Skip to main content

Data updates get the flexible treatment with the Bluemac x7

Bluemac Analytic’s latest platform, the x7, will log vehicle and multimodal performance data across any combination of Bluetooth Classic, Bluetooth Low Energy and Wi-Fi. This flexibility means the user gets the most matches and detailed data enabling new usage scenarios, says the company. Bluemac says that the x7 ensures industry-leading security for both device access and communications. Data is protected using an on-device rotating-key hash of citizen and encryption.
June 7, 2018 Read time: 2 mins
Jason Spencer of Bluemac
8801 Bluemac Analytic’s latest platform, the x7, will log vehicle and multimodal performance data across any combination of Bluetooth Classic, Bluetooth Low Energy and Wi-Fi.


This flexibility means the user gets the most matches and detailed data enabling new usage scenarios, says the company.

Bluemac says that the x7 ensures industry-leading security for both device access and communications. Data is protected using an on-device rotating-key hash of citizen and encryption.

A new device management system ensures superior monitoring, maintenance and TCO. Combined with the company’s site services - both cloud-based and on-premise extension, it provides a suite of analytics. Bluemac x7 system delivers accurate and quantifiable travel time, speed, origination-destination, and trajectory reporting.

The system is designed to feed data to AI and ML systems via a rich M2M API - as always with our customer owning the data.

The Bluemac x7 offers multiple power and networking options, including PoE and 4G LTE NB-IoT cellular and configurations for in-cabinet, permanent, and solar charged units. This provides customers with flexibility in easy-to-install and maintain deployments.

Booth 147

For more information on companies in this article

Related Content

  • Technologies to protect connected cars ‘not being utilised’
    August 10, 2016
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • Huawei's ORT tech removes highway toll gates
    August 26, 2020
    Road tolling operations will be transformed by new revenue collection possibilities
  • Tolling systems - interoperability is key
    January 25, 2012
    Is US tolling as fragmented and divided as some would have you believe? And are the technology suppliers so very entrenched? ITS International spoke to the market's leading suppliers. A few years back, the prevalent view was that the North American tolling market was characterised by fragmented, proprietary solutions, each existing in splendid isolation. The reality is that a combination of pragmatism and good old market forces have seen some concerted moves made towards interoperability in many areas.
  • Kistler offers flexible WiM solution
    April 13, 2021
    KiTraffic Plus sensors capture weight of trucks at speeds of up to 120 km/h