport layer, which separates the data stream into smaller units, if necessary, and ensures that all arrive correctly at the destination. If fast throughput is needed, the transport layer may establish several simultaneous paths in the network and send different parts of the data over each path. Conversely, if low cost is a requirement, then the layer may time-multiplex several users’ data over one path through the network. Flow control is also regulated at this level, ensuring that data from a fast source will not overrun a slow destination.
Data transfer
The network layer breaks data into packets and determines how the packets are routed within the network, which nodes (if any) will check packets for errors along the route, and whether congestion control is needed in a heavily loaded network. The data-link layer transforms a raw communications channel into a line that appears essentially free of transmission errors to the network layer. This is done by breaking data up into data frames, transmitting them sequentially, and processing acknowledgment frames sent back to the source by the destination. This layer also establishes frame boundaries and implements recovery procedures from lost, damaged, or duplicated frames. The physical layer is the transmission medium itself, along with various electric and mechanical specifications.
Like | 14 View | 895


posted 6 months 2 weeks ago
In an organization, information flows forward, backwards and sideways. This information flow is referred to as communication. Communication channels refer to the way this information flows within the organization and with other organizations.
In this web known as communication, a manager becomes a link. Decisions and directions flow upwards or downwards or sideways depending on the position of the manager in the communication web.
For example, reports from lower level manager will flow upwards. A good manager has to inspire, steer and organize his employees efficiently, and for all this, the tools in his possession are spoken and written words.
For the flow of information and for a manager to handle his employees, it is important for an effectual communication channel to be in place.
The Working of a Communication Channel
Through a modem of communication, be it face-to-face conversations or an inter-department memo, information is transmitted from a manager to a subordinate or vice versa.
An important element of the communication process is the feedback mechanism between the management and employees.
In this mechanism, employees inform managers that they have understood the task at hand while managers provide employees with comments and directions on employee's work.
Importance of a Communication Channel
A breakdown in the communication channel leads to an inefficient flow of information. Employees are unaware of what the company expects of them. They are uninformed of what is going on in the company.
This will cause them to become suspicious of motives and any changes in the company. Also without effective communication, employees become department minded rather than company minded, and this affects their decision making and productivity in the workplace.
Eventually, this harms the overall organizational objectives as well. Hence, in order for an organization to be run effectively, a good manager should be able to communicate to his/her employees what is expected of them, make sure they are fully aware of company policies and any upcoming changes.
Therefore, an effective communication channel should be implemented by managers to optimize worker productivity to ensure the smooth running of the organization.
Types of Communication Channels
The number of communication channels available to a manager has increased over the last 20 odd years. Video conferencing, mobile technology, electronic bulletin boards and fax machines are some of the new possibilities.
As organizations grow in size, managers cannot rely on face-to-face communication alone to get their message across.
A challenge the managers face today is to determine what type of communication channel should they opt for in order to carryout effective communication.
In order to make a manager's task easier, the types of communication channels are grouped into three main groups: formal, informal and unofficial.

Formal Communication Channels
  • A formal communication channel transmits information such as the goals, policies and procedures of an organization. Messages in this type of communication channel follow a chain of command. This means information flows from a manager to his subordinates and they in turn pass on the information to the next level of staff.
  • An example of a formal communication channel is a company's newsletter, which gives employees as well as the clients a clear idea of a company's goals and vision. It also includes the transfer of information with regard to memoranda, reports, directions, and scheduled meetings in the chain of command.
  • A business plan, customer satisfaction survey, annual reports, employer's manual, review meetings are all formal communication channels.
Informal Communication Channels
  • Within a formal working environment, there always exists an informal communication network. The strict hierarchical web of communication cannot function efficiently on its own and hence there exists a communication channel outside of this web. While this type of communication channel may disrupt the chain of command, a good manager needs to find the fine balance between the formal and informal communication channel.
  • An example of an informal communication channel is lunchtime at the organization's cafeteria/canteen. Here, in a relaxed atmosphere, discussions among employees are encouraged. Also managers walking around, adopting a hands-on approach to handling employee queries is an example of an informal communication channel.
  • Quality circles, team work, different training programs are outside of the chain of command and so, fall under the category of informal communication channels.
Unofficial Communication Channels
  • Good managers will recognize the fact that sometimes communication that takes place within an organization is interpersonal. While minutes of a meeting may be a topic of discussion among employees, sports, politics and TV shows also share the floor.
  • The unofficial communication channel in an organization is the organization's 'grapevine.' It is through the grapevine that rumors circulate. Also those engaging in 'grapevine' discussions often form groups, which translate into friendships outside of the organization. While the grapevine may have positive implications, more often than not information circulating in the grapevine is exaggerated and may cause unnecessary alarm to employees. A good manager should be privy to information circulating in this unofficial communication channel and should take positive measures to prevent the flow of false information.
  • An example of an unofficial communication channel is social gatherings among employees.


Like | 6 View | 629


posted 6 months 2 weeks ago

This article is aimed at addressing a question I followed on a discussion group asking which is better between the PMI PM BOK and agile scrum. The short answer is none as they addresses different things and can be complementary to each other.

Before giving a detailed answer let us first establish a foundation for understanding what the PM BOK and scrum agile are.

The PM BOK is the project management body of knowledge by PMI. It defines the standards and guidelines for project management, establishes procedure, and defines the inputs, tools, techniques and output set out in about 47 processes. These 47 processes are then explained in about 10 knowledge area. The PM BOK defines a project governance or life cycle frame work that divides a project into five phases or process group of Initiating, Planning, Executing , Monitoring and controlling, Closing. This frame work provides a governance frame work which by itself is repetitive and iterative because of the element of Monitoring and controlling process that allows you to manage changes to the project throughout the project life cycle. More of this latter.

In itself the PM BOK is not a methodology for project management, but it defines different standards, input, tools, techniques and a governance structure to project management and several methodologies for different project management knowledge area like the critical path method and the critical chain methods for schedule estimation.

The schedule plan is not a project plan but a subset of the project management plan. The project management plan is the sum total or aggregation of all the plans created during the course of the project. There is no way such a document will be created and completed without some iteration, review, updating initial documents and managing changes formally or informally throughout the lifecycle of the project. In OGC ‘’ Managing Successful Project”. This aggregated plan is known as the Project Initiation documentation (PID) which is developed throughout the entire life cycle of the project. The OGC Managing successful project describes a Project governance frame known as ‘’Project In Controlled Environment version 2 (PRINCE2).

PRINCE2 is a process –driven management methodology. It is based on seven principles, seven themes and seven processes. The seven principles are: Continued business justification, learn from experience, defined roles and responsibilities, manage by stages, manage by exception, focus on products and tailor to suit the project environment. The seven themes are business case, organizations, quality, plans, risk change and progress.

PRINCE2 is a structured approach to project management. It provides a method for managing project within a clearly define frame work. PRINCE2 describes procedures to coordinate people and activities in a project, how to design and supervise the project and what to do if the project has to be adjusted, if it doesn’t develop as planned. In the method each process is specified with its key input and outputs and with specific goals and activities to be carried out which gives an automatic control of any deviation from the plan.

Taken with the PM BOK you have a complementary approach because they complement each other, what is lacking in PM BOK will be provided by PRINCE2.

Agile Management or agile process management or simply agile refers to an iterative incremental method of managing the design and build activities of engineering, information technology and other business area that aim to provide new product or service development in a highly flexible and interactive manner: an example is its application in Scrum, an original form of agile software development.

Scrum started as a product development methodology for software development. It approach is the rugby approach , as the whole process is performed by one cross- functional team across multiple overlapping phases, where the team tries to go the distance as a unit passing the ball back and forth. (In rugby football a scrum refers to a tight –packed formation of players with their heads down who attempt to gain possession of the ball). The idea is to move together in limbo while passing the ball back and forth until the goal is reached that is the idea of scrum.

 Hence a key principle of scrum is its recognition that during product development, the customer can change their minds about what they want and need (often called requirement volatility) and that unpredicted challenges cannot be easily addressed in a predictive or planned manner, as such Scrum adopts an evidence based empirical approach- accepting that the problem cannot be fully understood or defined, focusing instead on maximizing the team’s ability to deliver quickly, to respond to emerging requirements and to adopt to evolving technologies and changes in marketing conditions.

In the following paragraphs we will look at the differences and relationships between traditional project management and agile methodology.

