Vision Zero and How Telematics Can Help You Get There

Vision Zero and Telematics

Contributed by Kim Thoman

In this segment we will discuss Vision Zero and how sophisticated and affordable telematics solutions can help you reach your goals. First it is important to understand what Vision Zero means and how it works.

Vision Zero is a strategy to eliminate all traffic fatalities and severe injuries, while increasing safe, healthy, equitable mobility for all. First implemented in Sweden in the 1990’s, Vision Zero has proved successful across Europe. It was officially introduced in North America 1995 and is quickly being adopted across many cities in the United States. Among these cities are Seattle, NYC, San Francisco, Washington D.C., Boston and many more. Even closer to home Orlando, Tampa and Hillsborough are implementing Vision Zero goals.

Where to Start

The question is what tools are needed analyze the data involved with traffic fatalities. Information that is important to study is traffic patterns, traffic light coordination and timing, occurrence of collisions and the ability to highlight hazardous intersections to name a few. NYC’s Department of Citywide Administrative Services (DCAS), for example, adopted telematics to encourage safe driver behavior in its very large municipal fleet.

In an effort to make change DCAS uses collision reporting data to better understand the occurrence of collisions. This allows them to better modify safety training, evaluate roadway conditions and assess the efficiency of street improvements and projects for all road users. Another benefit of telematics for DCAS is the reduction of costly lawsuits and process that consume valuable resources.

Vision Zero Results

NYC’s Department of Transportation (DOT) also implemented the same telematics solution in the agency’s 35,000 fleet vehicles to analyze the speed within the fleet and the quality of pavement. In NYC, telematics has contributed to a reduction in fatalities two in 2018 compared to eight in 2014 as employees engage in safer driving behavior.

We live in an era of Big Data. Telematics can optimize smart transportation. Aggregate data allows cities to closely monitor traffic flows, understand the effects of new projects and speed reduction programs as well as assess the efficiency of traffic signals, map air quality and highlight hazardous intersections. These are all tools to better manage the city’s transportation system as a whole.

Vision Zero

More Benefits With Less Effort

By combining air quality sensors with telematics solutions, city vehicles have the ability to measure air pollution without changing their regular routes, according to the Environmental Defense Fund (EDF). Air pollution data is collected by stationary air quality monitors placed miles apart. This has been proven not to be the best solution as studies have shown that air pollution levels can vary greatly from one block to another.

By installing mobile monitors on fleet vehicles could allow a city to cover more ground. According to the report, a fleet in a small or medium North American city could map 50% or more of the city with 10 vehicles, and almost 80% of the city with 20 vehicles. In Washington, D.C., where only five stationary air pollution monitors are installed throughout the city, the top 20 public vehicles covered nearly 70% of the city in six months.

The Future of Vision Zero and Telematics

Vision Zero is not a slogan, not a tagline, not even just a program. It is a fundamentally different way to approach traffic safety. That being said, implementing a successfully proven telematics solution is an invaluable tool to help cities across North American reach these powerful safety goals.

Contact Fleetistics today for a consultation.

Where Can I Charge My EV?

Where Can I Charge My EV? I’m desperate with 10 miles to go…

One of the biggest fears associated with a fleet deployment of electric vehicles is what will happen when things do not go as planned. In other words, what if the unthinkable happens? What if my driver needs to charge while on the road? What’s more, what if my driver is far from familiar locations, facing a deadline?

The last thing you want your drivers asking is “Where can I charge my EV now?”

Hopefully most businesses will first do an EV suitability assesment prior to replacing vehicles. This will help them to understand if specific vehicles doing specific tasks are viable for replacement with an EV. If the normal use of a vehicle is within the range expectations of the EV replacing it, there should be no issues. But we all know, the unexpected can happen.

One of the greatest things about living in the 21st century is Crowd Sourced Open Data Initiatives. These are projects like Open Street Maps or Wikipedia, where individuals just like us contribute what they know to the greater community. This allows the project to amass a great deal of usable data and serve it back to the public on the web. In most cases, they will suggest users volunteer donations, rather than charging any user a fee.

ChargeHub.com is providing the solution to “Where can I charge My EV?” through their website. 

