Brazil has high hopes for curtailing illegal logging using M2M technology. You remember "High Hopes," don’t you? The song about the ant moving that rubber tree plant?
An ant moving a rubber tree plant may be just as impossible as a government tracking deforestation in the Amazon River basin. But Brazil is partnering with a company called Cargo Tracck in order to use M2M technology to track trees.
They’re going to hang M2M modules in the trees, and as long as the trees stay where they’re supposed to (trees not being known for being mobile), they’ll hang there quietly. But if the modules pass within 20 miles of a cellular network, the tree will send out a distress signal and its location, alerting authorities to illegal deforestation.
The modules are very hardy -- they can withstand the insane heat and humidity of the Amazon jungle, and they have a battery life of several years.
There are a couple of issues here, of course. The first is that the modules are about the size of a deck of cards. It is possible that thorough poachers will locate, remove, and leave behind the M2M modules. Another issue is that remote lumbering camps may exist outside of 20 miles of a cellular network. The Amazon jungle is the size of the continental United States and obviously many areas of it are very remote.
However, coupled with satellite surveillance, this appears to be a viable solution (or at least improvement) over previous methods. It also might serve as a pilot program for government CIOs elsewhere to track various illegal activities.
While governments and researchers have used RFID tags to track animals in the wild, both for research and protection, RFID’s range and reliance on specific frequencies often cause failures. Long-range RFID takes more power and expense, but most cheap, easily accessible RFID tags simply don’t have the range for this type of function.
M2M also has the advantage of two-way communication. Apps could be designed to allow the compromised asset to do more than simply alert someone that it has been stolen. Messages could be relayed to the thieves or logs could be maintained that help law enforcement prove who took the item being tracked, if it is abandoned. One could even listen in on the conversations taking place nearby.
Government CIOs looking to track assets, prevent crime, or otherwise use M2M to monitor objects in the wilderness need to answer a few questions.
Is the object worth it? M2M, while cheap, is more expensive than RFID. While RFID is not feasible for protecting trees in the Amazon, it is certainly reasonable for retail inventory control and even for the Defense Department to inventory weapons.
Is the network available? The beauty of using M2M for tracking the trees is that the government knows that eventually to sell the lumber, the trees will have to leave the wilderness for a place with cellular coverage activating the M2M modules. However, not all objects will ever be inside network coverage at an appropriate time for law enforcement.
Can you clarify the mission? M2M modules are smart, but they need rather simple instructions to work right. You can put one in a refrigerator to make sure it stays under a certain temperature, or you can tell it to contact you if it moves. But the more complicated the directions are, the less automated the process can be. The goal is to use hundreds if not thousands of these modules to monitor something you’d never have enough people to monitor. If the mission isn’t easily monitored without human intervention, then it is pointless.
Retailers and manufacturers have used M2M for years to automate processes, especially in logistics, and governments have used many of the same tricks in their logistics efforts. But now, we’re starting to see new uses for M2M that are more creative to make up for a lack of eyes. Law enforcement and government CIOs, learn a lesson and start using M2M before you start losing more rubber tree plants or whatever it is that you value.
@Dave: good point. An awful large number of episodes of "I Shouldn't Be Alive" (Animal Planet) seem to take place in the Amazon. I'm sure deforestation is much more harmful in the long run to have a bunch of m2m devices falling off trees as their life span ends.
@Susan- Hrmm..interesting. I suspect there would have to be at least some heavy metals involved.
I suspect that they EXPECT the tress where they place tem to be cut down but HOPE they won't be. If none of them are, I guess they would eventually become a problem. It does seem, however, that the Amazon seems to swallow up bigger problems than this one.
@Dave: Thanks. good point, I was thinking about this kind of like smoke alarms that would need batteries replaced every year. But of course, you could add new ones every year with fresh batteries. Redundancies would be a good thing, assuming it's cost-effective.
@susan- According to the press release "several years." My suspicion is that it will greatly vary by environment but that it is a nubers game. You put in 10,000 (or some other round number) and you expect to lost x% every year. If you put in enough the losses won't hurt until you're ready to replenish the group again.
It is a great initiative, indeed. There are chances of failing and there are chances that it will be success story. This is a mommoth task and the odds are huge. I will wait for the news from this project and wish this project success.
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
Please join us for the "IT Convergence Strategies: Why, When and How " to learn more about:
• 5 truths about infrastructure convergence today that go beyond the hype
• How to exploit the 4 phases of convergence maximum efficiency and agility
• Key milestones to plan for on the convergence journey
• Why integrated management is a critical component of convergence plans
• The importance of an open, modular approach, such as Dell’s active infrastructure, to building a converged data center
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: email@example.com
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
VMware has a new solution to the MDM problem, two virtual phones inside a real phone, at least for Android phones. Currently limited to two models, the idea could expand and provide a way of letting companies harmonize their need to manage corporate use of phones while preserving BYOD.
There's a lot of hype about virtualization of networks, NaaS, and SDN, but there's a couple of proven applications that enterprises could adopt right now and potentially save money and improve operations.
Skype/Outlook UC integration means we're going to have competition and fragmentation of UC client architectures, but is that bad? Modern devices can support IM, email, voice, and video clients, so maybe it's the back end of UC we need to be worried about.
Workers are now used to portable device support throughout their everyday lives. We should be looking at the policy of providing fixed-desk devices to support stationary workers. Could portable support be smarter?
Input devices run the gamut, from the humble Missile Command-style trackball to advanced speech recognition. Unfortunately, these input devices can be used for evil as well as good. Case in point: mobile ads that want you to talk to them.
Enterprises want three things in storage systems: First is some speech-recognition way of capturing videoconference data for indexing; second is semantic/AI analysis of emails and IM for content indexing; third is a better system for managing hierarchical layers of storage.