The future of IT asset management is automation, there are many reasons you shall prepare for the automated future:
1. Inevitable human error;
2. Growing labor cost;
3. Harder to find responsible people to do tedious asset tracking job.
4. Hard to centralize the asset and rack space info from mutiple data centers in real-time.
Contact me for the best IT asset management solution, I will ensure your team's success in this complicated IT management age
Digitalor is a Chinese technology company founded in 1993 that focuses on data center operations, security, IoT products and solutions. Their patented MC-RFID technology allows for 100% accurate asset tracking at the individual rack unit (U-level) in data centers. Their U-level Asset IoT System provides automated and real-time asset management through RFID tags on all assets. Major customers of Digitalor include Alibaba, Tencent, Huawei, China Mobile, and stock exchanges.
Digitalor U-level data center asset IoT systemArron Zhao
Automated asset management & operation, can integrate with DCIM, DCSM, CMDB and CFD. This solution includes automated asset audit, real-time 100% accurate asset tracking, on-site operation indicator and etc.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
The document summarizes a presentation on control system security assessments given at the 2008 Automation Summit. The presentation discusses vulnerabilities and threats to control systems, findings from security assessments, and a review of the Control Systems Security Program. It is presented by Marty Edwards from the Idaho National Laboratory and Todd Stauffer from Siemens.
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
The document summarizes a presentation about security in lifecycle management and connected devices. It discusses two options for securing a streetlight IoT device: 1) Using a standard microcontroller with security features to protect keys and firmware, but this has threats across the supply chain and manufacturing. 2) Using an IoT platform fortified with an STSAFE secure element to initialize keys securely and protect them, managing threats better across the lifecycle. The presentation recommends working with security experts like ST to securely initialize keys during manufacturing for the highest level of protection.
Rotary RFID Parking Management Solution Controlled By MicrocontrollerIJSRD
This paper led emphasis over the automatic parking system. The reason behind this research work is to eradicate the traffic problem arise during the rush hours in day time. Implementation of intelligent parking also helpful in security purpose this research paper is based on RFID based technology along with IR communication. The main governing body is microcontroller. RFID means radio frequency identification, this technology has been used for since last two decades, reason behind this technology is quite straight as it is capable of providing new services and convenience in retail environment. This technology is very reliable as well as very user friendly. This also ease the security purpose, this also reduced time consumption of user. This research involved following components (a) IR based communication, (b) RFID Module, (c) Microcontroller ATmega328.
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET Journal
This document proposes a smart monitoring system for industrial automation using IoT. The system allows users to efficiently control industrial machines and appliances over the internet. It uses a microcontroller, WiFi module, relays, LCD display, RFID reader and tags, and IR sensors. The microcontroller processes user commands received over WiFi. RFID tags are used to identify technicians and control machines. IR sensors count products manufactured. The system uploads production data to a web server via WiFi to allow remote monitoring of industrial processes and employee productivity.
The future of IT asset management is automation, there are many reasons you shall prepare for the automated future:
1. Inevitable human error;
2. Growing labor cost;
3. Harder to find responsible people to do tedious asset tracking job.
4. Hard to centralize the asset and rack space info from mutiple data centers in real-time.
Contact me for the best IT asset management solution, I will ensure your team's success in this complicated IT management age
Digitalor is a Chinese technology company founded in 1993 that focuses on data center operations, security, IoT products and solutions. Their patented MC-RFID technology allows for 100% accurate asset tracking at the individual rack unit (U-level) in data centers. Their U-level Asset IoT System provides automated and real-time asset management through RFID tags on all assets. Major customers of Digitalor include Alibaba, Tencent, Huawei, China Mobile, and stock exchanges.
Digitalor U-level data center asset IoT systemArron Zhao
Automated asset management & operation, can integrate with DCIM, DCSM, CMDB and CFD. This solution includes automated asset audit, real-time 100% accurate asset tracking, on-site operation indicator and etc.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
The document summarizes a presentation on control system security assessments given at the 2008 Automation Summit. The presentation discusses vulnerabilities and threats to control systems, findings from security assessments, and a review of the Control Systems Security Program. It is presented by Marty Edwards from the Idaho National Laboratory and Todd Stauffer from Siemens.