When you visit the site you will find it easy to navigate. You are able to add the charging stations you have found or search the map for a charging station near your location. You can even check the map first, and plan your route based on the availability of charging stations along the way. 

Now that your fears about finding a place to charge are put to rest, it is time to evaluate what fossil fuel vehicles to replace and what EV to replace them with. That is the subject of an upcoming post on tools to evaluate, based on your current vehicle use, what are the logical choices for your fleet.

Are you using all of the resources that can take your business to the next level?

GPS Tracker Comparison

GPS-Tracker-Comparision
GPS Tracker Comparison
Finding the right GPS tracker can mean thousands toward your ROI.

GPS Tracker Comparison

There are a wide variety of GPS trackers on the market today. Almost anything can be tracked but not everything can be tracked well. Understanding the basics of GPS tracking technology will help you make a quicker and better decision for your asset tracking needs.

Being familiar with the industry terminology and technology will actually lead to an increased ROI. If you are looking for a fleet safety tool but realize you can also benefit from productivity data, you can find a GPS tracker that can help in both areas.

Let’s get started with your GPS Tracker comparison.

Vehicle v. Asset Tracking
The first step in your GPS tracker comparison is determining the proper type of tracker based on what you need to track.
Vehicle Trackers

Vehicle tracking provides a consistent and generally protected environment inside the vehicle. Devices don’t need to be IP67 rated like asset trackers which are more expensive. Vehicle GPS trackers typically use cellular communication due to a desire for more data, at a lower cost, because satellite coverage is not needed. Vehicle tracking services typically update every few seconds to no more than 2 minutes depending on the monthly cost. More data means a higher monthly cost.

Asset Trackers

Asset tracking can be done with satellite tracking systems or cellular GPS trackers depending on where the assets operate. Frac tanks used in the oil and gas industry generally use satellite trackers. Skid steers in urban construction almost always use cellular GPS trackers. Customers generally choose to receive more data at a lower cost; even if they cannot track an asset live 100% of the time. All GPS trackers have dead spots where they cannot communicate for some reason.

Backup Batteries

Another factor in GPS tracker comparison is determining if you need a device with a backup battery. Backup batteries (BBs) are often requested and needed for unpowered assets. GPS devices require power from the asset or from a battery to operate. Assets, such as trailers, often sit without power for extended periods until connected to a tractor where power is restored. In these cases, a backup battery is needed. In vehicles, GPS devices receive constant power from the car battery.

In vehicle tracking, backup batteries are less important. BBs don’t enable the device to function as normal. BBs put the device in a reduced performance mode so the battery lasts longer. Customers often think BB will enable them to track the driver after they remove the GPS tracker as if it were still installed. BBs range from a CR2525 watch battery to lithium ion batteries. Vehicle trackers typically use small BBs which generally show you where the employee tossed the GPS unit out the window but not much more.

We sell all of the above options and have seen every scenario over the last 16+ years.

Tracking, Telematics, Diagnostics
Tracking

Vehicle location and speed data. Where an asset went, where it stopped and how long it was there.

Telematics

Data provided by the vehicles computer network and sensors (excluding engine data). This includes RPMs, accelerometer data for jack rabbit starts, harsh breaking, and reckless driving. It is the data used in accidents. Read more

Engine Diagnostics

Data transmitted by the engine through the OBD or J-Bus port generally consisting of fault codes and status data. There is a wide range of data available and GPS companies claim to offer these if they provide one data point out of several hundred. Ask good questions.

Installation & Tampering

 

GPS Tracker comparison needs to include installation considerations. There are essentially two types of installation used today; 3-wire and plug and play. The 3-wire installation is considered more reliable but it isn’t if the plug-and-play installation is done right with a Y-harness. View more on installations. 3-wire installations can be done on small to mid-size fleet trucks by most anyone that can install a car stereo. On bigger trucks and equipment it is best to use a trained installer or mechanic. Learning to install and troubleshoot the technology can save your operation a lot of time and money.

Tampering has been an issue for over 16 years. Tampering occurs with plug-and-plan (P&P) and 3-wire devices about equally. OBD devices that are installed without a Y-harness (moves GPS into the dash) are the most likely to be tampered with. Companies that sell devices requiring 3-wire installs will tell you OBD devices are always an issue. We sell both and the tamper rate is about the same. Tampering stops when you put your foot down. Read more about introducing GPS trackers to employees.

