The document discusses the role and mission of the OPC Foundation. It states that the Foundation is the world's leading community for interoperability solutions based on OPC specifications that deliver universal connectivity. The mission of the community is to advance the development, adoption and certification of OPC-based products through global collaborations. The Foundation is also the official source for the OPC Certification Program, which ensures that OPC products plug-and-play in real-world applications.
OPC is the world’s most popular standards-based data-connectivity method. It is used to answer one of the automation industry’s biggest challenges: how to communicate between devices, controllers, and/or applications without getting caught up in the usual custom driver-based connectivity problems.
SCCM Intune Windows 10 Co Management Architecture DecisionsAnoop Nair
SCCM Intune Windows 10 Co Management Architecture Decisions by Rajul and Anoop
https://www.anoopcnair.com/download-powerpoint-slides-bitpro-gab-2018-overview/
The Object Management Group (OMG) Data Distribution Service (DDS) and the OPC Foundation OLE for Process Control Unified Architecture (OPC-UA) are commonly considered as two of the most relevant technologies for data and information management in the Industrial Internet of Things. Although several articles and quotes on the two technologies have appeared on various medias in the past six months, there is still an incredible confusion on how the two technology compare and what’s their applicability.
This presentation, was motivated by the author's frustration with reading and hearing so many mis-conceptions as well as “apple-to-oranges” comparisons. Thus to contribute to clarity and help with positioning and applicability this webcast will (1) explain the key concepts behind DDS and OPC-UA and relate them with the reason why these technologies were created in the first place, (2) clarify the differences and applicability in IoT for DDS and OPC-UA, and (3) report on the ongoing standardisation activities that are looking at DDS/OPC-UA inter-working.
OPC is the world’s most popular standards-based data-connectivity method. It is used to answer one of the automation industry’s biggest challenges: how to communicate between devices, controllers, and/or applications without getting caught up in the usual custom driver-based connectivity problems.
SCCM Intune Windows 10 Co Management Architecture DecisionsAnoop Nair
SCCM Intune Windows 10 Co Management Architecture Decisions by Rajul and Anoop
https://www.anoopcnair.com/download-powerpoint-slides-bitpro-gab-2018-overview/
The Object Management Group (OMG) Data Distribution Service (DDS) and the OPC Foundation OLE for Process Control Unified Architecture (OPC-UA) are commonly considered as two of the most relevant technologies for data and information management in the Industrial Internet of Things. Although several articles and quotes on the two technologies have appeared on various medias in the past six months, there is still an incredible confusion on how the two technology compare and what’s their applicability.
This presentation, was motivated by the author's frustration with reading and hearing so many mis-conceptions as well as “apple-to-oranges” comparisons. Thus to contribute to clarity and help with positioning and applicability this webcast will (1) explain the key concepts behind DDS and OPC-UA and relate them with the reason why these technologies were created in the first place, (2) clarify the differences and applicability in IoT for DDS and OPC-UA, and (3) report on the ongoing standardisation activities that are looking at DDS/OPC-UA inter-working.
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
In our smartphone-dominated world, developers need to make HMI screens and applications that will look great on small, medium, and large devices. Are you familiar with the mobile-responsive layout strategies that make this possible?
Travis Cox from Inductive Automation, Arlen Nipper from Cirrus Link Solutions, and Tom Hechtman from Sepasoft present a variety of IIoT architectures utilizing the Ignition platform and the MQTT protocol that can supercharge your applications, get your enterprise more connected, and help you do more with your data.
Allenbradley Micro logix 1400 Plc Hardware information GuideDEEPAK GORAI
Allenbradley Micro logix 1400 Plc Hardware information Guide
PLC DETAIL,INPUT OUTPUT MODULE DETAIL,RTD CONNECTION DRAWING,ANALOG SIGNAL CONNECTION DRAWING AND SO ON
An introduction to IO-Link. Gives an overview of how to add IO-Link to existing & new automation systems. By Neil Farrow, P.E. This is based on a presentation to ISA (the International Society for Automation).
Cybersecurity is a moving target. The techniques and technologies of yesteryear won’t necessarily protect your system in this highly interconnected era of IIoT-enabled systems. As attacks on industrial control systems become increasingly commonplace, it’s more vital than ever to stay up to date on the latest in security best practices to mitigate risk and maintain peace of mind.
This webinar based on this presentation dives deep into the AWS IoT service that was announced at AWS re:Invent in October 2015. Will cover the components of the AWS IoT platform, demonstrate the AWS IoT Console and command line experience and outline the client-side SDKs that AWS provides to help developers build rich applications for their devices, whilst removing the heavy lifting associated with creating a scalable, secure and reliable set of cloud services to support these applications.
