Browse Definitions :
Definition

LoRa Alliance

Contributor(s): Matthew Haughn

The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).

LP WANs enable machine-to-machine (M2M), industrial IoT, civic and commercial applications. LP WANs have lower costs and power requirements and longer range than mobile networks. Those advantages mean they can enable a much wider range of M2M and IoT applications, which have been constrained by budgets and power issues.

Here’s how the LoRa Alliance explains their mission:

By guaranteeing interoperability and standardization of Low Power Wide Area Networks internationally, the Alliance will consolidate the fragmented wireless space and significantly improve the ROI, which will drive large scale volumes for IoT.

The LoRa Alliance promotes its Long-Range WAN (LoRaWAN) protocol as an open global standard. According to the Alliance, LoRaWAN could provide coverage for entire cities or even countries with just a few base stations.

The Alliance has members throughout North America, Europe, Africa and Asia  including telecommunication companies, original equipment manufacturers (OEM), system integrators, sensor and semiconductor manufacturers. Founding members of the LoRa Alliance include IBM, MicroChip, Cisco, Semtech, Bouygues Telecom, Singtel, KPN, Swisscom, Fastnet and Belgacom.

See a brief introduction to the LoRa Alliance and the LoRaWAN protocol:

This was last updated in December 2015

Continue Reading About LoRa Alliance

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close