Track 5 session 4 - st dev con 2016 - life cycle management for webST_World
The document summarizes a presentation about security in lifecycle management and connected devices. It discusses two options for securing a streetlight IoT device: 1) Using a standard microcontroller with security features to protect keys and firmware, but this has threats across the supply chain and manufacturing. 2) Using an IoT platform fortified with an STSAFE secure element to initialize keys securely and protect them, managing threats better across the lifecycle. The presentation recommends working with security experts like ST to securely initialize keys during manufacturing for the highest level of protection.
Rotary RFID Parking Management Solution Controlled By MicrocontrollerIJSRD
This paper led emphasis over the automatic parking system. The reason behind this research work is to eradicate the traffic problem arise during the rush hours in day time. Implementation of intelligent parking also helpful in security purpose this research paper is based on RFID based technology along with IR communication. The main governing body is microcontroller. RFID means radio frequency identification, this technology has been used for since last two decades, reason behind this technology is quite straight as it is capable of providing new services and convenience in retail environment. This technology is very reliable as well as very user friendly. This also ease the security purpose, this also reduced time consumption of user. This research involved following components (a) IR based communication, (b) RFID Module, (c) Microcontroller ATmega328.
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET Journal
This document proposes a smart monitoring system for industrial automation using IoT. The system allows users to efficiently control industrial machines and appliances over the internet. It uses a microcontroller, WiFi module, relays, LCD display, RFID reader and tags, and IR sensors. The microcontroller processes user commands received over WiFi. RFID tags are used to identify technicians and control machines. IR sensors count products manufactured. The system uploads production data to a web server via WiFi to allow remote monitoring of industrial processes and employee productivity.
This document provides an overview of an RFID and GSM based security system project. The system uses an RFID card to identify authorized users and allow entry if their card ID matches the stored information. If an unauthorized card is used, a buzzer sounds and an SMS is sent. The document describes the system components including the microcontroller, RFID tags and readers, GSM module. It provides block and circuit diagrams of the system and discusses how RFID and microcontrollers work. The objectives are to control access and notify authorities by SMS of unauthorized access attempts.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Industrial control systems (ICS) are used to control industrial processes and manufacturing equipment. They face unique security challenges compared to traditional IT systems due to their real-time operation and custom hardware and software. This document discusses several past ICS cyber attacks and identifies vulnerabilities in ICS security architecture, configuration management, patch management, and change testing. Proper ICS security requires a cross-functional team approach and careful management of the specialized ICS environment.
This document discusses a security system project that uses fingerprint and keypad authentication to allow authorized individuals access. The system is programmed using an embedded microcontroller and C language. When a person places their finger on the reader, the system will check if they are authorized and prompt for a pin entry via keypad or mobile. If authorized, a message is sent to their mobile via GSM technology. The system aims to provide low-cost, automated security access for applications like ATMs.
The document discusses how systems thinking and a systems approach can help cities grow sustainably by addressing priorities through technology. It provides examples of how an Internet of Things infrastructure with sensors, gateways and edge devices can help cities turn data into insights to predict problems and coordinate resources effectively. This infrastructure provides opportunities for applications in areas like transportation, healthcare, utilities and more to help cities increase prosperity.
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
Scada Industrial Control Systems Penetration Testing
Start from Types of Scada Networks, then Penetration testing, finally what Security should be follow
This document provides an overview of NFC technology use cases, products, and technical essentials. The main sections are:
- Use Cases: Access control, pairing/commissioning, authentication/identification, extended user interface, device communication, and payment applications of NFC.
- Products: Introducing NXP's NFC portfolio including tags, frontends, and controllers with customizable or integrated firmware.
- Tech Essentials: Details on NFC communication modes, passive vs active communication, and other technical aspects.
Rfid based access control system using microcontrollerrajkanakaraj007
RFID Security Access Control System using 8051 Microcontroller is an RFID Technology based security system.
Using this system, authorization of personnel is carried out with an RFID card and only those with access can enter a secured area.
The security of any organisation is a priority for the authorities. The security concern is for the physical property and also for the intellectual property.
For this reason automatic identification and access control system has become necessary to overcome the security threats faced by many organisations.
This project deals with an interesting manner of security access control with the help of RFID Technology, where only people with valid cards are allowed to access the door or any secure area.
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
This document describes the design and development of a Modish Smart Key Box (MSKB) using RFID and an Arduino WEMOS Mega microcontroller. The MSKB was created to securely store keys for workshops, labs and classes at a technical college while also allowing key usage to be monitored and tracked in real-time. The MSKB design incorporates an RFID reader to authenticate users, an LCD display to show key information, and an Arduino microcontroller to send key data to staff phones via an app. The MSKB aims to address issues with conventional key boxes like security vulnerabilities, inability to identify key users or track key retrieval and return times.
This document discusses securing ICS/SCADA systems. It provides an overview of Positive Technologies, a security company focusing on vulnerability management, penetration testing, and research. The document discusses common myths about SCADA security and research finding vulnerabilities across many systems. Positive Technologies' MaxPatrol product is presented for vulnerability and compliance management. Services include auditing ICS infrastructure and SCADA applications to identify risks.
Fingerprint Attendance System - the hand-held device for classroom attendancemohamedbasheerkp
Fingerprint attendance system is a hand-held device which aims to automate entire attendance procedure of classroom using biometric technology. The device can be carried to the classroom and can be passed to the students. The hand-held device can take attendance without the intervention of teacher. This device would operate from a rechargeable Li-ion battery. The GUI application would help the teacher to manage the device through a host PC.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
Banking is one of the sectors where technology and advancements in technologies have not been utilized to the fullest potential. In the security systems even today very old practices are followed that can be made lot better using technologies like GSM which is easily usable and also easy to implement at a consumer level. In this project we propose a GSM based secure access which can provide a sophisticated theft alert system for bank locker system. This system contains microcontroller, keypad, GSM module and LCD display. By using keypad we need to enter the password that is provided to the authenticated persons. If the password entered is wrong then the GSM network converts the digital information into airborne signals and SMS is transferred to the registered mobile number. This system offers better solution for the bank security system and it will also help us to track the person who tried to open the locker without the permission and proper authentication.
Wireless e-passport using smart card technologyIRJET Journal
This document describes a proposed wireless e-passport system that uses smart card technology. A smart card containing personal details like name, date of birth, nationality, and UID number is given to the passport holder. When the card is placed near an RFID reader, the details are wirelessly transmitted to a computer system. The system aims to simplify verification and increase security by reducing documentation and preventing forgery. It contains components like a microcontroller, LCD display, GSM module, RFID reader and tag. The smart card technology allows for centralized storage of passport information, faster verification times, and increased security over traditional passports.
This document describes an RFID and GSM based attendance system. The system uses RFID tags and a reader to track when students arrive and leave school/college and sends SMS alerts to parents. It consists of hardware components like a microcontroller, RFID reader, GSM modem and software like Keil Compiler. When a student's RFID tag is scanned, the time is logged to an EEPROM and an SMS is sent to notify parents. The system aims to save time and keep parents informed of their child's daily attendance through SMS messages in real-time.
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
This document describes the design of a security alarm system using various sensors and an 8051 microcontroller. The alarm can monitor temperature, unauthorized access, and infrared detection. It has inputs to arm and disarm the alarm and outputs to control a siren and auto-dialing system. The microcontroller filters sensor signals and only passes new signals that remain for 30ms to processing. Up to 5 sensors can be connected and must be normally closed. The system can dial programmed phone numbers to alert users even if they are away. It uses regulated 5V power supply from a step-down transformer, rectifier, and voltage regulators.
The document discusses using IoT for industrial automation by developing a system that can automatically monitor and control industrial processes without human intervention. It describes how technologies like RFID and wireless sensor networks can be used to identify, track, and monitor objects and sensors. The proposed system uses an Arduino Uno, ESP8266 WiFi module, resistors, LEDs, motor, and software to allow remote monitoring and control of industrial applications over the internet in order to optimize processes and reduce costs.
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
SCADA at the core of power systems monitoring and control
Power systems monitoring requires increasing amounts of information coming from multiples sources, manually or automatically, and at different
points in time, each with their own resolution and quality.
SCADA collects all this information in real time to:
• Process in terms of validity, usability, and accuracy and store them for future analysis.
• Combine into a flexible, simple or complex calculation.
• Provide operators and other control systems with flags and alarms, which are valuable for action and control.
• Feed advanced applications such as network security and generation dispatch.
This document provides an overview of an RFID and GSM based security system project. The system uses an RFID card to identify authorized users and allow entry if their card ID matches the stored information. If an unauthorized card is used, a buzzer sounds and an SMS is sent. The document describes the system components including the microcontroller, RFID tags and readers, GSM module. It provides block and circuit diagrams of the system and discusses how RFID and microcontrollers work. The objectives are to control access and notify authorities by SMS of unauthorized access attempts.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Industrial control systems (ICS) are used to control industrial processes and manufacturing equipment. They face unique security challenges compared to traditional IT systems due to their real-time operation and custom hardware and software. This document discusses several past ICS cyber attacks and identifies vulnerabilities in ICS security architecture, configuration management, patch management, and change testing. Proper ICS security requires a cross-functional team approach and careful management of the specialized ICS environment.
This document discusses a security system project that uses fingerprint and keypad authentication to allow authorized individuals access. The system is programmed using an embedded microcontroller and C language. When a person places their finger on the reader, the system will check if they are authorized and prompt for a pin entry via keypad or mobile. If authorized, a message is sent to their mobile via GSM technology. The system aims to provide low-cost, automated security access for applications like ATMs.
The document discusses how systems thinking and a systems approach can help cities grow sustainably by addressing priorities through technology. It provides examples of how an Internet of Things infrastructure with sensors, gateways and edge devices can help cities turn data into insights to predict problems and coordinate resources effectively. This infrastructure provides opportunities for applications in areas like transportation, healthcare, utilities and more to help cities increase prosperity.
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
Scada Industrial Control Systems Penetration Testing
Start from Types of Scada Networks, then Penetration testing, finally what Security should be follow
This document provides an overview of NFC technology use cases, products, and technical essentials. The main sections are:
- Use Cases: Access control, pairing/commissioning, authentication/identification, extended user interface, device communication, and payment applications of NFC.
- Products: Introducing NXP's NFC portfolio including tags, frontends, and controllers with customizable or integrated firmware.
- Tech Essentials: Details on NFC communication modes, passive vs active communication, and other technical aspects.
Rfid based access control system using microcontrollerrajkanakaraj007
RFID Security Access Control System using 8051 Microcontroller is an RFID Technology based security system.
Using this system, authorization of personnel is carried out with an RFID card and only those with access can enter a secured area.
The security of any organisation is a priority for the authorities. The security concern is for the physical property and also for the intellectual property.
For this reason automatic identification and access control system has become necessary to overcome the security threats faced by many organisations.
This project deals with an interesting manner of security access control with the help of RFID Technology, where only people with valid cards are allowed to access the door or any secure area.
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
This document describes the design and development of a Modish Smart Key Box (MSKB) using RFID and an Arduino WEMOS Mega microcontroller. The MSKB was created to securely store keys for workshops, labs and classes at a technical college while also allowing key usage to be monitored and tracked in real-time. The MSKB design incorporates an RFID reader to authenticate users, an LCD display to show key information, and an Arduino microcontroller to send key data to staff phones via an app. The MSKB aims to address issues with conventional key boxes like security vulnerabilities, inability to identify key users or track key retrieval and return times.
This document discusses securing ICS/SCADA systems. It provides an overview of Positive Technologies, a security company focusing on vulnerability management, penetration testing, and research. The document discusses common myths about SCADA security and research finding vulnerabilities across many systems. Positive Technologies' MaxPatrol product is presented for vulnerability and compliance management. Services include auditing ICS infrastructure and SCADA applications to identify risks.
Fingerprint Attendance System - the hand-held device for classroom attendancemohamedbasheerkp
Fingerprint attendance system is a hand-held device which aims to automate entire attendance procedure of classroom using biometric technology. The device can be carried to the classroom and can be passed to the students. The hand-held device can take attendance without the intervention of teacher. This device would operate from a rechargeable Li-ion battery. The GUI application would help the teacher to manage the device through a host PC.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
Banking is one of the sectors where technology and advancements in technologies have not been utilized to the fullest potential. In the security systems even today very old practices are followed that can be made lot better using technologies like GSM which is easily usable and also easy to implement at a consumer level. In this project we propose a GSM based secure access which can provide a sophisticated theft alert system for bank locker system. This system contains microcontroller, keypad, GSM module and LCD display. By using keypad we need to enter the password that is provided to the authenticated persons. If the password entered is wrong then the GSM network converts the digital information into airborne signals and SMS is transferred to the registered mobile number. This system offers better solution for the bank security system and it will also help us to track the person who tried to open the locker without the permission and proper authentication.
Wireless e-passport using smart card technologyIRJET Journal
This document describes a proposed wireless e-passport system that uses smart card technology. A smart card containing personal details like name, date of birth, nationality, and UID number is given to the passport holder. When the card is placed near an RFID reader, the details are wirelessly transmitted to a computer system. The system aims to simplify verification and increase security by reducing documentation and preventing forgery. It contains components like a microcontroller, LCD display, GSM module, RFID reader and tag. The smart card technology allows for centralized storage of passport information, faster verification times, and increased security over traditional passports.
This document describes an RFID and GSM based attendance system. The system uses RFID tags and a reader to track when students arrive and leave school/college and sends SMS alerts to parents. It consists of hardware components like a microcontroller, RFID reader, GSM modem and software like Keil Compiler. When a student's RFID tag is scanned, the time is logged to an EEPROM and an SMS is sent to notify parents. The system aims to save time and keep parents informed of their child's daily attendance through SMS messages in real-time.
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
This document describes the design of a security alarm system using various sensors and an 8051 microcontroller. The alarm can monitor temperature, unauthorized access, and infrared detection. It has inputs to arm and disarm the alarm and outputs to control a siren and auto-dialing system. The microcontroller filters sensor signals and only passes new signals that remain for 30ms to processing. Up to 5 sensors can be connected and must be normally closed. The system can dial programmed phone numbers to alert users even if they are away. It uses regulated 5V power supply from a step-down transformer, rectifier, and voltage regulators.
The document discusses using IoT for industrial automation by developing a system that can automatically monitor and control industrial processes without human intervention. It describes how technologies like RFID and wireless sensor networks can be used to identify, track, and monitor objects and sensors. The proposed system uses an Arduino Uno, ESP8266 WiFi module, resistors, LEDs, motor, and software to allow remote monitoring and control of industrial applications over the internet in order to optimize processes and reduce costs.
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
SCADA at the core of power systems monitoring and control
Power systems monitoring requires increasing amounts of information coming from multiples sources, manually or automatically, and at different
points in time, each with their own resolution and quality.
SCADA collects all this information in real time to:
• Process in terms of validity, usability, and accuracy and store them for future analysis.
• Combine into a flexible, simple or complex calculation.
• Provide operators and other control systems with flags and alarms, which are valuable for action and control.
• Feed advanced applications such as network security and generation dispatch.
SCADA at the core of power systems monitoring and control
Power systems monitoring requires increasing amounts of information coming from multiples sources, manually or automatically, and at different
points in time, each with their own resolution and quality.
SCADA collects all this information in real time to:
• Process in terms of validity, usability, and accuracy and store them for future analysis.
• Combine into a flexible, simple or complex calculation.
• Provide operators and other control systems with flags and alarms, which are valuable for action and control.
• Feed advanced applications such as network security and generation dispatch.
Within data parameters, phasor measurement units generate a huge flow of points due to high scanning resolution (1ms). SCADA can now
integrate phasor data.
SCADA: the critical block for EMS
SCADA is the core of any monitoring and control system.
This is where all information captured from the
field via manual reading, automated control systems
in substations and power plants, and from other control
centers is processed in real time before being
made available for further analysis and action by operators.
Without SCADA running, EMS and operators
have reduced network vision and cannot operate at
full capacity. SCADA reliability is built-in by design
with one or multiple redundancy levels to ensure
100% availability.
Incorporating WAMS technology for
increased awareness and network
flexibility
Traditionally, SCADA receives data points scanned at
1s or higher resolution depending on communication
bandwidth and local scanning capabilities such as RTU,
a substation automation system, or a power plant
control system. The latest WAMS technology, under
deployment for the last 10 years, has reached a level
of reliability and performance enabling it to manage a
large number of phasor measurement units (PMUs) data
scanned at 1ms from thousands of PMUs implemented
across the network. Phasor Data Concentrator (PDC)
and PhasorProcessor are also now part of the SCADA
solutions GE offers to its customers.
Coupling existing EMS applications with a Phasor
application inside an Advanced Energy Management
System (AEMS) unlocks additional network flexibility
in terms of blackout prevention and network power
capacity required as intermittent renewable generation
grows.
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Solar Powered Smart Helmet with MultifeaturesIRJET Journal
This document describes the design of a smart helmet with multiple safety features. The helmet uses sensors to detect alcohol levels, speed, and accidents. It contains a microcontroller, GPS module, GSM modem, and RF transmitter and receiver to communicate with a bike. If an accident is detected, the helmet sends an alert message with the location to emergency contacts. It also checks for helmet wearing and prevents bike ignition if alcohol is detected, aiming to reduce accidents caused by no helmet or drinking. The system provides safety and real-time monitoring for bikers.
The iSpectrum functions as multiple virtual spectrum analyzers installed on site, providing 24/7 remote monitoring capabilities. It continuously records spectrum data, enables real-time spectrum viewing, and sends automatic SNMP alarms. This improves maintenance and troubleshooting by allowing post-event analysis without on-site support. Revenue opportunities exist in selling monitoring access and professional services using iSpectrum's tools and alarm notifications.
Italteleco develops RFID-based plant data collection and management systems. They created applications for blinding management, scaffolding management, and accessing SmartPlant P&ID information on mobile devices. The applications use RFID tags and palm-sized PCs to identify items in the field and synchronize data with backend databases. This provides benefits like improved process monitoring, easy problem identification, and faster data collection and updates.
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
This document describes a smart machine system that uses face recognition and voice control to assist visually impaired people. The system uses a Raspberry Pi microprocessor connected to sensors, a camera, microphone and other hardware. It authenticates users by comparing captured faces to stored images using LBP and HAAR cascade algorithms. If an unauthorized person is detected, their photo is emailed to a guardian. Authorized users can control home appliances and lock/unlock doors with voice commands. Sensors monitor temperature and pressure, and an alert sounds if abnormalities are detected. The system aims to help visually impaired people with daily tasks and improve home security.
IRJET- Women Security System using GSM and GPSIRJET Journal
This document presents a women's security system that uses GPS and GSM technologies. The system includes an Arduino microcontroller connected to a GPS module, GSM modem, push button, and LCD display. When the button is pressed, the GPS module sends location data to the Arduino. The Arduino then sends an SMS alert with the latitude and longitude coordinates to predefined phone numbers using the GSM modem. The purpose is to allow women to quickly alert authorities and contacts when feeling unsafe by simply pressing a button. The system is intended to make women feel more secure when traveling alone or working night shifts.
As the complexity of network infrastructure grows, the challenges that already weigh on infrastructure management threaten to become unsustainable unless there is a way to significantly reduce O&M costs. Smart Operations harnesses the power of new technologies to transform labor-intensive O&M activities and so achieve a step-change reduction in costs.
Design and Implementation of Secured Wireless Communication Using Raspberry PiIRJET Journal
This document describes the design and implementation of a secured wireless communication system using a Raspberry Pi. The system uses a master-slave architecture with wireless communication between sensor nodes and a master controller. Various sensors measure parameters like temperature, light intensity, voltage and current. The sensor data is sent wirelessly to the master controller and then to a Raspberry Pi, which acts as a wireless web server. The Raspberry Pi allows remote monitoring of the sensor data through a smart phone using GPRS technology. The system aims to provide a low-cost and portable solution for industrial wireless monitoring applications.
This document describes a smart bank security system using a programmable logic controller (PLC). The system uses various sensors like laser, IR, smoke, and PIR to detect intruders and trigger an alarm. The PLC controls the overall system and automatically activates it after banking hours. If the laser or IR sensors detect someone crossing the perimeter or entering the bank after hours, the sub-doors will close, an electric fence will activate, and an alarm will sound to alert authorities. The system aims to prevent bank robberies and theft by automating security and making it difficult for intruders to enter or escape from the bank premises.
E-License System With RTO Controle Room Management SystemIRJET Journal
This document describes a proposed e-license system with real-time tracking (RTMS) for traffic police. The system uses fingerprint scanning and GPS to verify drivers' licenses electronically. It consists of two sections - a transmitting unit carried by police to take fingerprints and send them via GSM to a central RTO server for verification, and a receiving section at the RTO office where the server stores license data and fingerprints in a database. The server matches received fingerprints to the database and sends the license details or an invalid message back to the police unit. It also tracks the police location via GPS. The aim is to automate license verification, reduce corruption, and allow remote checking from any location.
The document discusses SYM Technologies' DAS venue performance solutions, including their UWMS-05 LTE smart modem, 2G-S24 iSpectrum spectrum analyzer, and Active SPOI DAS tray. The solutions provide remote monitoring and management of network performance through features like spectrum analysis, automated KPI reporting, and intelligent alarming. The document promotes how SYM's solutions help optimize venue connectivity and troubleshoot issues to improve the spectator experience.