Equipment Considerations

 

Several equipment considerations such as backup batteries and communication networks are discussed in other areas of this blog. GPS tracker comparisons should also include details of the physical design and construction of the GPS device itself.

First, all GPS trackers are not made equal. Significantly more engineering goes into some devices like the Geotab GO device. Other GPS units are almost “dumb” in comparison and everything else is in between. We sell them all so we are communicating facts as we know them, not opinions.

GPS devices vary in construction quality. Some have thinner plastics and others more robust internal components. A good GPS chip set means faster acquisition time from a cold start and more accurate coordinates in tough environmental conditions. Some devices do well in heat where others shut down in the Arizona sun. Ask for the technical specification sheet and the warranty on the device.

Warranty Considerations

If you think about GPS trackers like a cell phone you will be able to easily understand the general conditions. In short, most have a limited warranty period if you are not on a perpetual lease or rental. Second, if you break it you buy it. If it breaks, you keep paying for the service until fixed. If it fails due to manufacturing the device is replaced and you are responsible for the service cost to swap the unit.

Backup Battery Size and Type

Lithium ion batteries are the only real choice for a battery due to durability and long-life. The size of the battery in milliamps determines how long the battery will last based on the draw from the GPS unit when asleep and when it wakes to transmit without constant power. Since batteries don’t last forever be sure the device will use off the shelf batteries to keep your cost down. Having to special order custom batteries drives up the operational cost. If you can replace the batteries you will save big money on service work.

ELD & Dispatching
Electronic Logging Device (ELD for FMSCA compliance)

ELD is a big deal which is coming at certain industries fast and furious. Selecting the right GPS tracker means you will also get ELD options, if and when needed. Those fleets not yet AOBRD compliant by December 17 2019 will be in violation and taken out of service.

Read the full 126-page ruling here.

Dispatching

Dispatching is the process of sending stop or route data to a driver. Most ELD devices will offer some type of dispatching as an additional service. If you need both getting a GPS tracker that offers both will be significantly more convenient than two systems, which aren’t integrated, from two vendors.

Cellular v. Satellite

 

There are really two types of communication technology used for GPS trackers – satellite and cellular. Don’t confuse GPS satellite with communication satellites. GPS satellites broadcast a radio wave like an FM radio station and you cannot “talk” back to it. Cellular and satellite communication generally talks 2-ways but satellites can be 1-way.

Most GPS trackers use cellular networks to move GPS and other data from the vehicle, to a cell tower, to a server, to the Internet. Because of the low cost, most fleet operators use cellular. Understanding the carrier used and the coverage footprint will enable you to know when you will receive “live” tracking data. Cellular is also more reliable because it can communicate with the towers more easily due to the radio frequency used.

Satellite communication is more of a specialty technology used when assets are operating in very remote areas where cellular service is not an option. Communication satellite signals do not penetrate objects such as trees or buildings and costs significantly more than cellular. Satellite systems also manage battery power differently which leads to less detailed track data.

Cellular networks generally use GSM or CDMA technology. Verizon and Sprint use CDMA and are generally being phased out and replaced by 4G or LTE service which also SIM cards. GSM is the international standard and is easily identified by a SIM card. SIM cards offer some flexibility but you cannot take a GPS device from one vendor and use it on another vendors website.

Log, Update & Refresh Rates

 

In any GPS Tracker comparison, understanding the relationship is important to sort out the information from various sales reps. Unfortunately, most sales reps in call centers don’t understand these concepts so you will have to prompt them to explain each in detail so you know what you are getting.

Log Rate

The frequency which the GPS tracker logs the position of the asset. This varies from a few seconds to once per day.

Update Rate

The rate at which the log data collected is transmitted to a cellular or satellite communication tower.

Refresh Rate

The rate at which the website refreshes and displays newly received log data.

Integration

 

GPS Tracker comparison may also iclude aspects of how the data generated can be integrated. Integration refers to the sharing or movement of data between applications, databases or services in order to increase the overall use and value of data already paid for.

