Will SCADA Experts Embrace the benefits of Industrial Internet of Things?
· Connected Industry

Will SCADA Experts Embrace the benefits of Industrial Internet of Things?

Many of the promised benefits of the Industrial Internet of Things (IIoT) did not capture the imagination of SCADA professionals a year or two ago. Why not? Because many of the IIoT capabilities lauded as “visionary” match what they have been accomplishing for decades.Over the years, many SCADA professionals discovered ways to bring remote data back to […]

Read more →
Onalytica’s Top IIoT Twitter influencers at Hannover Messe 2017 Show
· Connected Industry

Onalytica’s Top IIoT Twitter influencers at Hannover Messe 2017 Show

Making the benefits of digitalization tangible – that was the declared objective of HANNOVER MESSE 2017. After five action-packed days at the world’s leading trade fair for industrial technology, the organizers spoke of a thriving event.  As a co-founder of IIoT World (@IIoT_World), a portal focused 100% on Industrial IoT, I was interested to see […]

Read more →
MIT: The Seven System Principles You Need to Know Before Implementing IIoT
· Smart Manufacturing

MIT: The Seven System Principles You Need to Know Before Implementing IIoT

Are you ready for IIoT/Industry 4.0? Industry 4.0 promises to offer significant advantages to manufacturing and operations according to MIT experts. It also provides the opportunity to repeat the same systemic errors that plagued the previous three. In this video, MIT’s, Dr. John Carrier, discusses the seven most common systemic errors your company is likely to […]

Read more →
Chuck Brooks: The IIoT potential cyber threats consequences
· Cybersecurity

Chuck Brooks: The IIoT potential cyber threats consequences

Mr. Chuck Brooks – one of the world’s most known experts and the cybersecurity guru, shares his thoughts about Industry 4.0 and cyber threats in an interview with Ludmila Morozova-Buss. As the capabilities and connectivity of cyber devices have grown exponentially, so have the cyber intrusions and threats from malware and hackers requiring restructuring of […]

Read more →