You can find a recording of this webinar on YouTube here: https://youtu.be/0X54z4fzN9g
Every day, the worlds of OT and IT continue to blend together and access to data becomes more vital. That’s why it’s more important than ever to embrace modern technology and security standards through collaboration with IT to provide more robust, efficient automation systems and minimize cybersecurity risks.
In this session Ronnie and Kevin will provide a brief history of authentication, discuss today’s authentication risks and
challenges then look at how modern multi-factor authentication services can help keep businesses and access to
their data secure and compliant. The talk covers cloud services, on premise servers, RADIUS and mobile devices. It
will also explores what’s next with Windows 10 Hello and Passport technologies before wrapping up with a Q&A.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
This is a brief introduction to Microsoft Azure cloud. I used these slides in an intro session for developers. I did few demos during the session that not included in the slide. Brand name and logos are properties of their respective owners.
Synchronizing data with ERP systems like SAP has historically been very difficult. Learn about real-world use cases for connecting Ignition to SAP and other ERP systems and show how the new Business Connector Suite from Sepasoft drastically lowers the barrier to entry.
Experts from Inductive Automation, Sepasoft, and 4IR Solutions cover how to optimize communications between SAP and the Ignition platform, the latter of which is used by thousands of companies worldwide for SCADA, HMI, MES, IIoT, and more.
Manufacturing IoT - OPC UA Information RevolutionBill Lydon
Internet of Things Manufacturing Business Value
Presentation by Bill Lydon, Chairman - PLCopen North America at the OPC Foundation Information Revolution 2014 Conference held at Microsoft's Redmond Campus. Bill Lydon is an experienced industrial, process control, and building automation professional with technology and business experience including product design, corporate experience, co-founder & president of a start-up company. Bill is an industry consultant, editor of Automation.com and editor International Society of Automation InTech magazine.
For more details contact Bill Lydon
bill@automationfocus.com
414-704-5004
* LinkedIn: www.linkedin.com/in/billlydon
* Twitter: https://twitter.com/wlydon
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
In our smartphone-dominated world, developers need to make HMI screens and applications that will look great on small, medium, and large devices. Are you familiar with the mobile-responsive layout strategies that make this possible?
Travis Cox from Inductive Automation, Arlen Nipper from Cirrus Link Solutions, and Tom Hechtman from Sepasoft present a variety of IIoT architectures utilizing the Ignition platform and the MQTT protocol that can supercharge your applications, get your enterprise more connected, and help you do more with your data.
Allenbradley Micro logix 1400 Plc Hardware information GuideDEEPAK GORAI
Allenbradley Micro logix 1400 Plc Hardware information Guide
PLC DETAIL,INPUT OUTPUT MODULE DETAIL,RTD CONNECTION DRAWING,ANALOG SIGNAL CONNECTION DRAWING AND SO ON
An introduction to IO-Link. Gives an overview of how to add IO-Link to existing & new automation systems. By Neil Farrow, P.E. This is based on a presentation to ISA (the International Society for Automation).
Cybersecurity is a moving target. The techniques and technologies of yesteryear won’t necessarily protect your system in this highly interconnected era of IIoT-enabled systems. As attacks on industrial control systems become increasingly commonplace, it’s more vital than ever to stay up to date on the latest in security best practices to mitigate risk and maintain peace of mind.
This webinar based on this presentation dives deep into the AWS IoT service that was announced at AWS re:Invent in October 2015. Will cover the components of the AWS IoT platform, demonstrate the AWS IoT Console and command line experience and outline the client-side SDKs that AWS provides to help developers build rich applications for their devices, whilst removing the heavy lifting associated with creating a scalable, secure and reliable set of cloud services to support these applications.
You can find a recording of this webinar on YouTube here: https://youtu.be/0X54z4fzN9g
Every day, the worlds of OT and IT continue to blend together and access to data becomes more vital. That’s why it’s more important than ever to embrace modern technology and security standards through collaboration with IT to provide more robust, efficient automation systems and minimize cybersecurity risks.
In this session Ronnie and Kevin will provide a brief history of authentication, discuss today’s authentication risks and
challenges then look at how modern multi-factor authentication services can help keep businesses and access to
their data secure and compliant. The talk covers cloud services, on premise servers, RADIUS and mobile devices. It
will also explores what’s next with Windows 10 Hello and Passport technologies before wrapping up with a Q&A.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
This is a brief introduction to Microsoft Azure cloud. I used these slides in an intro session for developers. I did few demos during the session that not included in the slide. Brand name and logos are properties of their respective owners.
