The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Intel and Ericsson Team Up to Streamline M2M Platform DesignThe structure of the M2M (machine-to-machine) market today is such that solutions are nearly always customized for a specific vertical market or application. While there is a need for a modest amount of vertical customization, the market can move toward a much more standardized model in the areas of connectivity enablement, hardware platforms, and middleware software. Echoing this direction, Nathan Johnston, principal technology architect at XATA said, “We made a conscious decision to stop developing our own platforms, and I think that this type of strategic decision is a growing trend among developers.” Mr. Johnston was describing his company’s approach to fleet operations management system development at a recent M2M Roundtable in Las Vegas sponsored by Ericsson*.Providing an alternative to proprietary platforms, the Intel® M2M Reference Design supports standards-based technologies, including the F5521GW mobile broadband module from Ericsson. The reference design spares system developers from designing a board from scratch and mastering the complexities of wireless technology, making it easier and less costly to create M2M applications. With a footprint the size of a credit card, the design supports a variety of wireless connectivity and delivers the computing performance required for M2M applications.Read the full Intel and Ericsson Solution Brief.
Provides service edge solution for interconnectivity that increases revenue potential.
Intel® embedded products synergize systems for applications, services, and control plane and packet processing.
Security software extracts metadata, classifies flows, and displays data in a compact format.
Off-the-shelf components provide a high-quality solution without using custom hardware.
Firewall monitors user traffic, analyzes applications, and searches for malware.
Optimized pattern matching detects malware and helps achieve maximum computing performance.