How Smart Factories Benefit From Digital Twins
· Connected Industry

How Smart Factories Benefit From Digital Twins

Today, the term Digital Twin is ubiquitous.Four years ago, I had my first personal contact with this concept. I attended the VDI conference “Big Data in Manufacturing”, where a General Electric’s (GE) manager presented the well-known example of the transformation of GE’s business model in the aircraft turbine market.GE equips its turbines with sensors and […]

Read more →
All Endpoints Are Not Created Equal, But They All Need Protection
· Cybersecurity

All Endpoints Are Not Created Equal, But They All Need Protection

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?” It’s a weighty question and a huge topic that probably does warrant an entire […]

Read more →
CEO Insights: Manufacturing is one of the most prevalent industries ripe for implementing IIoT solutions
· CEO Insights

CEO Insights: Manufacturing is one of the most prevalent industries ripe for implementing IIoT solutions

The manufacturing industry has a long history of automated machines and systems. IIoT is part of larger digital transformation efforts to help connect critical assets, extract data, and improve factory operations. IIoT still raises a lot of questions and here are a few that we asked the COO of Litmus Automation, John Younes. Carolina Rudinschi: […]

Read more →
Trustworthiness methods in Industrial System Design
· Connected Industry

Trustworthiness methods in Industrial System Design

Trustworthiness in the context of an industrial system is a relatively new term intended to provide a better understanding of the meaning of trust in such a system and how this trust can be approached by the operational user as well as the planner and designer of the system. In general, the definition of trustworthiness […]

Read more →
Released this week: Global ICS & IIoT Risk Report
· Cybersecurity

Released this week: Global ICS & IIoT Risk Report

Industrial and critical infrastructure organizations that rely on industrial control systems (ICS) to run their businesses — such as firms in energy and utilities, oil & gas, pharmaceutical and chemical production, food & beverage, and other manufacturing sectors — have known their valuable assets are susceptible to cyberattack since Stuxnet was discovered and publicized in […]

Read more →
24 interesting Startups focused on Industry 4.0 to watch out at the Web Summit
· Connected Industry

24 interesting Startups focused on Industry 4.0 to watch out at the Web Summit

ALPHA 2018 has sold out. ALPHA is a program run by Web Summit organizers and aims to spotlight the early stage startups engineering the future, connecting them to the world’s most influential companies at Web Summit. In this article, I’ve listed a few startups that caught my attention as they develop solutions in one of […]

Read more →
Critical Infrastructure and ICS Security Remain a Network Segmentation Problem
· Cybersecurity

Critical Infrastructure and ICS Security Remain a Network Segmentation Problem

Companies in every industry are developing and implementing connected industrial control applications as strategic digital business initiatives. However, the risks of security breaches and the subsequent impacts to consumer privacy and now personal safety are limiting the delivery of secure and resilient services, that are based on these connected applications.  Many company’s networks remain disconnected […]

Read more →
Combine Crosser Edge Streaming Analytics and Azure IoT Edge
· Connected Industry

Combine Crosser Edge Streaming Analytics and Azure IoT Edge

Based on customer requests we have implemented support for running Crosser Edge Streaming Analytics on Azure IoT Edge. Now you can innovate much faster and without the cost, risk and developer dependencies that come with writing code.Crosser Edge Streaming Analytics vs Azure IoT Edge solutionThe Crosser Edge Streaming Analytics solution allows non-software developers to implement […]

Read more →
Navigating the big pivot from IoT to AI-driven analytics
· Connected Industry

Navigating the big pivot from IoT to AI-driven analytics

If you’ve worked in industry for any length of time, you’ve experienced wave after wave of digital technologies washing over the plant floor, from robots to tablets. The next decade will see a new technological wave breaking over the landscape, as artificial intelligence expands from a narrow set of tasks to far more sophisticated applications […]

Read more →
Refinery of the Future type of projects: benefits and opportunities
· Connected Industry

Refinery of the Future type of projects: benefits and opportunities

This month two members of IIoT World have been invited by HPE to visit their IoT Innovation Lab in Houston and two separate sites where IIoT implementation is already a reality, leveraging the benefits of the intelligent edge. A couple of years ago, Texmark has undertaken a three-phase IIoT journey, combining HPE and Aruba solutions with […]

Read more →
IoT Gateway Software For Connecting Industrial Equipment
· Connected Industry

IoT Gateway Software For Connecting Industrial Equipment

IoT gateway software is the unsung hero of industrial IoT. Your IoT gateway bridges the worlds of OT and IT, where the physical becomes digital. Your industrial equipment speaks through varied industrial protocols, and your gateway software understands them all. First, it translates and cleans up incoming data, and adds critical context. Then it stores […]

Read more →
Benefits of the blockchain technology in manufacturing
· Connected Industry

Benefits of the blockchain technology in manufacturing

Blockchain technology attempts to address the problems described in the previous section through a common data architecture that allows non-trusting parties to share information in a more secure manner. Blockchains are designed to permanently record transactions, not only currency transactions but also data exchanges, in such a way that the record cannot be tampered with. […]

Read more →