Feeds

Intel seeks connected home for Atom

Vodafone to provide the needed connectivity

High performance access to file storage

Vodafone and Intel have banded together to push Atom chips, and Vodafone connectivity, into cars, fridges and toasters – the humans already being adequately equipped.

The two companies reckon it is the complexity of development that is stopping manufacturers connecting up our washing machines and cookers, and will thus release an easy-to-use Atom-based developers' kit to spur development in the machine-to-machine industry.

"Take-up has been partly held back by the complexity of installing and managing the technology," according to Vodafone's head of M2M, who promises greater simplicity though wireless connectivity.

It is not just Vodafone and Intel who reckon we're about to start connecting up all our appliances – last week France Telecom and Deutsche Telekom started working out how to ensure cross-border compatibility for M2M services, so a manufacturer can just drop in a module and ship it anywhere in the world with confidence that it will find an internet connection when it gets there.

This is the same problem that Qualcomm reckons its Gobi technology can solve, and a solution has to be found if all in-home connectivity isn't going to end up using Wi-Fi by default.

The great thing about Wi-Fi, for manufacturers of white goods, is the ability to drop in a chip and antenna without worrying about where in the world the product gets shipped. The problem with Wi-Fi is the need for a user interface, and a user capable of interacting with it, and the associated support issues.

Mobile operators reckon they can connect up all those low-traffic devices by simply providing a SIM slot, or perhaps not even that if the management of embedded SIMs can be agreed on. It might seem counterintuitive for your dishwasher to have its own mobile phone when you've got a perfectly good ADSL connection locally, but if it means that the least technically literate individual can use it, then manufacturers might be interested ... once they've thought of a reason to network your dishwasher, that is. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.