Browse Definitions :
Definition

LoRa Alliance

Contributor(s): Matthew Haughn

The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).

LP WANs enable machine-to-machine (M2M), industrial IoT, civic and commercial applications. LP WANs have lower costs and power requirements and longer range than mobile networks. Those advantages mean they can enable a much wider range of M2M and IoT applications, which have been constrained by budgets and power issues.

Here’s how the LoRa Alliance explains their mission:

By guaranteeing interoperability and standardization of Low Power Wide Area Networks internationally, the Alliance will consolidate the fragmented wireless space and significantly improve the ROI, which will drive large scale volumes for IoT.

The LoRa Alliance promotes its Long-Range WAN (LoRaWAN) protocol as an open global standard. According to the Alliance, LoRaWAN could provide coverage for entire cities or even countries with just a few base stations.

The Alliance has members throughout North America, Europe, Africa and Asia  including telecommunication companies, original equipment manufacturers (OEM), system integrators, sensor and semiconductor manufacturers. Founding members of the LoRa Alliance include IBM, MicroChip, Cisco, Semtech, Bouygues Telecom, Singtel, KPN, Swisscom, Fastnet and Belgacom.

See a brief introduction to the LoRa Alliance and the LoRaWAN protocol:

This was last updated in December 2015

Continue Reading About LoRa Alliance

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close