Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [m2m-iwg] FW: m2m for Security (Ian Skerrett)

Not sure what is the issue with the pdf.  I have copied the contents below.


M2M for Security 
The next generation of security applications

8th & 9th of May, 2013
Copthorne Tara 

Vodafone, Everything Everywhere, Deutsche Telekom, Transatel, Concirrus and
Telenor have are confirmed.


According to recent market reports the total M2M market is expected to reach
"$85.96 billion by 2017."
One area of this market that will see significant growth is the M2M security
market, where flexible wireless solutions are providing both original
equipment manufacturers (OEM's) and asset owners the ability to deploy
products that can more effectively monitor, control and respond to security
instances with real time functionality. 
M2M for Security will greatly enhance the capability for Transportation,
Government, Public Sector, Healthcare, and Defence and Security industries
to secure their assets, through more technically advanced and flexible
security infrastructures.
M2M for security will quickly become the top priority for connecting and
monitoring personnel and services deployed in hazardous environments, as
connectivity, rapid response and next generation applications are quickly
deployable in remote regions.
Already Government, Commercial, industrial and private institutions are
highly reliant upon reliable security applications that will not only detect
threats, but communicate and respond immediately.
.	How can you embrace, develop and define your business proposition to
meet the demands of your customers?
.	M2M is redefining connectivity- how is your business adapting to
meet this challenge?
.	Operators and OEM's must adapt new strategies - What is the size and
shape of the win and is your company suitably prepared?
.	Develop understanding of connectivity - Dynamics and business
drivers are changing, keep ahead of the game.
.	Target new growth areas and identify core competencies - what is
your go to market strategy? Do you have the core skillsets in place and
could you be doing more to maximise profitability?
.	Partnerships or Outsource - Learn how leaders are gaining
competitive advantage through refined distribution channels.
Program discussion will include but is not limited to:
.	Government policy on White Space Communications and license
exemptions
.	Utilising next generation generation m2m technology for business
growth - OEM case studies on success and future development
.	What are the Challenges for the Security industry?
.	What are the risks of current Security systems?
.	Machine to Machine market growth
.	Risk and Failure to capitalize on new types of connectivity
.	Changing your customers mindset
.	Security and Surveillance applications that will benefit
.	Why M2M for Security? 
.	Operating security systems: The M2M proposition 
.	M2M versus Fixed Line - Risks 
.	Security for workers, personnel and management 
.	CCTV and Security Systems 
.	Managed access control of Security Systems 
.	Vehicle theft, tracking and recovery 
.	Threat Detection 
.	NEW! SATELLITE FOR M2M 




-----Original Message-----
From: m2m-iwg-bounces@xxxxxxxxxxx [mailto:m2m-iwg-bounces@xxxxxxxxxxx] On
Behalf Of Werner Keil
Sent: October-30-12 11:53 AM
To: m2m-iwg@xxxxxxxxxxx
Subject: Re: [m2m-iwg] FW: m2m for Security (Ian Skerrett)

Thanks, the PDF seems in a protected folder, could anybody download it, or
what credentials would we need?

How about M2M World Congress 2013, has CFP for that ended by now?

Werner

-------- Original-Nachricht --------
> Datum: Tue, 30 Oct 2012 11:33:38 -0400
> Von: m2m-iwg-request@xxxxxxxxxxx
> An: m2m-iwg@xxxxxxxxxxx
> Betreff: m2m-iwg Digest, Vol 12, Issue 15

> Send m2m-iwg mailing list submissions to
> 	m2m-iwg@xxxxxxxxxxx
> 
> To subscribe or unsubscribe via the World Wide Web, visit
> 	http://dev.eclipse.org/mailman/listinfo/m2m-iwg
> or, via email, send a message with subject or body 'help' to
> 	m2m-iwg-request@xxxxxxxxxxx
> 
> You can reach the person managing the list at
> 	m2m-iwg-owner@xxxxxxxxxxx
> 
> When replying, please edit your Subject line so it is more specific 
> than "Re: Contents of m2m-iwg digest..."
> 
> 
> Today's Topics:
> 
>    1. FW: m2m for Security (Ian Skerrett)
> 
> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Tue, 30 Oct 2012 11:33:24 -0400
> From: "Ian Skerrett" <ian.skerrett@xxxxxxxxxxx>
> To: "m2m Industry Working Group" <m2m-iwg@xxxxxxxxxxx>
> Subject: [m2m-iwg] FW: m2m for Security
> Message-ID: <01f701cdb6b3$e6b07e60$b4117b20$@eclipse.org>
> Content-Type: text/plain; charset="us-ascii"
> 
> There seems to be an M2M for Security conference in May, 2013 in London.
> Attached is the call for papers, if someone is interested in submitting.
> 
>  
> 
> Ian
> 
> -------------- next part -------------- An HTML attachment was 
> scrubbed...
> URL:
> <http://dev.eclipse.org/mailman/private/m2m-iwg/attachments/20121030/d
> 037fb0e/attachment.html>
> -------------- next part -------------- A non-text attachment was 
> scrubbed...
> Name: Call for Papers.pdf
> Type: application/pdf
> Size: 441342 bytes
> Desc: not available
> URL:
> <http://dev.eclipse.org/mailman/private/m2m-iwg/attachments/20121030/d
> 037fb0e/attachment.pdf>
> 
> ------------------------------
> 
> _______________________________________________
> m2m-iwg mailing list
> m2m-iwg@xxxxxxxxxxx
> http://dev.eclipse.org/mailman/listinfo/m2m-iwg
> 
> 
> End of m2m-iwg Digest, Vol 12, Issue 15
> ***************************************
_______________________________________________
m2m-iwg mailing list
m2m-iwg@xxxxxxxxxxx
http://dev.eclipse.org/mailman/listinfo/m2m-iwg




Back to the top