Browse Definitions :
Definition

M2M economy (machine-to-machine economy)

A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts. In the near future, it's expected that M2M participants will be able to lease themselves out, hire their own service engineers and pay for their own servicing and replacement parts.

In an M2M economy, businesses may be able to leave asset management and maintenance to the assets themselves. That's because the growing pervasiveness of the Internet of Things (IoT) and advances in artificial intelligence (AI) are making it possible for sensors, actuators and networked smart machines to operate autonomously, communicate directly with each other and use data gathered over time to maintain themselves without human intervention.

Currently, the relatively high cost of transferring micro-payments has been a roadblock in the growth of an M2M economy. Currently, the IOTA Foundation, a non-profit, open-source driven organization headquartered in Germany, is promoting Tangle, IOTA's distributed ledger technology, as a way for people and machines to transfer data and/or money without transaction fees. If concerns about zero-fee transactions can be addressed, use cases for M2M economy experimentation is expected in various sectors of the economy include manufacturing, logistics, resources, agriculture, energy and infrastructure. 

This was last updated in March 2018

Continue Reading About M2M economy (machine-to-machine economy)

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close