Why you and your business needs VR analytics (Part 2)

vr analytics for business

 For part 2 of our series on Why you Need VR Analytics we will discuss the value behind users interaction and the very objects in the immersive experience and how this will ultimately become it’s own economy.

  1. If Data is democracy, Duration is the Ballot Box

**If data is the ballot box, duration is the democracy/user’s choice

It’s impossible to create engaging content without truly knowing what your users enjoy in the first place. Without this knowledge there is no way for content creators to monetize consumer engagement, let alone improve their work. It’s important to note that data itself is a manifestation of people’s attention, desires and interests, thus, drawing conclusions from the data is vital in order to move forward productively. Immersive Media analytics enables the creation of content that’s enjoyable, resulting in users consuming more content, meaning users are consuming that content for longer.

On average, the American smartphone owner spends around 2 hours and 26 minutes on applications each day. Recent competition amongst major platforms isn’t about the number of users they can recruit; it’s become a race to increase user engagement within their app’s ecosystem rather than their competitor. An app’s ecosystem includes all the networks, platforms, content, users, and everything else involved in the system’s process. The implementation of analytics into your immersive content will increase the duration in which users spend inside your ecosystem. Game, set, match. It’s all about the consumer, not the content. In other words, content isn’t king, the consumers are.

Polish their crown, bow to the throne, whatever must be done to make the King happy. The happier the consumer is viewing your content, the longer the King is in your court. The longer the user spends in your court, or ecosystem, the higher your return on investment (ROI).

Immersive Media (360 Video, VR, AR) has the potential to increase the duration of a user’s stay within an application or closed ecosystem. Done properly, strategically produced content can be used as a means of learning more about audiences by tracking viewing patterns. Knowing the focus points user’s on strategically placed products, in turn, may be used to optimize the placement of traditional mobile advertising content via targeted campaigns. When agencies and brands identify the role of immersive media amongst the rest of their marketing strategies, it will graduate from “experimental marketing budget land” to a standard category heading on a client’s service agreement.

Time is on the user’s side, not the content creators. Therefore, it’s entirely up to the user to decide the amount of time they spend within your ecosystem. If the collection of data is the ballot box, the amount of time a user spends in that ecosystem is their vote — and they’ll vote for what they want to see.

  1. Enter Mimetics and the Virtual Object Economy

In Derek Thompson’s Hit Makers: The Science of Popularity in an Age of Distraction, the author explains the idea of exposure breeding familiarity, familiarity breeding fluency, and fluency often forming habits which can result in evangelization because of a sense of mastery. Right now, brands are figuring out how to present a virtualized version of their products for people to learn about and interact within virtual reality.

VR analytics provides a log of the amount of time people are exposed to product A, which results in familiarity of product A, which leads to fluency of product A. Having a log that depicts the duration in which people go through these three steps allows you to understand the relationship between the person and object in VR. There are different levels of marketing campaigns associated with one’s knowledge of the product in VR, who answers the question of which marketing materials to send to the different segments of consumers who have a relationship with your product or service. When you send out an ad explaining your product to someone who is already fluent in it, you have wasted valuable time and hard earned money, and have most likely bothered the fluent user.

Remember, user experience is key. Take advantage of knowing what people are fluent in to optimize their experience. In order to understand consumer levels of exposure, familiarity, and fluency with your brand’s product, create a virtual version of the product and measure the duration in which they focus and interact with it. Once you have that information, create different marketing strategies for consumers who have merely been exposed to the product, consumers who are in the familiarity stage, and consumers who have a master level of understanding of your product. When entering the object economy, this personalized layer of behavioral data puts your company ahead, very ahead.

  1. Contemplation is participation

Gazing at a Coca Cola bottle and picking up the bottle have equal value in virtual reality. These actions are contemplation and participation metrics, which are transmitted as behavioral data, identifying unique demographics. When consumers shop at virtual grocery stores (which may become the norm), they look at all the products on the shelves and focus on, or even participate with, certain items. These unique consumer contemplations and participations illustrate human differences, enabling producers to cater to each consumer segment sharing the same habits.

These individual actions and body language provide more context. The more context you have about your customers, the more aligned your strategic decisions will be with the preferences of your consumers. Traditional media analytics are event driven; immersive media enables the entire experience to be an event in which users may be engaged with. Companies have shifted from analyzing numbers to actual human emotion. VR has created a platform that, for the first time, ties behavior to purchasing contemplations and participation decisions. Take advantage of this knowledge and gain deeper insight into your consumer base in order to boost your ROI.