IRJET- Ad-hoc Based Outdoor Positioning SystemIRJET Journal
This document describes a proposed ad-hoc based outdoor positioning system using wireless nodes. The system would allow nodes carried by people traveling in a group to communicate with each other and a receiver to track locations. Each node acts as both a master and slave and communicates wirelessly using Zigbee. If a node moves out of range of the receiver, an alert is sent to other nodes and the receiver. Temperature sensors on the nodes can also detect surrounding temperature and detect events like wildfires. The system provides an alternative to GPS for tracking locations outdoors and in all environments using less power. It was tested with nodes on trucks communicating alert messages to the receiver when out of range.
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...IRJET Journal
This document describes an automatic toll collection and stolen vehicle detection system using RFID and wireless communication technologies. The system uses RFID modules to automatically collect tolls from moving vehicles by deducting payment from the owner's bank account. It can also detect and locate stolen vehicles by sending SMS alerts and notifications to the vehicle owner and police with the vehicle's location coordinates. The system aims to make toll collection more efficient by eliminating waiting times and reducing manpower needs. It also allows for quicker recovery of stolen vehicles.
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
This document describes the design and implementation of a fingerprint-based bank locker system using an ARM7 microcontroller and GSM technology. The system uses a fingerprint sensor module to store fingerprints of authorized users. When a fingerprint is detected that matches an authorized user, an ARM7 microcontroller connected to a GSM module will send an authentication SMS to the user. If authenticated, the microcontroller will activate a motor to automatically open the bank locker door, providing secure access. The system aims to provide stronger security compared to traditional bank lockers that use keys, as fingerprints are more reliable identifiers than keys that can be lost or stolen.
IRJET- Automatic Vehicle Accident Detection and Messaging SystemIRJET Journal
This document describes an automatic vehicle accident detection and messaging system. The system uses an ATmega328P microcontroller connected to sensors like an accelerometer, GPS module, and GSM module. It also includes features like a camera, LCD display, and push button. In the event of an accident, the accelerometer detects abrupt movement and the microcontroller sends an alert message with time and location data using the GSM module. This information helps with crash analysis and investigation. The system provides vehicle diagnostics and navigation on an LCD display. It aims to improve road safety by detecting accidents and sending alerts to emergency services.
This document summarizes a research paper that proposes an IOT integrated system for real-time data acquisition and control of power transformers. The system uses sensors to monitor parameters like voltage, current, temperature, oil insulation, and earth faults. The sensor data is sent to a microcontroller and then to an IOT cloud server. This allows utility operators to remotely monitor transformer health and identify issues before failures. The system is more economical than traditional SCADA monitoring and could help save utilities money by reducing transformer repairs. It was found to work accurately and provide advanced protection and control of power transformers.
IRJET-A Comparative Study of use of the Library and the Internet as Sources o...IRJET Journal
This document describes a password protected interactive voice response system to remotely control a three-phase motor using a GSM modem and microcontroller. The system allows a user to call in, enter a password, and then select to turn the motor on or off by pressing buttons on their phone. It uses pre-recorded voice prompts to interact with the user. The system has applications for remotely controlling equipment like motors in agricultural settings from anywhere via a mobile phone call. It aims to provide a low-cost and user-friendly solution for remote control of three-phase motors with voice confirmation of commands.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
1. The Last Gap of Data Center Operation
SmarRack
-Data Center Assets Management Solution
sales12@digitalor.com 18676342132
by Arron Zhao
2. The Trouble of IT Assets Operation
Bigger Quantity
Too Much Work
More Procedures
CannotManage Well
More Staff
Lower Efficiency
3. Maintenance Process: include regular maintenance, change management, testing cost and etc.
Staff Labor: include training, education, turnover, hiring and etc.
Technology and Component: include hardware, software, network and etc.
Maintenance Process
40%
Staff Labor
40%
Technology and Component
20%
According to the research of Gartner, the proportion of facility management cost
comprise of:
IT Assets Operation Cost Analysis
4. Gartner’s research shows that, 50% of the CIOs interviewed think lack of automation is the
main reason why IT operation cost is too high. Manual operation is of high risk, low efficient,
and high labor cost.
Source of the problem: Lack of automation
The quantity of assets is growing fast. It is hard to find a certain failed device quickly.
And the assets change management is completed all by human, it cannot ensure the
accuracy and timing requirements.
5. Eight Problems to Solve
Rack unit is not monitored,
cannot get the accurate
utilization rate.