If you have a need to utilize the GPS tracker data in other areas you want to be sure the GPS vendor offers APIs. APIs are an industry standard method of moving data via the Internet in a secure manner.

Integration can also be accomplished through add ins that are installed in your user interface. Camera video can be viewed alongside the gps tracking data on the map for instance.

Read more

DriveTRAX – How’s My Driving Program

Driver behavior decal service
City Worker - How's My Driving Program

Click to enlarge

Maintain a Positive Public Image

DriveTRAX fills in where GPS tracking cannot provide information. As much as we love GPS tracking technology, it cannot give you the needed data in all situations. Your brand is on your fleet and every interaction with the public builds or diminishes your brand. 

We have seen many situations like the one to the left which provides a terrible public perception of the city and their workers. This photo was taken alongside a busy 6 lane road during the lunch rush hour. The driver may have been on break from a 12-hour shift but the public perception is still negative.

The DriveTRAX program automates and digitizes the traditional How’s My Driving concept. With a fully automated system, there is no need for payroll expenses. Fleetistics took this How’s My Driving concept further by integrated reports with live vehicle tracking data. We can determine if the vehicle was in the area at the time and date of the report to protect drivers from false allogations. 

DriveTRAX provides another layer of insight that is provided by citizens. Fleetistics integrates the GPS tracking data with the citizen reports to keep your public perception strong.

Focus on the Positive

The goal is not to catch employees doing something wrong. The goal should be to catch drivers doing what you want them to do, rewarding that behavior, and quickly addressing the unwanted behavior.

Unfortunately, some people don’t learn and they make a choice to work some place else, like your competitor, that isn’t using Fleetistics technology.

DriveTRAX is very cost effective alternative to a traditional How’s My Driving program, plus the value of our GPS vehicle tracking service integration.

How's My Driving

10 Simple IT Security Steps for Small Business

IT Security is Critical

Malware attacks due to lack of IT security have made big news lately. Cybercriminals are a huge concern for all businesses. Unfortunately, small businesses that lack an IT department have a higher risk of exposure to their attacks. Though not as attractive a target as a Fortune 500 company, they may be considered by hackers as a much easier mark. Ultimately, a single attack could wipe out many small businesses.

After taking steps to upgrade our own security procedures, Eron Iler, Fleetistics fearless leader, documented what he learned through the process.  In this video, he shares 10 steps that any company can take to improve their IT security and lower their risk of falling victim to cyber-attack. To learn about cyber crimes visit IGTech365.

Transcript of 10 IT Security Steps
Click Here to View

Hi everybody! Eron here with Fleetistics, and today we’re going to talk about something a little bit different than fleet tracking technology. What we’re going to talk about is technology
that has come to the forefront in the news lately, and it’s really about securing your business. We’re not only interested in your fleet, but we want to see your overall business flourish and in the future we hope to bring you more business related products and services that will just help you grow your business and make it a more profitable business.

So the topic today is actually IT security. There are some things that we have done internally to improve our security
and these are the same types of things that most small to medium businesses should be doing as well.

Now if you’re in a bigger organization you probably have IT staff that is available to take care of these things for you. You
may hear some things that you’re not doing and you may have to ask your IT group as to why you’re not doing certain things, because these are pretty basic you know type security measures that should be implemented.

So the very first one is two-factor authentication, and if there’s anything that’s going to help you avoid getting hacked – and it’s the easiest thing to do – two-factor authentication is it. You can receive an email, an SMS, or you can use the authenticator app to get a code which then allows you to enter that code to
then access sensitive areas of your organization or to sign in to perhaps you know a company resource like SharePoint or something like that. It is a very very simple way of doing
things.

And with all security there’s a trade-off. There’s convenience
versus security, and every time that you add more security you’re going to have a little more inconvenience, so you’ve got to realize that in our world today we are just dealing with
things differently. And now when it comes to malware, spyware you know the encryption technology, things of that nature, those things have very, very real consequences. And you can see from the gas, the gas company who is a major organization which would probably or should have had some of the best IT available, they still got caught. So what are you going to do in your small business? And it is just as easy as clicking on something that looks familiar, not paying attention to the destination URL and then you install something that encrypts your hard drive, right? Or, you know, even worse yet it gets into your network and encrypts your network so something like two-factor authentication is a very easy way to put up an initial barrier to that process.