Synchronizing data with ERP systems like SAP has historically been very difficult. Learn about real-world use cases for connecting Ignition to SAP and other ERP systems and show how the new Business Connector Suite from Sepasoft drastically lowers the barrier to entry.
Experts from Inductive Automation, Sepasoft, and 4IR Solutions cover how to optimize communications between SAP and the Ignition platform, the latter of which is used by thousands of companies worldwide for SCADA, HMI, MES, IIoT, and more.
Manufacturing IoT - OPC UA Information RevolutionBill Lydon
Internet of Things Manufacturing Business Value
Presentation by Bill Lydon, Chairman - PLCopen North America at the OPC Foundation Information Revolution 2014 Conference held at Microsoft's Redmond Campus. Bill Lydon is an experienced industrial, process control, and building automation professional with technology and business experience including product design, corporate experience, co-founder & president of a start-up company. Bill is an industry consultant, editor of Automation.com and editor International Society of Automation InTech magazine.
For more details contact Bill Lydon
bill@automationfocus.com
414-704-5004
* LinkedIn: www.linkedin.com/in/billlydon
* Twitter: https://twitter.com/wlydon
As manufacturing reaches the next stage of development, often referred to as Industry 4.0, a new wave of standards are adopted to enable communication along manufacturing lines. This is particularly prevalent in the packaging industry, which is often forced to be innovative and flexible to change with consumer trends and maximize efficiency.
To view On-Demand visit: http://ecast.opensystemsmedia.com/319
To learn more about RTI Connext visit:
http://www.rti.com/products/index.html
Extending OPC-UA through Architecture Flexibility, Performance, and Scalability
Builders of large-scale industrial automation systems must focus on several key system design requirements in order to implement robust distributed systems – Architecture, Interoperability, Scalability, and Performance. OPC-UA provides a solution for addressing Interoperability for heterogeneous distributed systems from the network edge to the business enterprise.
The standards-based RTI Connext product line extends the capabilities of OPC-UA, and other industrial automation standards, to address flexible system architectures and performance at scale. The RTI DataBus is a data super highway or data backbone for your distributed systems to provide architecture flexibility (publish/subscribe, client/server, request/reply patterns as well as flat, hierarchical, federated topologies) and performance at scale (microsecond latencies, millions of messages/sec with 10M+ individual data points).
Learn how to design and implement next-generation industrial automation systems with RTI.
Speaker: Dave Scheibenhoffer, Director of Market Development
Dave Scheibenhoffer is responsible for orchestrating advanced solutions to customer requirements and for identifying and addressing emerging trends in distributed systems within commercial market segments. Dave has over 25 years of engineering, business development, and sales experience in the data acquisition and embedded systems industries at industry leaders including National Instruments, Wind River, and Texas Instruments.
A reference architecture for the internet of thingsCharles Gibbons
A reference architecture for the internet of things: including Devices, Protocols, massively Distributed Service Layer, Business Support Systems, Channels, Device Management and Identity Management.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
InduSoft Web Studio recently added the capability to run the OPC UA client on Linux machines using the platform-agnostic IoTView. Join us for this month’s webinar featuring Thomas Burke, President of the OPC Foundation. He’ll discuss the benefits of an open communication standard like OPC UA and explain how using the OPC UA server on Linux machines can open up new possibilities for communication.
Internet of Everything is already happening, driven by the staggering growth of smart devices, systems and sensors. As hardware and software developers look to use connectivity to create IoE devices and apps, they encounter misconceptions about complexities and technology options available to them. This session provides insight into the latest connectivity options and tools to help you add connected interactivity to apps and everyday objects.
Watch this presentation on YouTube: https://www.youtube.com/watch?v=bL-Y1XR-KT0&list=PLxeazpXYyqtNm2EnCbfSzy7aKOkHjiaSi&index=12
The enterprise differentiator of mq on zosMatt Leming
IBM MQ is renowned for its enterprise qualities and this presentation will show you how this is taken to the next level
when running on IBM's enterprise platform, z/OS. Learn how its integration with the z/OS platform provides the perfect
solution for your enterprise needs, whether that's through its unique shared queue HA capability or its integration to
the latest z/OS security capabilities.
Connext is an I/O Server that can handle vast numbers of communication protocols to interconnect different levels of factory IT and OT using OPC UA technology. Connext is an OPC UA Server that supports a large amount of protocols, is of industrial type that for infrastructure and buildings. It supports advanced features such as Gateway, Historian / Data Loggers, redundancy, OPC UA server and client IIoT protocols and much more. And ‘the ideal solution for every need of connectivity, is that M2M between IT and OT factory levels.