Let’s Recap:

  • If Data is democracy, Duration is the Ballot Box: It’s impossible to create engaging content without truly knowing what your users enjoy in the first place
  • Enter Mimetics and the Virtual Object Economy:Right now, brands are figuring out how to present a virtualized version of their products for people to learn about and interact within virtual reality. VR analytics provides a log of the amount of time people are exposed to product A, which results in familiarity of product A, which leads to fluency of product A.
  • Contemplation is participation: VR has created a platform that, for the first time, ties behavior to purchasing contemplations and participation decisions. Take advantage of this knowledge and gain deeper insight into your consumer base in order to boost your ROI.

Part 3 of this series will be released soon but if in the meantime you’d like to learn more about how you can use vr analytics feel free to reach out to the Thrillbox Team.

About the Author

Benjamin Durham is the COO and Founder of Thrillbox, an immersive media platform that provides actionable business intelligence and monetization capabilities for virtual reality and augmented reality through the power of big streaming data.

The post Why you and your business needs VR analytics (Part 2) appeared first on ReadWrite.

ReadWrite

1aim brings connected devices to workplace doors & beyond

connected security devices

In the era of connected technology Berlin company 1aim are carving a niche for themselves in connected security for commercial buildings. I met with Torben Friehe, CEO of 1aim to find out more.

1aim builds a complex array of hardware and software for a simple purpose: open any door by waving a smartphone in front of a retrofitted lock instead of needing a key, swipe card or access code. Administrators use a simple app interface to issue digital passes via email or SMS to anyone visiting including non-registered users like guests or contractors.

Friehe likens them to “a central nervous system for buildings” explaining that 1aim  has created an enterprise-grade access control system that serves two functions – first, to allow professional access and identity management and, second, to gather large amounts of valuable data to enable companies to identify space usage patterns in their commercial space.

lightacess_3Friehe explains that as the company ships more software, customers will be able to use the device to collect and analyze data and perform a suite of tasks to improve cost flows and efficiency, such as arm areas or turn off electricity to reduce utility expenses as employees leave their offices.Other features include allowing users to request conference rooms and automatically provide them with the ideal premises fitting their requirements.

“Since our platform knows who is where and when, it will also be able to allocate the right space to every employee on an individual basis and offer strategic work-layout suggestions to optimize operations.”

What are the cultural differences when it comes to smart locks in Germany compared to the US?

As an expat myself living in Germany I was interested to know the differences in how Deutsch and American people view security and technology. Friehe noted that:

“German homeowners would not trust doors that are seen as perfectly safe in America. In Germany, homeowners take enormous pride in the so-called “Resistance Class” that their door fulfills. But most U.S. doors would not even pass the lowest grade of such certification. The same goes for mechanical locks. Many German homeowners purchase high-quality lock cylinders that cost up to a few hundred euro per piece. Although there are security grades in America as well, German consumers have a much wider variety of choices and can select products offering more mechanical security. We have had meet extremely high-security standards in Germany as part of our partnership with the Hormann Group.”

Connected security in a crowded space requires complex solutions

Connected security is becoming a crowded space with the involvement of industry stalwarts like Honeywell and Yale. However, the majority are focused on the consumer market and fewer are equipped to respond to the challenges of older commercial buildings. Friehe explains that:

“In the building platform space, we see competitors attempting to build a “building operating system,” a software connecting all the hardware in a building. We don’t see this approach as working. Without a strong hardware foundation, there is just no way to connect legacy and modern systems. These companies might be able to supply middleware, but as long as they focus on software alone they will not be able to dominate this space. So our major differentiation point here is that we supply the hardware at the core of our system, providing quality ID-related data.”

Friehe also compares questions companies that monitor space utilization using sensor boxes as their hardware, noting that

“These companies cannot supply the same data quality that we can provide, as their data is not connected to the ID of users in any way and the number of potential data points is limited.”

The company sees the opportunity in the future to team up with companies in the HVAC and energy optimization sector where “We can make good use of their data, and they might require some of ours.”

How secure are connected locks?

