By: Martin Miller, Chief Technical Officer
M-Vision; Pleasanton, CA 94566; Tel: (925) 997-7298
Introduction to Intelligent Device Management (IDM)
Intelligent Device Management (IDM) has become an ever-increasing necessity as more systems and devices are connected to the network. It was only fifteen years ago that computers and other devices functioned as stand-alone islands. At first, connecting computers via a network provided a way to share, store, and distribute information. But as the Internet grew and approached ubiquity, devices such as kiosks, automated teller machines, vending machines, and even traffic light controllers became easily networked. These devices embed sophisticated computers that not only provide the required information, but can also monitor their own activity, tracking both performance and procedural usage. All this valuable information can and should be accounted and published to various subscribers, including service organizations, accounting groups, and operations. For example, a utility provider could apply a customer rate plan based on the tracking of power consumption versus time of day.
Today, "intelligent device management" is a formal market segment as recognized by the Gartner Group. Other related acronyms and terms, all under the umbrella of "pervasive computing," include Element Management, Remote Systems Management, Device Relationship Management (DRM), and M2M (machine-to-machine command-and-control). Typical of all solutions in this category are remote monitoring, diagnostics, and analytic capability, as well as automation of both management and service of network-connected devices.
|IDM Services Multiple Industries|
Among the many promises of IDM, the most apparent is the improved capability of device manufacturers and service providers to respond to customers and boost workflow efficiency. IDM offers the ability to improve field service automation (FSA) globally and helps enhance both short and long term return on investment (ROI). Unlike element management, which typically does not extend much beyond provisioning of devices and reactive alarm aspects within an IT or data center context, proper implementation of IDM enables proactive service management across the public internet, without compromising security.
Previous Page | Next Page
1 | 2 | 3
If you found this page useful, bookmark and share it on: