SlideShare a Scribd company logo
1 of 22
True IIoT Business Process Awareness
Translating
Technology Data
to Business
Meaning
BusinessIT
Outline
Phases of IIoT Unification
 Operational Technology (“OT”)
o Challenges: Fragmentation, Diversity & Security
 Alignment with IT Infrastructure & Applications
o Challenges: Redundant Tools lack Cross-Domain Correlation
 Business Services
o Challenges: Silos of Data & Poor Service-Level Awareness
IIoT Projects Challenges
Very Complex Systems at Deployment & Throughout Life-Cycle
• Multiple Communication Methods, Complicate Connectivity & Interoperability
• Diverse Data Models increase Management Complexity
• Service Use Case & Ecosystem Definitions Change
• Custom-made Sensors and Actuators are expensive
COTS (off-the-shelf) devices are affordable but not
tailored for Security, Service Model and
Communication Requirements
Centerity’s IIoT End-to-End Solution
device/sensor
connectivity
Agent
system
connectivity
Ecosystem MGMT
• Wide connectivity support for any communication
method, protocols and IT technologies
• Single abstract service model can translate data at
runtime into business & operational service views
• Dynamic ecosystem scalability and maintainability
• Adjusting COTS devices to the ecosystem’s security
and communication requirements with no
firmware changes
• Secure device intercommunication across the
entire ecosystem
Connected Device Abstraction
 Centerity overlays a single user-
defined abstract data model
across a service to manage
disparate connected devices via
the same model.
Distributed Connectivity
IIoT End-To-End Discovery, Data Collection & Translation
Thread
MQTT
WebSockets
AllJoyn
REST
HTTP
HTTPS
TCP
CoAP
BLE GATT
IoTivity
Thread
MQTT
WebSockets
AllJoyn
REST
HTTP
TCP
UDP
CoAP
BLE GATT
IoTivity
UDP
HTTPS
WiFi
Bluetooth
6LowPAN
Zigbee
Z-Wave
WiFi
Bluetooth
6LowPAN
Zigbee
Z-Wave
Translator
IT Infrastructure
Big Data & Advanced
Technologies
IIoT End-To-End Discovery, Data Collection & Translation
Thread
MQTT
WebSockets
AllJoyn
REST
HTTP
HTTPS
TCP
CoAP
BLE GATT
IoTivity
Thread
MQTT
WebSockets
AllJoyn
REST
HTTP
TCP
UDP
CoAP
BLE GATT
IoTivity
UDP
HTTPS
WiFi
Bluetooth
6LowPAN
Zigbee
Z-Wave
WiFi
Bluetooth
6LowPAN
Zigbee
Z-Wave
Translator
IT Infrastructure
Big Data & Advanced
Technologies
Complete Data Flow Visibility for IIoT
Enterprise-Class Distributed Architecture
Enterprise
Server
Management Distributed
Node
Distributed
Node
Distributed
Node
Distributed
Node
Distributed
Node
Multi-Tenant Environment Monitoring
Customer A Customer B Customer C Customer D
 View environments according
to customers, business
processes, and user
permissions, regardless of
deployment method
• IoT / IIoT Devices
• Big Data – Hadoop, SAP HANA etc.
• Converged / Hyperconverged infrastructure – Nutanix, Vblock, FlexPod etc.
• Cloud Technologies – Pivotal, Openstack, AWS etc.
• Others
 Containers (Docker etc.)
 Hypervisors (VMware, Citrix etc.)
 Applications – Event logs, Syslogs, Rest, etc.
 Connectivity / networking
 DB (Hana, NoSQL etc.)
 Storage
 And much more…
Advanced Technologies Out-of-the-Box
IIoT End-to-End Visibility & Management
BSMDiscoverSCAN1 2 Visualize3
Correlate
&
Monitor
4 Integrate5
……………….…….…
………………..…………
………………..……
………………..……
………………..……
Network
………………..…….…
………………..…………
Sensors Cloud End Points Edge
Single Version of the Truth
Business Service SLA
……………….…….…
………………..…………
………………..……
………………..……
………………..……
Business Service SLA
Network
………………..…….…
………………..…………
Sensors Cloud End Points Edge
Single Version of the Truth
IIoT Platform SLA
IIoT Business Process
IIoT Visual Layouts
Predix Use Case
 Real-Time Coverage & Monitoring of the Edge
 Integration with 3rd Party Products (VCE –Vision)
 Provides End-to-End In-Depth Visibility
 Allows Remote Monitoring w/ Managed Services Option
Centerity IIoT Added-value
Measuring SLAs for IoT/IIoT Platforms
• Business/Process Visibility across all Ecosystems
• Assuring High-Level Services
• Single-Pane-of-Glass Approach
Improving Business/Process Health with Minimal Unplanned Downtime
• Bridging Operational Technologies (OT) & Information Technologies (IT)
• Improve Troubleshooting Process / Automated Root Cause Analysis
• Introduce Proactive vs Reactive Management Approach
• Increasing Efficiency while Reducing Operational Complexity, MTTR & OPEX
Learn More
www.centerity.com
@centerity

More Related Content

What's hot

UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTMicro Focus
 
AccessIT in 5 easy steps
AccessIT in 5 easy stepsAccessIT in 5 easy steps
AccessIT in 5 easy stepssidramuoio
 
Internet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataInternet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataEurotech
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Internet of Things Reference Architectures
Internet of Things Reference ArchitecturesInternet of Things Reference Architectures
Internet of Things Reference ArchitecturesSofoklisEfremidisAIT
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Data center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesData center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesTibbo
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingVille Seppänen
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent MonitoringOnomi
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsEurotech
 
Internet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellInternet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellIntersog
 

What's hot (17)

UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
 
AccessIT in 5 easy steps
AccessIT in 5 easy stepsAccessIT in 5 easy steps
AccessIT in 5 easy steps
 
Internet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataInternet of Things, Cloud and Big Data
Internet of Things, Cloud and Big Data
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things Reference Architectures
Internet of Things Reference ArchitecturesInternet of Things Reference Architectures
Internet of Things Reference Architectures
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Act1000
Act1000Act1000
Act1000
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Data center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practicesData center and industrial IT infrastructure monitoring practices
Data center and industrial IT infrastructure monitoring practices
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Act500
Act500Act500
Act500
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computing
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent Monitoring
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M Solutions
 
Internet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellInternet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a Nutshell
 

Similar to Bridging the Industrial IoT Gap

Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureReal-Time Innovations (RTI)
 
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...mfrancis
 
OSGi and Java in Industrial IoT
OSGi and Java in Industrial IoTOSGi and Java in Industrial IoT
OSGi and Java in Industrial IoTEurotech
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT GapBridging the Industrial IoT Gap
Bridging the Industrial IoT GapJohn Speck
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architectureRoberto Siagri
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldDenodo
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueEurotech
 
Internet of Things IoT Guido Schmutz
Internet of Things IoT Guido SchmutzInternet of Things IoT Guido Schmutz
Internet of Things IoT Guido SchmutzDésirée Pfister
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Trivadis
 
Internet of Things - Are traditional architectures good enough?
Internet of Things - Are traditional architectures good enough?Internet of Things - Are traditional architectures good enough?
Internet of Things - Are traditional architectures good enough?Guido Schmutz
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewayEurotech
 
InduSoft IoTView
InduSoft IoTViewInduSoft IoTView
InduSoft IoTViewAVEVA
 

Similar to Bridging the Industrial IoT Gap (20)

Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The Architecture
 
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...
OSGi & Java in Industrial IoT - More than a Solid Trend - Essential to Scale ...
 
OSGi and Java in Industrial IoT
OSGi and Java in Industrial IoTOSGi and Java in Industrial IoT
OSGi and Java in Industrial IoT
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT GapBridging the Industrial IoT Gap
Bridging the Industrial IoT Gap
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud World
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
 
Internet of Things IoT Guido Schmutz
Internet of Things IoT Guido SchmutzInternet of Things IoT Guido Schmutz
Internet of Things IoT Guido Schmutz
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things - Are traditional architectures good enough?
Internet of Things - Are traditional architectures good enough?Internet of Things - Are traditional architectures good enough?
Internet of Things - Are traditional architectures good enough?
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent Gateway
 
InduSoft IoTView
InduSoft IoTViewInduSoft IoTView
InduSoft IoTView
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Bridging the Industrial IoT Gap

Editor's Notes

  1. This is the crucial starting point for maintaining performance in any complex technology environment and it guides the philosophy of Centerity, which is to translate technology data into business meaning. Because only by viewing an IoT business environment holistically can you recognize every potential point of failure and see the true impact of one component on the performance of another. Centerity makes the impact on your business service performance your starting point, whether it’s your wind farm, Oil Rig, or smart city street lighting, and from there you can dive into specific technologies and KPIs.
  2. So with that being said, I’ve outlined this discussion to focus on unifying Industrial IoT environments from a performance management perspective in three phases: 1.) The operational technology or connected devices and sensors 2.) The wider IT environment that supports those connected devices and networks 3.) The actual business processes in the service of which all the technologies operate I will then take a moment to put what you have learned in the context of GE Predix, before a brief recap and Q & A.
  3. IoT environments are necessarily complex and that complexity presents operational challenges not just in deployment, but throughout the system’s lifecycle. So what are some of these challenges in connected industrial environments? 1.) The variety of communication protocols and data models used by these devices and sensors complicate connectivity and interoperability and make managing the ecosystem difficult. 2.) Often you might want to switch out devices for a different brand or change protocol methods, so even if you can tune the ecosystem for deployment, an enterprise system is dynamic, so your service use case and ecosystem definitions will be in constant flux. 3.) Finally, depending on the environment, you may have a mix of custom and generic Commercial Off-the-Shelf (COTS) devices, which each bring unique challenges. Whereas custom devices are fine-tuned to the environment but expensive, COTS devices are comparatively cheap, but are not designed for the ecosystem’s security, service models, or communication requirements. So, let’s look point-by-point at how Centerity meets these challenges.
  4. First of all, Centerity is deployed as a software-only platform comprising a single console for management and monitoring with agents sitting on edge devices or any hardware on the network to pull data from connected sensors, manage the devices, and translate data into various protocols and data models at runtime for device interoperability. The platform supports nearly any device protocol, be it standard and low-level or non-standard and more complex. If there is ever a communication method that is not already supported in the system, our development team can build a plugin for integration in a matter of hours or days, at most. And as environments change, Centerity is able to scale dynamically, discovering and adding new devices extremely quickly. If COTS devices are added to the environment, you can use Centerity to quickly adjust those devices to the security requirements of the ecosystem without having to touch the firmware. Lets look deeper at this translation process.
  5. Centerity’s abstraction layer is able to overlay a single user-defined abstract data model across a service to manage disparate connected devices via the same model. Using the Centerity API translator, you can bind your desired common abstract language to the device’s specific language, essentially hiding the lower-level device protocol from the service or business logic manager, and allowing for communication with other devices.
  6. The distributed architecture of the system allows you to connect and make interoperable devices residing on different local networks in an event-driven fashion, as though they were sitting next to one another. Expanding this virtual network requires simply running the Centerity Agent on a machine in the newly added local network. This can be deployed to connect directly to the device, behind a hardware hub, or via a service cloud.
  7. As this diagram depicts, considering the solution end-to-end, Centerity allows you to automatically scan for discoverable devices on any network, translate their non-standard protocols into standard protocols like REST API, etc. to send data to the gateway and cloud, and apply a single abstract data model for a service across any devices in that service for interoperability and common management.
  8. Thus, with the OT layer standardized, all supporting technologies at the Edge, in the service cloud, and on-prem can be incorporated into the environment to measure overall service availability on a single pane of glass.
  9. Here you can see the environment end-to-end as a series of points of failure, all monitored through Centerity. As I’ve just shown, the Centerity platform is able to monitor the performance data from the connected devices themselves, the connectivity to the edge and the cloud (WiFi, BLE, Zigbee, etc.), and then any IT devices, applications, or databases comprising or connected to the cloud, and ultimately present all that performance data in logical groups according to the industry or business process.
  10. Enabling this functionality is the federated scalability and multi-tenancy of the architecture and the phenomenal extensibility of the platform’s collector engine and methodologies. The enterprise architecture allows all distributed collector nodes and associated agents to report back to an enterprise node that manages the system. Regardless of where or how the collector nodes are deployed, the user still sees a single pane of glass according to their individual permissions.
  11. The multi-tenancy allows for environments and services to be accessed and displayed according to user permissions, so users only see what is relevant to them.
  12. In addition to the extensive OT device connectivity, Centerity has out-of-the-box integrations in place with all of the cutting-edge IT technologies you see here and many more. And you never have to worry about a new technology coming along that can’t be covered, because our flexible plug-ins allow us to build integrations to any technology with connectivity in a matter of hours or days. Your business’s services are constantly changing and incorporating new innovative technologies, so the idea of Centerity is to be ready for those inevitable shifts to make sure you don’t ever have gaps in coverage.
  13. To recap, Centerity allows you to scan, discover, and add to the system any devices or applications on a network. You can then visualize that environment from end-to-end, correlate performance data from every technology layer, and integrate the platform with any associated service to feed data (e.g. service desk, CRM, etc.). And finally, you can organize the environment and analyze its performance according to the actual services your business provides to its customers.
  14. Because the Centerity platform can extend to every technology in the Industrial IoT stack,
  15. Now to put this in the context of Predix, you can see how every point in the framework is visible and unified as a business process within Centerity.