Enabling the Deployment of Edge Services with the Open Network Edge Services ...Liz Warner
The Open Network Edge Services Toolkit (OpenNESS) is an open-source software toolkit for the enablement of orchestration and management of edge services on a diverse range of platforms. This talk will present the problem statement that OpenNESS aims to solve, the use-cases in which OpenNESS can be deployed, and a top-level description of its architecture.
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...AVEVA
InduSoft Web Studio recently added the capability to run the OPC UA client on Linux machines using the platform-agnostic IoTView. Join us for this month’s webinar featuring Thomas Burke, President of the OPC Foundation. He’ll discuss the benefits of an open communication standard like OPC UA and explain how using the OPC UA server on Linux machines can open up new possibilities for communication.
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaromfrancis
OSGi Community Event 2015
A new world of applications emerges in the home from the growing variety of things – devices, sensors, actuators – potentially available. Several application domains are considered, e.g., security, energy efficiency, comfort, ambient assisted living, multimedia communication. The Smart Home is slowly taking off.</p>
Several actors exploit a new technical and economic opportunity to catalyze this market. This opportunity is based on the re-use of the infrastructure that telecom operators have deployed for today classic Internet and TV services. It raises technical and business challenges: Telecom operators have to open their home infrastructure to third-party applications while guaranteeing application security and consistency to all home business actors using this infrastructure.
Telecom operators have to open APIs at least two levels of their architecture: APIs in the cloud and APIs on an embedded device environment. This end-to-end infrastructure between the home network and service platforms has also to provide security at several levels, especially a consistent access right management.
The presentation will provide a vision of an open end-to-end architecture providing APIs in the cloud and in a home box to host any application and connect to any device in the Home. Among the standard organizations and industrial alliances, oneM2M standard specifications are making a reference architecture emerge. The implementation of oneM2M standard features in OSGi technology will be detailed, especially the end-to-end access right management discriminating both applications and users when accessing devices.
This infrastructure is currently prototyped thanks to the integration of open source software bricks provided by <a>Open the Box</a>, <a>Eclipse SmartHome</a> and <a>Eclipse OM2M</a> open initiatives.
Presentation of the Canopy enhanced alliance, Canopy's Cloud Vision and an example service - Canopy Mobility - at the Viennese VMware Forum in May 2013
This is a 40 minutes about introduction to Integration & Microservices and how companies are using and built their APIs for products integration and why? We will learn about integration concepts and APIs types by examples and discuss list of market products and discuss data transformation.
Youtube Video by the end of presentation.
https://youtu.be/WRM7SyX9HO4
Link
https://wp.me/p8BMmp-mC
ACTAtek has its roots in ERP and technology solutions that address workforce management and security. Formed over ten years ago, ACTAtek now has operational offices in The USA (California), Canada (Vancouver), EMEA (UK), India (New Delhi), Thailand (Bangkok), Singapore, Hong Kong and Malaysia (KL).
With a focus on ID Management, ACTAtek has addressed the primary markets for SECURITY and WORKFORCE MANAGEMENT through a common biometric platform that provides a high quality, scalable, and networked series of fingerprint, RFID smartcard and video product solutions that easily interface to all software applications that address the vertical market segments of Security and Workforce Management. A critical element of the ACTAtek approach is to offer a true, enterprise-wide network platform (thousands of users in different global locations) that readily supports both security (access control , video surveillance, asset tracking) and workforce management (time & Attendance, labor cost management and payroll interface) application
RCA OCORA: Safe Computing Platform using open standardsAdaCore
The railway sector is facing a major transition as it moves towards more fully automated systems on both the train and infrastructure side. This in turn, requires the development of appropriate, future-proof connectivity and IT platforms.
The Reference Control Command and Signalling Architecture (RCA) and Open Control Command and Signalling Onboard Reference Architecture (OCORA) have developed a functional architecture for future trackside and onboard functions. The RCA OCORA open Control Command Signalling (CCS) on-board reference architecture introduces a standardized separation of safety-relevant and non-safety-relevant railway applications and the underlying IT platforms. This allows rail operators to decouple the very distinct life cycles of the domains and aggregate multiple railway applications on common IT platforms.
Based on a Safe Computing Platform (SCP), the architecture accommodates a Platform Independent Application Programming Interface (PI API) between safety-relevant railway applications and IT platforms. This approach supports the portability of railway applications among IT platform realisations from different vendors.
Two of its authors will discuss the RCA OCORA architecture with emphasis on its safe computing framework. The talk will review the required operating system standards and the discuss the newly-released DDS Reference Implementation for Safe Computing Platform Messaging. While designed for rail, this architecture will have elements of interest for other industries.