All right number two is only allow computers that are connected to your network through the company to actually
connect up to your resources. And it is convenient for us to allow people to work from home, and use whatever computer computer they may have already in place. It is also inconvenient for employees to have to use a company computer because they probably already have a workstation set up, however, what you cannot do is rely on that computer and that employee to manage their security the same way that you want to manage your business security. Therefore, if you enable the functionality that only a company computer that is registered through your IT department on your network can actually connect to your company resources, you will avoid the holes that are created by employees who may or may not keep up with IT security. They certainly are not going to have the level of security that you would want to have to protect not only your data in your operation, but your customer information as well. And if you happen to be storing you know credit card information or sensitive data then by law you have requirements like this to protect that information. You know if an organization was to steal all your contact information… you know maybe it’s something they could find online, but if they took that list and turned around and sold it to a competitor (and I don’t know about you, but every day I get prompted via email “hey would you like to buy a list from this organization or this industry?” They can take that information and make it available to your competitors and then start calling on your customers. Right? So it may seem mundane for certain types of information but they can do a lot of things with data
that you and I don’t even think about.

So another step is to control what IP addresses can connect to your network. And even if someone’s working from home you can simply type in “what is my IP” you can get their IP address and you can share that with your IT department. The IT department can then configure the firewall to only allow certain IPs to connect. The firewalls have a lot of advanced functionality and you could actually do additional things like only allowing connections during certain times of the day.

So we know that a lot of hacking takes place coming out of
Russia and China and their hours of operation are typically not going to be our normal business hours. By blocking you know network connectivity outside of working hours, you’re going to
remove a huge chunk of opportunity for people in these other countries to hack into your network. Hackers don’t want to go where it’s hard to do things, they want to go where it’s easy. They may probe a lot around different companies and networks looking for these little gaps and then when they
find then they exploit it. If they can’t even touch yours because you’re, you have IP restrictions either by individual IP and or IP and by day and time, then you’ve created a hard surface or a
hard security scenario that they aren’t going to want to waste
time trying to figure out. If they can’t hack it then they can just move on to your neighbor or your competitor who hasn’t
done anything, and they will easily be able to continue on with
hacking.

The next thing is the implementation of Intune. Intune is a Microsoft product and it allows you to protect your data
on mobile devices, laptops, even PCs, but you know a lot of people connect phones, and I do the same thing, I connect my mobile phone to my work. I connect up SharePoint, OneDrive, email, OneNote… All of those things are on my phone, and what happens if my phone gets stolen, right? I’ve now created a pipe from my phone straight into my business. And because authentication has already taken place, if somehow they can get into my phone then they’re going to have that direct
access well. With Intune, it’s an app that installs on these devices, and if you know the the phone gets stolen, or a laptop
gets stolen like we had. In our case we actually had an installer who had a laptop stolen out of the vehicle, and at that time we had remote monitoring software on the laptop and we
were actually able to log into the laptop and we could see the user was, you see their emails and we could see that they were in Africa, it was West Africa somewhere… in the, I think it’s called the Cape Horn area, and we could see what they
were actually typing and things like that, so we sent a little message and consequently we never heard from them
again after that. But Intune allows you to go in and
compartmentalize your company information and lock it down
and uh you know if something gets stolen you can reach out to that device and you can lock that information and delete it off of the device completely. And it’s only affecting business related information and there’s no spyware involved, so your employees don’t have to worry about that. But, you know if something happens you can grab that data and you can delete it off that device and know that your information is protected.

If you need assistance or are interested in Microsoft 365 or Intune, I would recommend checking out IGTech365.com, which we’ll post in the show notes. IGTech365 is an IT company. They handle our IT and they can handle your IT as well. Even if you have the Microsoft Office 365 package today or Business Suite today, they can become your partner of record and it doesn’t change your price or anything else. And once they become your partner of record, then they will actually also provide support that goes along with that. So if you have a question or a problem then you don’t have to call Microsoft. You call IGTech365. They’ll handle it and get on the phone with Microsoft or help you through that. It’s a full service it company, so you can check with them and see what other services they offer as well, from Microsoft Teams as a voice over IP system, which we also use internally – which is great, to the full office 365 Suite.