Adaptive vs Predictive

Development methods exists on a continuum from adaptive to predictive. Agile methods lies on the adaptive side of the continuum. One key of adaptive development methods is a rolling wave approach to schedule planning or the progressive elaboration which identifies milestones but leaves flexibility in the path to reach them and also allow for milestones themselves to change. The PM BOK defines a rolling wave plan approach to project management. In which a planning horizon is defined for details about a particular phase or stage must be established as we approach that stage so at the beginning of the project we may not necessarily concern ourselves with the detailed plan for a future stage of a project but only highly level plan, the details will come as we approach the phase or stage.

Adaptive methods focus on adapting quickly to changing realities when the need of a project change an adaptive team as well changes. The further away a date is the vaguer an adaptive method is about what will happen in that date. An adaptive team cannot report exactly what tasks they will do next week but only which features they plan for the next. An agile method of project management will be more adaptive than other methods because agile methods is built on adaptability and flexibility.

Predictive method, in contrast focus on analyzing and planning the future in detail and cater for known risks. In the extremes, a predictive team can report exactly what features and tasks are planned for the entire length of the development process. Predictive methods rely on effective early phase analysis and if this goes very wrong the project may have difficulty changing direction. Predictive teams often institute a change control board to ensure they consider only the most valuable changes.

Iterative Vs Waterfall

One of the difference between agile and waterfall is the approach to quality and testing. In the waterfall model, there is always a separate testing phase after a build phase , however in agile development testing is completes in the same iteration as programming for software development.

It should also be well noted that the Deming cycle which is also known as the PDCA cycle defined essentially in all project management methodology, service management, and quality management defines is an iteration process. However this iteration process is ongoing which consider a separate process.

However in an agile environment because testing is done in the same iteration –which develops a small piece of the software, user can frequently use those new pieces of software and validate the value. After user know the value of the updated piece of the software they can make better decisions about the software’s future. Having a value retrospective and software replaning session for each iterations, helps the team to continuously adapt it plans so as to maximize the value it delivers.

In a waterfall method testing is not done in the same iteration as programming.

It should be note therefore that the obvious difference between the two traditional PM and agile is not a difference per se but a kind of maturity from one methodology give rise to new methods both in project management and product development. As can be seen below.



Fig 2: Waterfall vs Agile


The new method is called Agile.

In a world where change is everything, and technologies becomes very disruptive, it is very important that Organizations can respond very fast to the changing technology and business landscape hence agile is born.

Agile therefore addresses the problems of:

·       Flexibility

·       Adaptability

·       Disruption and change

·       Velocity

In a way that is different from traditional PM. So that we can respond to the business and client needs differently.

PMI in the diagram above had to draw a road map to agile from the traditional PM and also OGC/ AXELOS had to draw the road map and called theirs PRINCE2 Agile.

Scrum that was discussed above is one of the Agile Methodologies and there are more.



Managing Successful Projects OGC 2009

 A guide to Project Management body of Knowlege PM BOK, 5th edition

A guide to Scrum Body of Knowledge SBOK, 2016 Edition





Like | 2 View | 295


posted 8 months 2 days ago

Satellite communication is the use of artificial satellites to provide communication links between various points on Earth. Satellite communications play a vital role in the global telecommunications system. An artificial satellite that relays and amplifies radio telecommunications signals via a transponder; it creates a communication channel between a source transmitter and a receiver at different locations on Earth.

Approximately 2,000 artificial satellites orbiting Earth relay analog and digital signals carrying voice, video, and data used for television, telephone, radio, internet, and military applications.

There are three types of communications satellite systems. They are categorised according to the type of orbit they follow.A geostationary satellite orbits the earth directly over the equator, approximately 22,000 miles up.

Satellite communication has two main components: 

Ground segment - which consists of fixed or mobile transmission, reception, and ancillary equipment. 

Space segment - which primarily is the satellite itself. A typical satellite link involves the transmission or uplinking of a signal from an Earth station to a satellite. 

Geostationary orbit is a circular orbit, situated directly over the equator. A satellite positioned in geostationary orbit circles at the same speed and in the same direction as the Earth rotates, meaning that it stays ‘fixed’ in relation to a point on the ground. Geostationary orbit is at an altitude of about 36,000 km, or 22,380 miles (in fact, it is exactly 35,784 km) – a distance equal to six times the radius of the Earth – with an orbital period of 23 hours 56 minutes.

Choosing frequency bands

Modern telecommunications media primarily use six frequency bands, designated by letters.