Similar to OPC UA Connectivity with InduSoft and the OPC Foundation (20)
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Introduction to InduSoft Web Studio 8.1 + Service Pack 1AVEVA
This month’s webinar will explore the new features of the first service pack for InduSoft Web Studio 8.1. SP1 includes new features and tools, and adds many internal enhancements to improve the performance of InduSoft Web Studio. In this webinar we’ll cover some of the enhancements and provide an overview of InduSoft Web Studio 8.1 + SP1.
Security and LDAP integration in InduSoft Web StudioAVEVA
With cybersecurity threat vectors increasing and attacks on industrial control systems on the rise, it’s more important than ever to take proper safety precautions when developing HMI or SCADA applications. In this webinar, we’ll go over how your application can be integrated with LDAP, and some best practices for developing more secure SCADA/HMI systems.
Graphical Interface Scaling in InduSoft Web StudioAVEVA
Graphical interface scaling or Screen Scaling in InduSoft Web Studio is a set of capabilities that allow you to alter the aspect ratio and size of your screens dynamically. In this webinar, we will discuss why it can sometimes be very important to scale your screen, go over aspect ratios, and discuss screen and project resolutions. Once we’ve covered the basics of screen scaling, we will go over various ways of implementing these capabilities in InduSoft Web Studio, and even how you can extend your application to multiple screens.
InduSoft Web Studio® is a powerful collection of automation tools that include all the building blocks needed to develop human machine interfaces (HMIs), SCADA systems, OEE/Dashboards, embedded applications, and IIoT solutions.
InduSoft Web Studio version 8.1 is coming in the first week of November. For this webinar, we’ll be exploring some of the exciting new additions to InduSoft Web Studio, as well as cover a few great features from recent updates you may have missed. Join us for a live demonstration of InduSoft Web Studio 8.1 and a look at some of the new tools and functionalities.
Tips and Tricks for InduSoft Web Studio-August 2017AVEVA
For this month’s webinar InduSoft would like to showcase some of the tips and tricks for using the software that you may not know, or might need a refresher on. This month we’ll be exploring things like adding images to linked symbols. Got requests for tips and tricks you’d like to see? Let us know in the registration survey, and we’ll try to include them if possible.
InduSoft Presentation: Advanced System Integration Techniques for InduSoft We...AVEVA
InduSoft Web Studio is a hardware agnostic SCADA/HMI software, making it ideal for machine builders and system integretors who work with a variety of platforms and industries. Join us for a webinar with CyberFusion Technologies, who used InduSoft Web Studio to develop complex applications for everything from Oil and Gas to Food and Beverage systems. We will also be joined by the President of Campo Sheet Metal Works, Inc., who designed the machines and aided in developing the applications.
CyberFusion Presentation: Advanced System Integration Techniques for InduSoft...AVEVA
InduSoft Web Studio is a hardware agnostic SCADA/HMI software, making it ideal for machine builders and system integretors who work with a variety of platforms and industries. Join us for a webinar with CyberFusion Technologies, who used InduSoft Web Studio to develop complex applications for everything from Oil and Gas to Food and Beverage systems. We will also be joined by the President of Campo Sheet Metal Works, Inc., who designed the machines and aided in developing the applications.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
4. Community:
• The OPC Foundation is the world’s leading
community for interoperability solutions based
on OPC specifications that deliver universal
connectivity.
Collaboration:
• The mission of this community is to advance the
development, adoption and certification of OPC
based products through global collaborations.
Compliance:
• The Foundation is the official source for the
OPC Certification Program, ensuring that OPC
products plug-and-play in real-world application.
5.
Community
◦ Commitment to open standards
Participation in working groups
Helping drive the technology
Interoperability workshops
OPC technology adoption and deployment
◦
◦
◦
◦
Multi-platform
Embedded
Security
Reliability
Collaboration
Certification
◦ Indusoft products span multiple industries
◦ OPC certification
Quality OPC products
Plug-and-play interoperability at its finest
5
8. Features
Discover OPC Servers on the network/PC
Benefits
Clients can be completely agnostic
to the underlying PLC, protocol, and
addressing scheme
View the tags available in the server
Tags could be grouped into a hierarchy
Easy configuration possible by
simply pointing + clicking
Read one or more tags
Write to one or more tags
Subscribe to tags and receive value-change
notifications
Easily identify good/bad data
Reading and writing to tags is much
easier than memorizing a PLC
address
Optimized traffic on the wire thanks
to a highly-efficient subscription
model.
• Adding more clients does not necessarily
add more overhead.
