Feeds

Ericsson and SAP Megazord has no need for your PUNY human phonecalls

Duo sets sights on the machines

3 Big data security analytics techniques

MWC 2013 Ericsson has signed a deal with SAP to collaborate on bringing about the rise of the machines, with ongoing help from Gemalto, by combining into an unstoppable Megazord capable of communicating with 50 billion acolytes.

The combination of Ericsson and SAP, announced today, will see SAP's software managing embedded applications connected over mobile networks provisioned by Ericsson's servers, using Gemalto's Machine Identity Module (MIM - like a SIM only cross-network), the whole thing comprising a Software as a Service (cloud-based) offering for anyone who wants to talk to a lot of machines using a cellular network but dosen't want to muck about creating applications, running servers or even committing to a single network operator to do so.

The latter aspect is taken care of by Gemalto, who's MIM already appears (within a SIM) in the latest Lenovo tablet. The MIM-in-a-SIM comes stuck into new tablets and stores details of one operator, for bootstrapping, but can then download credentials for other operators (signed by Gemalto) to switch networks without changing the physical chip. That's nice for a Lenovo, who can sell connectivity within the tablet interface, but its even nicer for someone running an M2M network who might want to switch network operators.

Right now they can't, as demonstrated by General Motors who this morning announced that cars connected to its (American) OnStar service  would, from next year, come connected to AT&T rather than Verizon, but the cars already on the road will have to remain with Verizon for the duration as they have Verizon credentials embedded and no MIM to help them switch.

Which does, again, beg the question of why the network operators are so supportive of the technique exemplified by the MIM, helping Apple push through the standard and proudly supporting Lenovo and Dell in their early deployments, but that's because they see M2M as an even bigger cow to be milked.

The much-discussed Internet of Things will apparently hook up 50 billion devices around the world, enough to make the most-cynical telco executive drool a little. But those devices don't just require radio networks and distribution of secure credentials, they're also going to need 50 billion database records to track them; record all that data they're generating; and issue commands to make them do all the clever things on which we'll come to rely in the next few decades. That's where SAP comes in.

The deal will cover all the important communications, as SAP's man for mobility Sanjey Poonen put it:

We'll see man talking to machine
machine talking to man
and machine talking to machine

...leaving out the only mobile communications currently generating a profit - humans talking to other humans - but there's nothing sexy about that. ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.