Frequency range



1 to 2 GHz

Mobile telephony and data transmission


2 to 3 GHz

Mobile telephony and data transmission


3.4 to 7 GHz

Fixed telephone services, radio broadcast services, business networks


7 to 8.4 GHz

Government or military communications, encrypted for security reasons


10.7 to 18.1 GHz

High data-rate transmission, television, videoconferencing, business networks


18.1 to 31 GHz

High data-rate transmission, television, videoconferencing, business networks


 Frequency bands are assigned according to standard guidelines set by the International Telecommunications Union (ITU), depending on the service to be provided, and coordination between operators must be maintained so as to avoid any interference between satellites.


Like | 11 View | 929


posted 8 months 1 week ago

Disruptive technologies of tomorrow usually lack widely accepted definitions and are often invented by individual entities not necessarily responsible for formulating and enforcing industry standards that govern the technology evolution. Innovation and advancements in the field of connected technologies started with networked computers which then progressed through the Internet era and have evolved beyond the concept of connecting physical objects as part of the Internet of Things (IoT) revolution.


The term “Internet of Things” coined by British entrepreneur Kevin Ashton in 1999 described connectivity among physical objects and no longer holds in its original form. It is now largely overlapped, confused and even mystified with the term Internet of Everything (IoE). IoE is considered a superset of IoT and Machine-to-Machine (M2M) communication considered a subset of IoT. Let’s take a closer look into differences between IoT, IoE, and M2M, which has impacted consumers and businesses alike.

What Is the Internet of Everything (IoE)?

Although the concept of Internet of Everything emerged as a natural development of the IoT movement and is largely associated with Cisco’s tactics to initiate a new marketing domain, IoE encompasses the wider concept of connectivity from the perspective of modern connectivity technology use-cases. IoE comprises of four key elements including all sorts of connections imaginable:

People: Considered as end-nodes connected across the internet to share information and activities. Examples include social networks, health and fitness sensors, among others.

Things: Physical sensors, devices, actuators and other items generating data or receiving information from other sources. Examples include smart thermostats and gadgets.

Data: Raw data analyzed and processed into useful information to enable intelligent decisions and control mechanisms. Examples include temperature logs converted into an average number of high-temperature hours per day to evaluate room cooling requirements.

Processes: Leveraging connectivity among data, things and people to add value. Examples include the use of smart fitness devices and social networks to advertise relevant healthcare offerings to prospective customers.

IoE establishes an end-to-end ecosystem of connectivity including technologies, processes and concepts employed across all connectivity use-cases. Any further classifications – such as Internet of Humans, Internet of Digital, Industrial Internet of Things, communication technologies and the Internet itself – will eventually constitute a subset of IoE if not considered as such already.

What Is the Internet of Things (IoT)?

Devices, computers, and machines were already connected by the time Kevin Ashton coined the term Internet of Things. The concept gained steam for its ability to connect the unconnected – physical-first objects previously incapable of generating, transmitting and receiving data unless augmented or manipulated. Embedding sensors, control systems, and processors into these objects enables horizontal communication across a multi-node, open network of physical-first objects.

The term is also vaguely used to describe connected digital-first devices such as wearable gadgets that may be classified as Internet of Digital while offering the same functionality as its physical-first counterpart developed into a smart connected technology. The meaning and application of the term IoT will continue to evolve as new connected technologies emerge, replacing physical-first objects with smart connected devices and use-cases to constitute all new “Internet-of-X” classifications. 

What Is Machine to Machine (M2M)?

The aptly named IoT subset M2M initially represented closed, point-to-point communication between physical-first objects. The explosion of mobile devices and IP-based connectivity mechanisms has enabled data transmission across a system of networks. M2M is more recently referred to technologies that enable communication between machines without human intervention. Examples include telemetry, traffic control, robotics, and other applications involving device-to-device communications.

How Does This Impact Businesses and Consumers?

The concepts of IoE, IoT, and M2M are inherently subjected to the confusion surrounding limitations associated with meaning, use cases, and adoption. While there are no industry standard and regulations from appropriate governing authorities, these concepts will continue to evolve in response to technology innovation, changing consumer trends and varied marketing tactics. Business evaluating the promise and potential of connectivity offerings will, therefore, have to dig into the specifics of each situation instead of establishing conclusions based solely on the proposed labels of IoE, IoT, or M2M.


Like | 6 View | 651


posted 8 months 3 weeks ago
Like | 11 View | 500


posted 8 months 3 weeks ago
Like | 5 View | 437