Remote - Winter 2013 - (Page 30)

Industry News The Connected Enterprise and Big Data Analytics will be The Top M2M Trends in 2014 According to a research report from the analyst firm Berg Insight, the global number of mobile network connections used for wireless machineto-machine (M2M) communication will increase by 22 percent in 2013 to reach 164.5 million. East Asia, Western Europe and North America are the main regional markets, accounting for around 75 percent of the installed base. In the next five years, the global number of wireless M2M connections is forecasted to grow at a compound annual growth rate (CAGR) of 24.4 percent to reach 489.2 million in 2018. The report highlights the connected enterprise and big data analytics as two of the main trends that will shape the global wireless M2M industry in 2014. "The world's best managed corporations across all industries are in the process of mastering how connectivity can help improving the efficiency of their daily operations and the customer experience," said Tobias Ryberg, senior analyst, Berg Insight. Berg Insight believes that the next step in the evolution of the wireless M2M market will be an increasing focus on data analytics. "M2M applications generate enormous quantities of data about things such as vehicles, machinery or other forms of equipment and behaviours such as energy consumption or device utilization. Big data technology enables near real-time analysis of these data sets to reveal relationships, dependencies and perform predictions of outcomes and behaviours. The right data analytics tools and the expertise on how to use them can create massive value for businesses", said Mr. Ryberg. "Over the next 12 to 18 months we expect to see a series of announcements of new partnerships between mobile operators and big data technology leaders to address the vast business opportunities in this space." Interested in M2M and The Internet of Things? Attend Internet of Things North America Learn more at www.RemoteMagazine.com/InternetofThings Global Shipments of Cyber Security Microcontrollers to Rise 91 Percent by 2017 Driven by demand for increased security in computers, authentication and the machine-to-machine (M2M) market, global shipments of cyber security microcontrollers (MCUs) are set to nearly double by 2017. Worldwide shipments of cyber security MCUs, also known as embedded secure MCUs, will rise to 529 million units in 2017, according to a new report entitled "Embedded Digital Security-World-2013" from the Smart Cards and Digital Security group at IHS, Inc. This represents 92 percent growth from 276 million in 2013. Cyber security MCUs protect data in devices and communications and ensure that devices are operating in a trusted or expected manner. Features of cyber security MCUs include cryptography acceleration, secure-key storage and management and secure boot of computing systems. These MCUs are used in a wide variety of products and electronic devices, from PCs and servers, to electronic peripheral devices and medical consumables, to a broad range of systems that engage in M2M communications. There are three applications for cybersecurity MCUs: trusted platform modules (TPM), authentication and M2M. The TPM market represents the application of security technologies to the PC and server markets in a standardized fashion. Until recently, TPM functionality has mostly been implemented on enterprise PCs and servers. This is now starting to change, as TPMs are also being used in the consumer-oriented Google Chromebook laptop and in certain tablet PCs, such as the Fujitsu STYLISTIC Q572. Nevertheless, IHS anticipates that through 2017 TPMs will mostly find use in enterprise computing applications. This is because of the complexity associated with activating and configuring a TPM, which is too technically challenging for most consumers. Another inhibiting factor is the great diversity of security needs of enterprises, spanning both financial loss assessments and regulatory mandates. A wide diversity of end products could potentially make use of cyber security MCUs for authentication purposes, including brand protection, revenue assurance and product safety and reliability. IHS has identified 30 www.RemoteMagazine.com three major clusters of product types that use secure MCUs as authentication co-processors: electronic peripheral devices, luxury goods and medical consumables. The market opportunity for secure MCUs is in two areas. First, secure MCUs can be integrated directly onto the motherboard of the host device, or the host device can use an application processor that has embedded a firmware-based secure MCU. Second, the device can embed an M2M form factor) SIM card into a cellular module. The directly embedded market opportunity for secure MCUs in M2M is by far the smaller of the two areas mentioned above at the present time. The M2M area represents the fastest-growing segment of the cyber security MCU market, with 20 million units set to ship in 2017, up from 2.7 million units in 2013. However, if secure MCUs were to become recognized as an essential underpinning of the Internet of Things, growth could be much higher. That is, if secure MCUs are deployed into most Internetconnected devices and become a cornerstone of enabling cybersecurity, the market opportunity for directly-embedded secure MCUs would expand into the billions of units. Report from Newton-Evans Emphasizes US Know-How And Capacity to Forge a Modern Electric Power Grid Newton-Evans Research believes that American manufacturers can accommodate more rapid growth in US grid modernization efforts than currently exists. Based on repeated surveys of several of the key manufacturing companies active in grid modernization product development and firms involved with grid management and control systems integration activities, there is sufficient manufacturing and integration capacity to meet expected demand levels for almost all core components of the smart grid investment grant program identified by the US Department of Energy as well as additional grid modernization components studied by NewtonEvans Research Company. Additional grid modernization components include the intelligent electronic devices (IEDs) required for various automation projects from transmission and distribution level applications down to smart infrastructure equipment. Regarding the nation's ability to increase systems integration workloads and capabilities, there is sufficient integration expertise available to expand usage levels of the following: (1) dynamic transmission line rating systems; (2) synchrophasor-related monitoring systems used in the nation's highvoltage transmission networks; (3) operational control systems deployed for power generation management, transmission and distribution network operations and outage management; (4) information technology with which to intelligently manage deployments of grid modernization components, including telecommunications and analytical tools. Nationwide grid modernization efforts could be largely completed by 2040, including widespread deployment of a variety of scalable energy storage devices sited along the electric power delivery network and at customer premises, according to these observations and insights. The core technologies identified as smart grid investment grant (SGIG) program components by DOE and discussed anew in this report are as follows: energy storage, dynamic line rating (DLR), operational control and monitoring systems including SCADA and energy management, distribution management system, Advanced Distribution Automation (ADA) and outage management systems, synchrophasors, advanced metering infrastructure, smart meters, home-area networks and smart electricity loads. Additional grid modernization components considered in this study include substation modernization programs, protection and control activities, cyber security developments, time synchronization and a variety of grid infrastructure equipment. In the Newton-Evans' surveys of and discussions with utility and industry officials, it is clear that marginal cost issues vary in importance among manufacturers and differ from the marginal cost concerns of integration firms. The nation's ability to meet expected increases in core smart grid manufactured technology is strong. The readiness to meet increased demand for various control systems is somewhat weaker and depends highly on specialized, skilled labor to write programs, train customers, integrate hardware and software, and install and test systems. http://www.remotemagazine.com/internetofthings/ http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - Winter 2013

Editor’s Choice
Message Oriented Middleware - The Future of SCADA
Enhanced SCADA Access and Big Data Lead to New Analytics & Optimization Capabilities
Approaches to Powering Telecom Sites
Satellite Communications for Water Metering and Other Water Applications
Remote Magazine Launches Internet of Things North America
Geospatially Integrated Surveillance Systems
Tier 1 Operator Case Study: Intelligent Site Management
SCADA - The Brain of the Smart Grid
SCADA
Networking
Security
Onsite Power
Industry News

Remote - Winter 2013

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com