Your cart is currently empty!
M2M Blog 4
If all the stages of the data collection system are set up properly, the information is sent wirelessly to a cellular network, transmitted through the Internet and to a server in your monitoring station or headquarters. And all is well. But we’re talking about real life here.
Think about an iPhone signal breaking up and how a conversation gets miscommunicated. Now, think about 3,000 ATM machines “talking” to the “terminal.” That’s a challenge. The difficulty is to place these modems where they have the best signal coverage and strength so your stream of information from these data collectors is not lost. Add to this the challenge that often the ATM may have to be placed in a spot that is not ‘prime real estate’ let alone in line-of-site to the closest cell tower. Often the ATM is placed in a 2’ x 2’ corner down the hall where there is an empty space.
An M2M modem without signal is sometimes more easily recognized and fixed. Whereas delayed delivery of data, or lost and irrecoverable data, just disappears. This has the potential for even more dramatic outcomes.
A bad connection can result in “corrupted” data; much like a bad or dropped phone call. Some of the information may make it through, but it may be unusable, inaccurate and incomplete.
The cost of bad connections are high because…
• human personnel is sent to the site to troubleshoot, often a truck has to ‘roll’ to the site
• signal studies may need to be done
• new equipment may need to be purchased
• hours of equipment downtime resulting in loss of revenue
Do it right the first time
• Save on labor
• Sign up the best carrier
• Get accurate antenna placement
• Eliminate unnecessary service calls
• Cost of equipment downtime
• Simple to use
Scott Schober
CEO | Author | Speaker at Berkeley Varitronics Systems
Scott Schober presents at cybersecurity and wireless security conferences for banking, insurance, transportation, construction, telecommunications and law enforcement industries. He has overseen the development of dozens of wireless test, security, safety and cybersecurity products used to enforce a “no cell phone policy” in correctional, law enforcement, and secured government facilities. Scott regularly appears on network news programs including Fox, Bloomberg, Good Morning America, CNN, MSNBC, NPR and many more. He is the author of 'Senior Cyber', 'Cybersecurity is Everybody's Business' and 'Hacked Again', the “original hacker’s dictionary for small business owners” - Forbes Magazine.
Our Newsletter
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam mattis ligula vitae leo scelerisque, sit amet feugiat ex venenatis.
"*" indicates required fields
Latest Posts
Our Best Sellers
How can we help?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc dictum aliquet justo sit amet consectetur. In tempor lobortis ante vitae ornare. Praesent feugiat magna at tempor consequat. Aenean in iaculis libero, aliquam imperdiet mi.
Leave a Reply