One need only read the agenda of the latest DEFCON or Black Hat conference to know that there will be security researchers showing their prowess in hacking connected home security devices.  Then over the last week, we’ve seen spirited discussion after Amazon revealed they are sealing smart door locks that enable Amazon to deliver packages inside your home with a smart lock and connected camera. Walmart recently offered to deliver groceries straight to people’s fridges with a similar system. When polled about the idea of Amazon in-home delivery three different surveys suggested strong opposition to the idea, perhaps in the spirit of ‘just because you can, doesn’t mean you should.’

In regard to security, Friehe believes that:

“As an industry, we must guarantee that companies are not developing software to a negligent degree. They need to implement accepted industry practices, which should be enhanced to demand more regular audits when it comes to how data is collected and stored. Companies need to have security in mind and be held accountable if they fail to observe best-practices. This is especially so with connected devices, where extremely personal life data is concerned.

Ultimately, the free market will serve as the catalyst for ensuring that security in the IT sector catches pace, but there will be much more bloodshed and massive attacks.”

Presently, 1aim’s access control product LightAccess Pro can be purchased on Amazon Germany, UK and France, or by contacting their offices directly.

The post 1aim brings connected devices to workplace doors & beyond appeared first on ReadWrite.

ReadWrite

Smart-Enabling Each link in a Next-Gen Supply Chain

supply chain from cloudleaf

Any given supply chain is evolving, fast. Globalization, the “servitization” economy and shifting customer expectations are requiring producers to be more nimble than ever before. Economic sustainability is now the name of the game, and to win it, requires a new approach focusing on stakeholder relationships, end-to-end linked supply-chains, and redefining the context in which performance is measured. And none of this is possible without information and connectivity. That means lots of sensors, measuring lots of variables plus machine-learning, data-lakes and predictive analytics

Supply Chains: Today and Tomorrow

Enterprises are moving away from reactive, forecast-dependent supply-chains. And many have already made the jump. Although asset tracking platforms are good at unlocking efficiencies, cost-value and speed, they provide managers only partial visibility over their ecosystems. This is because hybrid IoT platforms rely on a mix of technologies and are not designed to provide end-to-end coverage, visibility or scale growth. Worse yet, the extraneous data they generate add complexity and cost to the entire chain. This prevents plant managers from gaining actionable insights which results in lower productivity, higher TCO and unhappy customers.

Patrick Dixon, supply chain futurist observed, “The current supply chain model is old-fashioned, restrictive and lacking in innovation. It is time that companies seize the opportunity to reduce costs and increase efficiency by making radical changes to supply chain management through co-operation and collaboration.”

Managing assets across global supply-chains requires a holistic, all-or-nothing approach; cherry-picked upgrades just won’t cut it. It also requires next-gen connectivity that eclipses legacy wireless standards. Yes, Wi-Fi, RFID and GSM/GPS may have their niche, but they were never designed to easily and securely link massive numbers of IoT edge-devices. Complicating things, rising energy prices, globalization, security threats and regulatory pressures (e.g. government mandated reductions in CO2) are causing supply-chain managers to adopt solutions that help them better understand their operations in context with the larger economy, environment and society. End-customer expectations are also evolving. Price is no longer the only factor in their purchasing decisions.

A Broader Approach to Managing Assets Across Value-Chains

Supply-chains are becoming less inward-focused and more customer-centric. A chain that covers customers-to-suppliers that enables managers to factor external market intelligence to be into the equation. And aligning back-office SCM, CRM and ERP systems to accommodate these requirements helps managers to redefine priorities of resources and make better decisions.

John Gattorna, professor of supply chain management at Macquarie Graduate School of Management, Sydney commented, “Companies need to learn from the wider business world and consider the human element of supply.”

The push sale model is over. B2Bs and consumers are now dictating price and how products should be manufactured, sold and supported. Ethical, cultural and health concerns now factor into every purchasing or leasing decision. This is the pull sales model. But sustainability is a broad and complex topic requiring enterprises to implement better systems and measures. MIT Sloan Management Review’s recent article on the subject cited “A Three-Point Approach to Measuring Supply Chain Sustainability” that considers the following three criteria:

  1. Context: Understanding the broader context in which supply-chains exists by a. Gathering metrics across the entire chain, b. Establishing science based goals and, c. Evaluating these results against forecasts.
  2. Collaboration: Building mutually beneficial goal-based relationships with key stakeholders across the entire chain to a. Reduce supply hotspots, b. Build capacity and, c. Use a common analytics platform.
  3. Communication: Ensuring the flow of information across the chain by enabling data messaging and orchestration between stakeholder systems that facilitate incremental improvement and a focus on shared KPIs.