The next thing is to scan network connections for sensitive
information patterns such as credit cards and social security numbers. That’s a little bit more complicated and a little bit more advanced. Most small businesses aren’t going to do
that, especially if you don’t maintain that type of information, but there are programs that you can put on computers that will scan traffic in and out, and look for patterns of information i.e a social security card number or a credit card number. And when it recognizes that 16 digit number then it flags it and sends that information to Management, so they can look at it and make a determination as to whether or not that’s something that should or should not be happening.

Monitoring you know computer activity is another one. Whether you’re looking at detailed information or just looking at activity. If you see a computer as active during off hours, then maybe somebody is taking control of that computer when you know that employee is not going to be working. So if you saw activity at three o’clock in the morning, and you know it’s a it’s an administrative position that would never have a need to work at that time frame, then you can pick up on that and go in and take a look and see what’s going on.

Something as simple as locking your screen, and you may not know this but if you hold down the windows key and hit the L key at the same time, it’ll actually lock your computer, which is a very easy habit to get into when you’re walking away from your computer. Even in your house, you know you have people coming and going in your house, maybe a cleaning service something of that nature, and if you walk away from your computer and all of a sudden you know your computer is opened up and you leave the house to go walk the dog, there’s nothing preventing someone from getting on your computer, taking a picture of your computer, things of that nature. So getting in the habit of locking that screen and putting an auto lock on that screen after let’s say five, ten, thirty minutes of no activity is a great way to help lock down the computers and avoid you know that type of intrusion that you might not think happens, but it’s totally possible.

The next thing that we did is we updated our password policy. And changing your password every 30 days is just not practical. Everybody hates it it’s, that is a sacrifice that I don’t want to make, but what we can do is make the passwords more complex, and we can make them longer. We can require capitals and lowercase, and special characters and some number combinations, things of that nature that are going to make the odds of it getting hacked pretty, pretty low. And once you do that, then you know maybe change your password once a year type thing is what you want to do. IT people are going to have a different you know opinion on that, but if you do that in conjunction with two factor authentication, then you’re going to have a pretty secure login process.

And the last thing is taking advantage of the you know the employee background checks these days who is actually getting into your systems. Who are you hiring are they the right
people? So there’s a personal security protection that you need to be looking at. There are so many online services today that can run background checks for you to make sure that the people that you are, that you’re hiring are the right folks, and the people that you can trust to handle certain types of sensitive information. And what you don’t want to do is have information that walks out your organization. A platform like SharePoint, which is part of the Microsoft 365 platform, can also monitor for downloads of files you know large quantities, if files are being deleted it can monitor that. It does keep a recycle bin for you and a version history for you which is great, and again if you want some help with that and you want to learn more, IGTech365 is the company to call.

You know so there’s protections in all these different areas that you need to be looking at and they’re just so, so simple that there’s no reason why you shouldn’t go about making some of these changes. But these were just 10 things that I came up with as a small business that would make sense for your business whether you have two people, right? If it’s not family still you know some of this stuff you want to do regardless, even on your personal computer. But if you have two people and they’re not all family then that’s when you should start this practice. And if you have it implemented when you hire people then it’s much easier than to implement after you’ve got you know people that are that are hired and used to doing things the old way, right? Because change is always difficult.

So that’s what I have for you today. I hope you enjoyed, I hope you got some tips. If you enjoyed the content, hit the like and subscribe button down below, and we will see you on the next video. Good luck growing your business and stay profitable!

IT Security Top Ten List

  1. Implement 2-Factor Authentication.
  2. Only allow resource access to computers that are connected to your network.
  3. Control what IP addresses can connect to your network.
  4. Only allow connections during certain times of the day.
  5. Implement Microsoft Intune or a Mobile Device Management (MDM) service
  6. Scan network connections for sensitive information patterns.
  7. Monitor computer activity.
  8. Lock screens when not at your computers. (Windows + L key)
  9. Update your password policy to be 8+ characters, numbers and symbols.
  10. Require employee background checks.
Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing

Vehicle & Asset Telematics

Electronic Forms

Mobile Viewing

Routing