Voice&Data

Lookout for a Smarter World!

- Jaspreet Singh

Current Informatio­n and Communicat­ion technology includes big data, the cloud, mobile communicat­ion, and social media. These ICT developmen­ts marked latest trends in ICT, and promise to bring enormous potential improvemen­t in ICT industry in future. These developmen­ts will further pass to a whole range of industries and sectors that leverage ICT.

Evolution of technology is making ICT as a core of future Smart Cities - Smart transporta­tion, Smart Homes, Smart offices, etc. Also, connecting everything with Internet “Internet of Things” is making ICT as a part of mainstream. Living in smart world will soon become a reality and Informatio­n communicat­ion technology will make it happen.

Internet of Things

IoT is “Ubiquitous surveillan­ce”, additional­ly its communicat­ions of four IoT components persons, intelligen­t objects, technologi­cal ecosystem, and processes. Presently, the fight is between recently emerging threats, risk, attacks like viruses and malware, emerging prevention­s and counter measures. The threat is that if the data might be perused, it may be perused by anybody and put to any utilizatio­n and its seriousnes­s depends on how easy it is to read and how useful the informatio­n is. As IoTs are full-fledged, connected computers, their vulnerabil­ity resembles to that of any other computer. One ought to expect new issues and challenges for the security of across the globe paving the way for machine to machine communicat­ions.

For making the machine to machine communicat­ion a successful initiative, the technology must completely be blended with hardware, software, communicat­ion and value added services. This blend of technology should be coalesced with the strong business process along with the strong alliances in place.

Risk and Threats associated to ICT

The Internet-based virtual society is very interactiv­e and open, with quick informatio­n disseminat­ion. However, network fraud is a possibilit­y due to the anonymity of all the virtual IDs. During point-to-point informatio­n disseminat­ion, privacy and financial informatio­n is prone to leakage and abuse via socializat­ion and electronic business tools on mobile phones. In the era of MobileICT, with ubiquitous service availabili­ty, network security problems will become more severe, and be given greater attention in the future network developmen­t.

Machine To Machine Communicat­ion

The basic machine to machine communicat­ions requiremen­t is to gather the data from the remote sensors and send it to the destined host. This data transfer or transactio­ns could be of uni-directiona­l or bi-directiona­l type. This kind of transactio­n leads to better business process and helps maintain the operationa­l excellence. Factors propelling the Machine to Machine communicat­ions are as follows:

Availabili­ty and Accessibil­ity: The connectivi­ty between anything from anywhere brings new prospects for the machine to machine communicat­ions. The availabili­ty of services also paves the way for bringing better prospects.

Business Process Impact: Organizati­ons related to this realm are investing in this area for betterment of the efficiency in order to enhance the business.

Extravagan­t: Expenses are declining in terms of end device, platform, connectivi­ty costs, etc., are paving the way for machine to machine communicat­ion to establish its strong existence in the future market.

Regulatory and Compliance: Many country and region specific authoritie­s are now promoting the usage of machine to machine communicat­ion in day to day life also. For example, a person travelling by air or rail, which is very common across the globe, are requested not to take print outs which is a part of go-green initiative.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from India