In a recent study by Oracle titledThe Shape of Tomorrow’s Supply Chains”, 36% of the supply professionals polled, thought that collaboration ensures success, ahead of legislation (32%), technology (13%). This means that cross-boundary asset management solutions help enterprises and their stakeholders build sustainable and reciprocal relationships.

Technology to the Rescue (no, really!)

Technology is an enabler. It provides the mechanism to liberate large quantities of data that, aggregated and analyzed, enhances visibility across the chain. And real-time asset tracking solutions are pivotal to enabling stakeholder collaboration. In a study, Oracle cites 48% of those polled as “…wanting predictive software to allow them to calculate the impact of their decision or those of their suppliers” and “…41% express[ing] interest in smart containers or RFID technology that can provide information about the movement of products, or energy usage through a supply pipeline”. This means that enterprises can now justify building collaborative partnerships on their bottom-line.

Quick Look: Automotive

Automotive supply-chains are expanding both in scale and scope. Connected-vehicle telematics, infotainment systems and onboard computers are putting new demands on parts sourcing, manufacturing, assembly and distribution. And with endless things to monitor, measure, and optimize, determining cause and effect is becoming difficult. Sophisticated tools will be needed to measure the effect on resources used across the chain.

Optimizing workflows several orders of separation up and down the chain isn’t easy. OEMs might know the environmental impact of producing a vehicle but what’s the impact of producing each sourced part? Or the ecological impact of generating the energy or supplying the water to produce the component?

Edgar Blanco, executive director at the MIT Centre for Transportation and Logistics points out, “companies could be counting processes in a never-ending chain.”

cloudleaf devices

Cloudleaf Sensor FabricTM allows enterprises to take advantage of powerful cross-boundary visibility, real-time monitoring and granular control of the asset ecosystems across value-chains of people, processes and workflows. The solution uses next-generation RF-agnostic connectivity to link up assets-in-motion. These include patented enterprise-grade IoT-capable endpoints and gateways that form an intelligent mesh of assets that provide position and condition data to cloud analytics. Each Cloudleaf sensor generates a unique digital fingerprint that communicates position, status and condition of each asset in relation to neighboring devices and its operating environment.

cloudleaf ipad

This helps plant managers to easily orchestrate the flow of inventory containers, sub-assemblies and high-value tools across global supply-chains. Secure, scalable, and fully-managed, Sensor Fabric is designed with a zero-implementation footprint, eliminating potential impact on ongoing operations. Customers can literally implement the solution in the AM and be up and running and collecting data in the PM. Cloudleaf Sensor Fabric is not simply about sensors, connectivity and information, it’s about leveraging relationships between partners, suppliers and customers. IoT technologies, methodologies and tools are helping plant managers broaden their access, reach understanding of complex, globally connected supply-chains.

About Cloudleaf:

IoT is top-of-mind for enterprises looking to enable digital business transformation, but IoT has been challenging to use. Cloudleaf is changing the game for IoT by transforming how IoT is deployed and delivered.

Media Contact

Nitesh Arora, Head of Marketing

+1-415-315-9273

nitesh.arora@cloudleaf.io

The post Smart-Enabling Each link in a Next-Gen Supply Chain appeared first on ReadWrite.

ReadWrite

An Insider’s 11 Take-Aways from Companies Winning Industrial (IIoT) Cybersecurity

iiot according to ge ventures

As you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players.

To state it in the simplest terms, when protecting free consumer accounts like, Gmail or Facebook accounts, the motivation for investing in security is driven by certain objectives—protecting customer trust, avoiding an unpleasant hit to the company’s reputation, etc. These are, of course, real and important concerns. But when an industrial company is trying to protect a $ 10 million turbine, the economics of investing in security become very different—and much more straightforward. There’s a reason why much of current security investments are directed towards the industrial space: it’s an enormously promising market—and one where new innovations can have an enormous impact.

GE Ventures, the venture capital subsidiary of General Electric, is one of the organizations that recognizes the large opportunities (and even greater responsibility) to lower costs and eliminate unplanned downtime for their customers. They have been working closely with industrial companies for decades. The company has also built longstanding trust relationships with customers and helps them take advantage of the industrial Internet and protect them from its inherent risks. They are rising to that challenge—their own Predix architecture, a platform that help to optimize industrial business processes, has an extensive security-in-depth strategy.

iiot and ge ventures

In addition to the security-in-depth strategy on their platform, GE Ventures is always on the lookout for startups that are advancing the industrial cybersecurity art. According to them, there are some very talented ones out there. Of course, IIoT is not an easy market to break into for startups. Industrial networks are different than enterprise IT that makes them a terrible place for moonlighting—having a great product roadmap in traditional IT is not a birthright to succeed in industrial cybersecurity. But there are some commonalities among the most successful and promising startups in this space. Here are a few from GE Ventures’ perspective:

1.) They know their stuff.

