Menu

M2M FEATURE NEWS

Gemalto Technology Combats Illegal Deforestation

By Hannah Bond May 10, 2013

Each year, International Data Group (IDG) recognizes companies doing good in the world as part of its Computerworld Honors Program.  This year, digital security company Gemalto was named as a Laureate of the program for an innovation that helps deter illegal deforestation in the Amazon Rainforest. Its Cinterion M2M technology helps track the movement of certain trees in the rainforest so that illegal harvesting can be detected.

This system works through a collaboration of the Cinterion M2M technology, which provides GPS data and wireless capabilities, and an InvisibleTrackk device. After being put on a tree, the device broadcasts its location to a central server, allowing criminals who cut down and try to sell the trees to be caught.

Protecting the rainforest is just one way M2M technology can be applied to solve important environmental problems. M2M solutions are also being used to improve access to clean water and detect pollution in aquatic environments. By placing an electromagnet and microcomputer on the shell of an oyster or mollusk, scientists can gather data about the sea creatures’ shell-opening behaviors. Oysters and mollusks close their shells in the presence of polluted water and open them in clean water, so this data can be used in order to detect water quality.

Since M2M technology allows data collection from many sources without much overhead, it’s a clear choice for environmental monitoring. It can also be used to monitor conditions in places that are not easily accessible to humans, since the technology only needs to be put into place once. This versatility lends itself to many different applications, be they for the improvement of the environment or other for solving other issues.

The Computerworld Honors Program has existed for the last 25 years, with other Laureates from this year including MarkLogic, a company that deals with big data, and a Eurotech-powered SENSUSS application, which also utilizes M2M technology.




Edited by Alisen Downey

IoTevolutionworld Contributing Writer

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More