E2 M2M® FAQs
INTEGRATIONS
Can E2 M2M® integrate with GIS?
Yes, the E2 M2M® team has deployed multiple GIS integrations both to pull data from GIS systems and to push data generated in E2 M2M® back. Examples of this are the E2E and the enhanced GIS data collection modules.
How does E2 M2M® integrate with GIS systems like ArcGIS?
Data integration with GIS (ArcGIS or other platforms) can be done in a variety of different ways: data exports, APIs, scripts, and by making E2 M2M® a data source. The preferred method of integration for E2 M2M is to create a PostgreSQL compliant data source which will host the E2 M2M® data and supports geospatial fields. This can act as a data repository or data source for ArcGIS and host the same data both for E2 M2M® and a GIS platform.
Can E2 M2M® integrate to SAP or other ERP platforms?
Yes, the E2 M2M® team can work with you on integrating data exchanges between ERP systems like SAP or scheduling systems like Primavera P6. The integration options for these systems depend on the level of access needed to the systems, the frequency of the data exchanges, and other security constraints or requirements that the system owner might establish.
How does E2 M2M® integrate with SAP or other ERP platforms?
Data integrations with SAP or other ERP platforms (like Oracle) can be done in a variety of ways. Some require collaboration with system administrators from the target systems and others might require users to create import scripts or macros that utilize exported E2 M2M® data. Some examples of these integration options are:
- Over-the-fence approach: E2 M2M® can automate data exports on a recurring basis in a variety of file formats or to external databases (xlsx, json, xml, sql, etc). These data exports can be used as data sources for import processes or scripts in SAP or P6. These ERP platforms offer a variety of ways to safely import or script data imports from static data sources. This type of integration is helpful is the data doesn’t need to be updated too frequently or if the target systems are behind a firewall.
- ODBC integration: ERP systems like SAP and Oracle offer the option to act as ODBC or JDBC data sources to third party-systems. The E2 M2M® platform can connect directly to these types of data sources to extract data or to update information in the source system. The E2 M2M® platform can also act as an ODBC compliant data source compatible with MySQL and PostgreSQL, so third-party systems can access data used in E2 M2M®.
- API Integrations: The E2 M2M® can easily integrate with external APIs for web-services. E2 M2M® also offers a limited Rest API to access or update data in E2 M2M®. Most modern systems and web developers favor Rest APIs over other integration methods due to the standardization and structured methodology to interact with data over the web.
The E2 M2M® team can help you explore any of these integration options with other systems.
Does E2 M2M® have an API for third-party integrations?
E2 M2M® does not have a public API at the moment, but a data access API can be made available upon request. This would allow a third party or a client to automate access to E2 M2M® data and to update E2 M2M® programmatically. Future plans for E2 M2M® include the development and support of a full-scale API that will be used both to integrate E2 M2M® modules and third-party systems.
SECURITY
What data is stored in E2 M2M®? Do you store PII (Personal Identifiable Information)?
The current deployments at Sempra do not store personal identifiable information (PII). Stored data consist of data collected in the field for inspection services, construction activities and photos, and other media that are captured in the field or uploaded by users related to the projects.
Where is the information stored?
The information is stored in a proprietary cloud database hosted in AWS (Amazon Web Services).
Is E2 M2M® secure?
E2 M2M® follows ISO-27001 certification standards for securing its network assets, data and control access to protect mission-critical information from accidental or deliberate deletion/loss, integrity compromise or theft. These measures and standards include Advanced Encryption Standards (AES) of stored and transmitted data, granular and permission-based access control to data and applications, redundant backup and storage strategies, and active vulnerability and threat assessment of all network assets.