There are lots of things That GE look at when evaluating a startup: A team with the right specialties. Differentiated technology. But the most important factor separating companies treading water from those already swimming laps is that they are staffed top-to-bottom by people who “get” industrial applications.
The most successful startups have a kind of institutional knowledge of industrial control systems (ICS)—often gleaned from working in industrial in their previous careers. They’ve learned important lessons (sometimes the hard way): They know the market. They understand its constraints. They understand through experience the attack surface and exposure. And they always, always keep their eye on the ball: the business continuity of the customer.

2.) They take the IIoT Hippocratic Oath: First, do no harm.

No matter what they’re working on, successful IIoT startups never lose sight of their customers’ primary objective: this machine cannot fail. Whatever work they’re doing to secure a system, they know that it absolutely cannot slow down or knock out industrial assets. They create a security layer that’s at least as agile, if not more so, than the devices and systems it’s protecting.

3.) They don’t make things harder for the customer.

Successful IIoT startups know that their target customer has been doing things a certain way for years. They know not to make assumptions that these customers have the same in-house capabilities and institutional knowledge that a non-industrial enterprise would—or, when it comes to software, that they even speak the same language. And they don’t assume that the customer will be willing to fill in gaps that are lost in translation. The most promising IIoT startups are ready to deliver IT solutions to industrial, and they’re not afraid to make it clear that that’s where their expertise lies. But they come out of the gate speaking OT.

4.) They make security integrated.

Successful IIoT startups know that treating security as an additional feature or up-sell will never fly. Their customers expect security to be baked into the product and fully integrated into existing industrial process.

5.) They don’t try to eat the whole cake at once.

Enterprise IT security and IIoT cybersecurity are two totally different animals. You can’t just port something from one world into the other. Yet, there are lessons to be learned from the evolution of enterprise security. Among the biggest that successful IIoT startups adhere to: they don’t try to solve the security problem in one fell swoop.

In the enterprise world, we started with one big problem (protecting digital assets and data), and ultimately broke it down into a whole lot of smaller problems: perimeter security, identity/authentication, data loss prevention, compliance, etc. Smart IIoT startups apply the same thinking to IIoT cybersecurity. They’re not looking to “solve” industrial cybersecurity. They’re attacking smaller, discrete problems and developing useful solutions.

6.) They start with the assumption that they will be targeted.

Even the biggest and best digital companies in the world find malicious or unexplained code in their environments—sometimes threats that have been lying dormant for years. Smart IIoT startups expect that their solutions will be subject to the same types of malicious and/or intelligence gathering threats as well. That doesn’t mean they don’t spend a huge amount of time and effort trying to prevent breaches. But they spend just as much time and effort making sure that, if someone does get in, they can isolate that breach and prevent it from infiltrating the rest of the system. And they recognize that the ICS attack surface extends beyond industrial devices and networks themselves, to all parts of the organization and supply chain.

7.) They’re ready to scale.

Successful IIoT startups never forget that for industrial customers, zero downtime is acceptable. They know that it’s not enough to have great tech—they have to be ready to engage that technology on a scale of thousands of deployments, sometimes in multiple countries—sometimes overnight.

8.) They know that security starts well before connecting a single industrial device.

Successful IIoT startups recognize that some of the most dangerous vulnerabilities aren’t just flaws in their code, but weaknesses in their supply chain. They know that any OEM that incorporates subassemblies made by others can potentially introduce tampered firmware into their system by accident. And they’ve learned the lesson from vendors who had excellent technology but saw deals evaporate because the customer realized they were using an untrusted vendor for one component of the supply chain. Solid IIoT startups take steps to secure their products during every step from building to shipping, when it can be most vulnerable to mistakes or malicious actors.

