Are You Underestimating the Cost of Manufacturing Downtime?
· Smart Manufacturing

Are You Underestimating the Cost of Manufacturing Downtime?

For most manufacturers, downtime is the single largest source of lost production time. Although some may acknowledge this, the cost and extent of manufacturing downtimes tend to be grossly underestimated. Determining the Real Cost of Manufacturing Downtime Most manufacturers are aware they are losing time and money because of downtime. However, many manufacturers can not accurately […]

Read more →
Who is Impacted by the Executive Order on Cybersecurity?
· ICS Security

Who is Impacted by the Executive Order on Cybersecurity?

On Wednesday, May 12, President Biden signed the Executive Order on Improving the Nation’s Cybersecurity. Who will be affected by EO #14028?Executive Orders can have the effect of law, ordering federal entities to take specific actions. They can also require certain terms to be included in federal contracts. And this is where the rubber hits the […]

Read more →
[Use case] Improved Robotic Welding Performance using moneo Real-Time Monitoring System
· Connected Industry

[Use case] Improved Robotic Welding Performance using moneo Real-Time Monitoring System

A large manufacturer produces hundreds of parts for an industrial distributor of multiple vehicle types. Throughout the plant, automated robotic welding systems are utilized. The motor supplying wire feed to the welding gun often wears. Irregular wire feeding causes the wire to buckle and jam. This means unplanned stoppages and downtime of the welding cell, […]

Read more →
What OEMs Can Learn From a Large Organization’s IoT Product Strategy
· Industrial IoT

What OEMs Can Learn From a Large Organization’s IoT Product Strategy

IoT Business Opportunities Verizon’s IoT initiatives highlight key applications of the technology as well as the business opportunity it presents OEMs. Customers were requesting Condition-based Maintenance (CBM) and Critical Asset Tracking (CAT) solutions. Verizon had similar business challenges that OEMs face with the desire to either save money or make money with IoT. David Vasquez […]

Read more →
Cybersecurity Risks for Open Source Code
· ICS Security

Cybersecurity Risks for Open Source Code

The adoption of open source code has increased exponentially over the past decade, with a large percentage of commercial software now containing it. Developers are constantly sharing common features and code functionality across the internet and globe. The speed and demand placed upon application teams is high – business used to run via application releases a handful […]

Read more →
Manufacturers’ use of technology pre-COVID & 5 key areas for investment in the post COVID-19 World
· Connected Industry

Manufacturers’ use of technology pre-COVID & 5 key areas for investment in the post COVID-19 World

The sudden global onset of COVID-19 has had disastrous consequences, both personal and economic. Much media attention has been focused on shortages of key products, as well as waste and surpluses, as manufacturers around the world struggled to respond quickly to sudden spikes and precipitous drops in demand. Manufacturing companies were also in the spotlight […]

Read more →
Deciphering Executive Order 14028: Improving the Nation’s Cybersecurity
· Cybersecurity

Deciphering Executive Order 14028: Improving the Nation’s Cybersecurity

An Executive Order (EO) issued by a U.S. President is usually a pretty straightforward document. Most are just two or three pages long with a handful of directives. This is definitely not the case with President Biden’s latest EO, Executive Order on Improving the Nation’s Cybersecurity. This is a massive policy document weighing in at […]

Read more →
[Use case] Improved machine performance using moneo Real-time Monitoring System
· Predictive Analytics

[Use case] Improved machine performance using moneo Real-time Monitoring System

A large manufacturer with assembly and sub-assemblies mass produces automotive parts and components. A plant of this magnitude requires equipment, such as motors, pumps, compressors, fans, vibratory feeders, and other machines. The manufacturer had incurred significant financial losses, experiencing bottlenecks that caused unplanned downtime and increased scrap rates. Predictive maintenance programs lacked process visibility and […]

Read more →
Building a Digital Business Case in the Energy Industry
· Energy

Building a Digital Business Case in the Energy Industry

Solutions like artificial intelligence (AI), machine learning (ML) and the Industrial Internet of Things (IIoT) are doing what engineers have always aimed for – delivering improved ways to do things cost-effectively. They are tools to help people work more efficiently and make quicker and better decisions. The key challenge facing many owners and operators is […]

Read more →
Cybersecurity Tips to Avoid Ransomware Attacks
· ICS Security

Cybersecurity Tips to Avoid Ransomware Attacks

This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious actors in your network. Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. The majority of […]

Read more →
Lean Manufacturing and Industry 4.0
· Smart Manufacturing

Lean Manufacturing and Industry 4.0

Industry 4.0 is unleashing a variety of technology (such as the Industrial Internet of Things, the cloud, edge computing, and digital twins) that is spurring a leaner manufacturing industry. Automation is the foundation of the Fourth Industrial Revolution (IR4). All of the systems that collect and communicate data are there to serve the purpose of […]

Read more →
Edge Architecture for IIoT
· Industrial IoT

Edge Architecture for IIoT

If you’re an industrial manufacturer or OEM wishing to adopt IIoT as part of your overall digital strategy, you’ll find that edge computing is often a required component. Even though edge computing is used pervasively throughout IIoT, its exact purpose and place in the technology stack is not always clear. Edge Computing & IIoT This lack of […]

Read more →