9. MES and/or HMI Application
(OPC Client)
HMI Application
(OPC Client)
Windows
PC
Internet
Firewalls
Embedded HMI
OPC Server
Windows
PC
DCOM
No Standard
PLC
?
Installation
Configuration
Consistence with PLC
Configuration
PLC
Proprietary Protocol
OPC Data Access
9
PLC
10. Vendors were no longer required to maintain extensive
device protocol libraries
High-quality and affordable device-drivers (Servers)
emerged
More specialized Clients emerged
Developer toolkits emerged for rapid development of
custom applications that could also integrate with the
OPC infrastructure
End-users could mix-and-match numerous vendor
products to achieve the best overall solution
11. Problem
Solution
How to let OPC solve more problems
“OPC” re-branded: Data Access
More capabilities needed in Data Access
OPC Data Access 1.0, 2.05a, 3.0
Need to store real-time values
OPC Historical Data Access
Need to standardize Alarm Notifications
OPC Alarms & Conditions
Need to standardize data acquisition via internet
OPC XML-DA
Need to allow PLC-to-PLC communications
OPC Data eXchange
Need to secure access to servers/tags
OPC Security
Need to standardize batch-process operations
OPC Batch
Need to standardize a simple PLC program
OPC Program
11
12. Wide
adoption of
OPC
Security
Access control
Internet
Firewalls
Performance
Communication
between distributed
systems
Redundancy
Robustness
Fault tolerant
Platform
independent
SCADA
Embedded
devices
MES
ERP
Scalability
OPC
used as common
system interface
Common
model for all
OPC data
Type system
Modeling
Data
Base for other
standard data
models
Complex
data
Method
calls
Meta information
14. Single Solution from
Embedded to Enterprise
Reliability by design
Builds on existing
investments in OPC COM
Flexible object-oriented
information model
16. Eliminate boundaries for single solution from Embedded to Enterprise
Data Size
Time Frame
OPC
Client
T
K Bytes
T
Hours
Internet
Office Network
OPC
Server
OPC
Client
OPC
Client
Plant Information Network
Classic
OPC
OPC
Server
OPC
Client
Control Network
Bytes
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Requirement Gap
S Security
D Data size
T Time frame
P Platform
OPC
Server
Let’s build a sustainable future together…
Milliseconds
17. Layered conceptual model
OPC UA Client
Application Layer
Software Authentication
User Authentication
User Authorization
Execute UA Functions
OPC UA Server
Application Layer
App Authentication
Encryption, Signing
Communication Layer
Make message secure
Communication Layer
UA TCP, HTTP, HTTPS
Binary, XML
Encoding/Decoding
Transport Layer
Transfer message
Transport Layer
Enable to choose appropriate abilities to meet various requirements
– Level 3 Apps : Internet accessibility and Security (e.g. HTTP & XML, E & S )
– Level 2 Apps : High speed and Security (e.g. UA TCP & BIN, S )
– Level 1 Apps : High speed and Small-footprint (e.g. UA TCP & BIN)
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Let’s build a sustainable future together…
18. Authentication and Authorization
Apps Authentication
Authenticate individual application
installation
- Application Instance Certificate
Software Authentication
User Authentication
Authenticate software
- Software Certificate
Authenticate User
- Username & Password
- WS-Security Token
- X.509 V3
Integrity and Confidentiality
Signing
Write: FIC001.SV=50.00
Write: FIC001.SV=50.00
Encryption
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Let’s build a sustainable future together…
User Authorization
Fine-grain information for
all items
- Access Level
- Write Mask
- Executable
19. Provide all abilities of a server through a set of services
Service Sets
Server
Discovery
Secure Channel
Session
Data
Sources
View
Attribute
Method
MonitoredItem
Subscription
NodeManagemen
t
Query
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Address Space
Apps
Process
Data
Alarms &
Events
Historical
Data
Let’s build a sustainable future together…
Copyright 2010. All Rights Reserved
.