One of the more interesting areas now being explored: public ledgers. A growing number of companies are looking at Blockchain public ledger technologies to help authenticate assets and provide an audit trail with end-to-end chain of custody. (Industry groups are getting involved too—the Trusted IoT Alliance recently announced a new initiative to promote standard ledgers to authenticate IoT devices.) It’s still very early days, but work like this could prove incredibly valuable for ICS, where many categories of non-IT assets (engines, parts, sub-parts) are connecting back to the IT backbone.

9.) They don’t get distracted by buzz words.

The startup space, or at least the media covering it, tends to be overly sensitive to the hype cycle. Whatever the latest hot concept may be (currently, AI and machine learning), companies rush to make sure they can claim to check those boxes. Successful IIoT startups don’t spend their time worrying about the latest flavor of the month. They’re laser-focused on delivering concrete answers to specific industrial problems.

10.) They understand the need to secure data at rest and in motion.

Industrial customers need solutions not just to secure data at the edge—where more data than ever before is being collected and processed—but also to secure data in motion as it travels to the cloud.

Data in motion poses a particularly cumbersome challenge for industrial systems. Some companies in this space are developing solutions to simplify passthrough of encrypted data, eliminating the need to decrypt data at any point in transit, and its associated risks.

11.) They understand the job is never done.

Good cybersecurity startups recognize that they’ll never be “finished” with their solution, and they don’t get too comfortable with their current design. They understand that real-world cybersecurity means ongoing, indefinite iteration.


This isn’t a comprehensive list. But if you’re charting the course of companies developing interesting new solutions in IIoT cybersecurity, it’s a good place to start.

Authors: Michael Dolbec & Abhishek Shukla, Managing Directors of GE Ventures

The post An Insider’s 11 Take-Aways from Companies Winning Industrial (IIoT) Cybersecurity appeared first on ReadWrite.

ReadWrite

Manufacturers Identify New Ways to Succeed in Narrowband IoT

narrowband iot and manufacturers

Rise in demand for low power consuming applications has compelled the leading market players operating in the narrowband internet of things (NB-IoT) market to come up with different strategies to mark their presence. Recently, Vodafone announced launch of its narrowband internet of thing network in Sydney and Melbourne.

New Investment Pockets

Vodafone’s network is currently live in Frankston, Victoria. Here, it has been running its NB-IoT trails with Huawei for the past few years. The company aims to expand its network and add more stations to global IoT platform. With launch of NB-IoT products in Australia, the company aims to offer a wide range of products, services, and applications. The expansion of network will lead to more carriers, vendors, utilities, and commercial organizations roll out. In addition, this would harness the benefits of a new way to connect devises.

The use of Vodafone’s NB-IoT labs, such as Düsseldorf in Germany and Newbury in the United Kingdom act as a bridge with companies who are able to experience hands-on time with prototype devices. The broad array of use of the Narrowband IoT also drive its market. The governments show interest in it, owing to its usage in development of smart cities. This is another factor that motivates the leading players to either collaborate or merge with their contemporaries. Here is an instance of Huawei, which has signed an agreement with two other global companies to promote growth of the market in the Middle East.

See AlsoA fine Euro hello to Vodafone’s NarrowBand IoT next year

Middle East Capitalizes its Resources

The collaboration among Nextek Solutions, Quectel, and Huawei will lead to building of Narrowband IoT (NB-IoT) solutions to target the needs of regional organizations. The companies were able to grab the opportunity in the region owing to rise in developmental projects for smart cities. The governments have made smart city expansion a key goal in their national agendas. This is leading to the deployment of innovative projects that stand in a context of smart city development worldwide. Moreover, Huawei has developed its Hosting Center, which would serve as a secure platform for operators in the region. Its OpenLab in Dubai provides a platform to the regional partners to test and customize a variety of technologies. This helps them to target the vertical sectors which are most relevant to the Middle East, such as public safety, transportation, smart cities, oil & gas, and education.

Innovative Applications Drive the Demand

Recent innovations in the field of NB- IoT have enabled the customers to keep a track of their luggage, pets, and kids. This feature has been developed by Samsung by the name “Connect tag”. The tag connects with the narrowband internet of thing and is designed to clip onto pet collars, luggage, or children to help users to keep a track of them. The tag is one of many IoT devices that companies are experimenting with in the early days of NB-IoT’s availability.

From the above paragraphs, a conclusion can be drawn that with rise in awareness of wireless technology, the NB IoT market would witness a tremendous growth in the future.

The post Manufacturers Identify New Ways to Succeed in Narrowband IoT appeared first on ReadWrite.

ReadWrite