20. Remote Offices
ERP
Systems
Managers
PC
MES
Systems
Home PC
OFFICE NETWORK - Ethernet
Firewall
VPN
Connection
Internet Connection
with Firewall
Other
Computing
Devices
Plant
Servers
PLANT INFORMATION NETWORK - Ethernet
Personal Computer
Network Manager
Plant
Network
Modules
Area Servers
Archive
Replay Module
Control Stations
Application
Module
History
Module
Fiber Optics
CONTROL NETWORK
Network
Gateway
Network
Gateway
Additional
CN Modules
Control Network
Extenders
Subnetwork
The factory floor is no longer an island
Subnetwork Gateway
Network
Interface
Module
Other Data
Hiway Boxes
Process
Manager
Multifunction
Controller
Extended
Controller
LocalProcessors
Logic Manager
Advanced
Process
Manager
Basic
Controller
PLC
Gateway
Advanced
Multifunction
Controller
Other
Subsystems
Transmitters
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Let’s build a sustainable future together…
PLC
21. Choosing The Appropriate Security
Appropriate security according requirements
◦ Between Level 3 and Level 2 Apps
•
•
•
•
•
Authentication of individual application installation
Authentication / Authorization of user (optional)
Encrypting of message
Signing of message
Firewall friendly
◦ Between Level 2 Apps
•
•
•
•
Authentication of individual application installation
Authentication / Authorization of user (optional)
Signing of messaage
Firewall friendly
Yokogawa Users Conference 2013
Asia Pacific . KLCC . Malaysia
Let’s build a sustainable future together…
25. OPC UA for Devices (DI)
ISA 95
Generic FDI Features
V 1.01 and IEC
FDT
OPC UA for IEC 61131-3 (PLCopen)
OPC UA for Analyzer Devices (ADI)
V2 Features
MES Connectivity
Field Device Integration (FDI)
26. MCS-DCS Interface Standardization ("MDIS")
All Major Oil companies (operators)
All major DCS Vendors (Yokogawa, ABB, Siemens,
Rockwell, Honeywell, GE…)
Sub Sea Vendors
27.
Standardize Communication Protocol
Standardize Information Model
Benefits
◦ Reduce costs
◦ Simplify engineering
Key OPC UA features:
◦
◦
◦
◦
◦
Subscription
Security
Robust Communication
Redundancy
Information modelling capabilities including Sub Types
27
29.
All Oil Companies agree to require MDIS Information
Model once completed in all bid requests.
30. OPC UA is selected
Information model definition underway
◦ General guidelines for models
◦ Object definition
Instrument, Valve, Choke valve
◦ Compliance
OPC Unified Architecture Companion Specification
Vendor Evangelism Required
31.
Supports all Resources Models
Includes OPC UA concepts of Subtypes
Includes DataTypes for better tracking
Modeling Target
Production Activity
Object Models
Capacity
Definition
Logical View of
Resources
Resources
Production
Definition
Production
Schedule
Production
Performance
Process Segment
Role Base
Equipment
Physical Asset
Common Object Model
Personnel
Material
32. OPC UA Standard Information &
Data Access Model
BaseObjectType
• Specification Complete
– TAC Voting Underway
ISA-95 Base Information Model
ISA95ClassProperty
Type
ISA95
Reference Types
Built-in DataTypes
ISA95Property
Type
CDT Compatible
DataTypes
ISA95TestResult
Type
Data Representation Model
• Initial Implementation
– Multiple vendors and
sample
BaseDataVariable
Type
Standard
Reference Types
ISA95Test
SpecificationType
ISA95Object
Type
ISA95Class
Type
ISA-95 Common Object Model
Personnel Information
QualificationTest
SpecificationType
Role based equipment information
EquipmentCapability
TestSpecificationType
PersonnelClass
Type
Person
Type
EquipmentClass
Type
Equipment
Type
Physical asset information
PhysicalAssetCapability
TestSpecificationType
Material Information
MaterialTest
SpecificationType
PhysicalAsset
ClassType
MaterialClass
Type
PhysicalAsset
Type
MaterialDefinition
Type
MaterialLot
Type
33. Benefits over B2MML
• High speed secure robust communication (realtime)
• Type System
• Integrated History
• Can easily port
B2MML models
Tank Class
Type
T
Available Classes for Manufacturers
and Models
Temperature Sensor
Class Type
Manufucturer
Model #
OPC
ISA_TS001
ISA
Pumps Class Type
OPC_TS380
ISA
T
ISA_TS002
Available Classes for Manufacturers
and Models
Manufucturer
Av
a
Level Sensor
Class
Type
Heater Class Type
Model #
OPC
ila
bl
ISA
e
In
s
ta
n
ce
OPC_P787
ISA_P003
s
OPC Centrifugal Pump
Model #: OPC_P787
Serial #: 90123
Location: Maintenance Storage
34. General
Standard hierarchy
Physical vs Logic equipment
Reactor
Capability
Test(s)
◦ Great for asset tracking
Material handling model
Heating
Reactor
Capability
Test(s)
Results
Mixing
Reactors
R101
HR101
HR102
Capacity
=300 Gal
Capacity
=300 Gal
Max
Temp
=320 F
Capacity
=300 Gal
Max
Temp
=320 F
HMR101
Capacity
=300 Gal
Max
Temp
=320 F
Mixing=
30 RPM
MR101
MR102
MR103
Capacity
=300 Gal
Mixing=
30 RPM
Capacity
=300 Gal
Mixing=
60 RPM
Capacity
=300 Gal
Mixing=
60 RPM
38.
Benefits
◦
◦
◦
◦
◦
◦
COTS available (Clients, Servers, SDKs)
Maintainability/Setup
Security model
Combination of classic OPC capabilities
Compatible with many SCADA systems
Information Model
Well Information Transfer Standard (WITSML)
10+ years old
Used throughout drilling industry
46.
Includes the following MTConnect items:
◦
◦
◦
◦
◦
◦
Device (√)
Component (Needs some minor work)
Sensors (need some work)
Conditions (√)
Events (√)
ConditionType
Assets (√)
MTDeviceType
Manufacturer
SerialNumber
SampleInterval
Availability
DataItems
EnableState
Components
MTConditionType
Conditions
HasTrueSubState
TwoStateVariableType:
ActiveState
MTCurrentState
LimitState
NativeCode
NativeSeverity
47. BACnet
working group
started on
October 01,
2012
Physical
Security
Systems
• Collaboration with BACnet Interest Group Europe
(BIG-EU)
• Integration of Industrial and Building Automation
• Mapping of BACnet and OPC Unified Architecture
• First mapping specification planned for July 2013
• Collaboration with ONFIV (Video) in discussion
• OPC is used but lack of standardization in this
area
48. BACnet is a global standard for communication in Building Automation
Systems
BACnet specifies the representation of field-level devices, automation
stations up to management systems.
The BACnet Interest Group Europe promotes BACnet in the European
markets.
BIG-EU approaches 100 members
49. In September 2012 the OPC Foundation and BACnet Interest Group
founded a new WG.
The main task is to create a mapping model for OPC UA and BACnet.
OPC UA model
BACnet
Objects
50. Data from Building Automation
Energy metering data, Energy analysis
Real-time information (weather, temperature)
Maintenance tickets (alarms)
Enterprise systems
Accounting, Billing
Operating surveillance
Energy Monitoring
51. Data from Automation systems
Production information
PLCs used in Building Automation
Energy Supply Systems
Building Management Systems
Facility monitoring
Alarm Management
Historical data storage
Scheduling
52. Incorporates ALL of the OPC Classic specifications into one cohesive
standard:
DA, HDA, A&E, DX, XMLDA, Batch, Security, Program etc.
Vendors that support one technology, e.g. DA, will be able to very quickly
and easily add others, e.g. A&E, HDA, Programs etc.
Provides backwards compatibility with OPC Classic via Proxy/Gateway
components.
Achieves other goals for security, platform-independence, performance,
and growth.
Vendor products can now quickly and easily be expanded over time to
incorporate newer features and capabilities at minimal cost.
Everything you know about OPC Classic is the same in UA!
53. PLC & DCS
IEC 61131-3 vendors
Embedded HMI
• PLC & DCS integrated OPC UA servers available
• Integration into runtime IEC 61131-3 runtime
systems
• Windows CE based HMI vendors implementing
OPC UA clients
OPC Unified
• Opportunities to expand into other domains, such as
Architecture on a chip ! security and building automation
Communication
Gateway
Building Automation
• Wireless sensor gateways with OPC UA server
• Field bus gateways with OPC UA server
• Partnership with BACnet to expose BACnet objects
(data and all the meta data !)
61
54. Device OPC Server
• Existing OPC Server migration to
OPC UA
• Many vendors, such as Kepware,
Matrikon and Siemens, provide UA
interfaces for their PC based OPC
device server suites
PC
SCADA / HMI
OPC UA Client
UA TCP
PC
LINUX / UNIX
SCADA
• LINUX and UNIX based
automation systems are integrating
OPC UA
• Replaces external OPC interfaces
on Windows based systems
OPC UA Server
• OPC UA server and client
• Numerous SCADA systems have
integrated UA
• JAVA based SCADA systems
adopt UA
62
55. PC
Enterprise
MES
Engineering
Engineering
OPC UA Client
SAP supports OPC UA
Many Historian Systems
support OPC UA
Ethernet
Industrial networks and
devices have OPC Unified
Architecture interface for
configuration, commissioning
and operation
UA TCP
SAP PCO (Plant
Connectivity) provides OPC
UA client interface
JAVA based MES systems
adopt UA
Ethernet
Device
Different SAP research
projects work on UA
OPC UA
Server
63
56.
Total Cost Of Ownership
Multiple Vendors
Multiple Products
Expectations Of Multivendor Interoperability
Information Integration
Plug-and-play Not Plug And Pray
Consumer-electronics Driving Expectations
Systems Thinking
64