No operation checking, easily
lead to accident.
No accurate assets sum-up data
for financial department
5
Cannot find the failed device,
restoring time is long.
Assets change management is
recorded by man, which is of
high mistake rate.
More complex procedures,
lower efficiency
More cost
More and more
staff
6. Rack-unit-level Real-time Assets Monitoring
is the basis of automated operation.
Make the uncontrollable controlled,
to ensure the consistency of business
7. Contact tag technology
Active and wired.
Raritan’s product is still not accepted by market after 8 years.
Data center is full of devices, which will cause vibration.
The racks will be under vibrating status 365x24x7. This
can be regarded as a flight flies and vibrates 365x24x7,
the lasting vibration is a huge challenge for
connectors, especially for the connectors with multiple
small pins. Besides the vibration, there are also dirt,
moisture, heat, corrosive material, static electricity and
many other risks for the connector. Frequent
maintenance will be need to ensure the stability of the
connector. Contact tag technology is a experimental
product, cannot be deployed massively.
Three Generations of Rack-unit-level Managing Technology
1st Generation
Example:
8. RFID Technology
Passive and wireless
Raritan’s product is still not accepted by market
after 6 years.
RFID technology is very limited in rack-unit-level assets
monitoring, the reasons are:
1、RFID cannot realize precise positioning.
2、RFID cannot ensure stable communication. Because
the complex environment of data center, passive RFID’s
effective range varies. Tag cannot be read constantly
and stably.
3、Cannot guarantee 100% accuracy. Because the
distance between adjacent reader is too short( distance
between rack unit is 44mm), it will cause unexpected
reading. The overall accuracy is about only 70%.
4、Cannot achieve maintenance free and high reliability
Three Generations of Rack-unit-level Managing Technology
2nd Generation
Example:
9. A breakthrough of rack-unit-level monitoring technology.
Active and battery-free RFID tag, with passive RF reader. MC-
RFIoT is invented by Quan Liu in 2013. It inherited the
advantage of RFID technology, and overcame RFID’s limitation
in rack-unit-level assets monitoring. Digitalor’s SmarRack
module and UTAG are based on MC-RFIoT technology, so
realized the features of high reliability, high accuracy, precise
positioning and maintenance free. It is the only product that
fulfills the need of rack-unit-level monitoring and smart
operation.
Three Generations of Rack-unit-level Managing Technology
3rd Generation
MC-RFIoT Technology
Active, battery-free and wireless
Ultra-high stability and reliability
10. UTAG Specification
* The‘identify card’of asset, the information is written is the electronic digital tag. It will move alone with the asset it
attaches to during the whole life cycle.
* There is a 3M sticker for attaching. Remove the cover of 3M sticker, and paste the sticker to the corresponding asset.
* After mounting the asset in the rack, attach its UTAG to the SmarRack reader aligned with the rack unit, at which the asset is
at, then SmarRack module will get the asset information.
* The distance between UTAG and reader is fixed by magnetic attaching. Easy to operate, stable performance, and good user-
experience.
The information inside of UTAG can be written via
UTAG writer of SmarRack module
11. The master module must be at the top end,
and slave modules can be joint in any
sequence. The SATA connector on the top
of master module are split into 12V DC
power connector and RJ45 network
connector( or only RJ45 in PoE version).
Every reader of the module is aligned to
one rack unit. After mounting asset to the
rack, just need to place its UTAG to the
corresponding reader, the information of
the asset will be uploaded to database via
TCP/IP.
SmarRack Module Specification
The attributes of SmarRack module
High-precision positioning module. Mounted to
rack with fixing bracket.
A SmarRack assembly comprises of one
master module and several slave modules. The
length of module can be 5U or 6U. By different
combination of 5U and 6U modules, the
assembly can adapt to racks of different heights.
The connection between modules are SATA
connector.
12. * UTAG writer is connected to client PC via USB connector.
Place the round end of UTAG to the center of UTAG writer,
then the information of the UTAG can be edited in the
software.
* Standard version can edit the basic information of the asset.
* Pro version can edit both basic information and extended
information.
* By integration with barcode scanner, can realize automated
tag issuing.
UTAG Writer Specification
13. Navigator DCAM Software
Navigator DCAM software support real-time rack-
unit-level assets monitoring and diverse automated
data center operation functions.
SmarRack Mobile APP
SmarRack mobile APP is the extended function of Navigator
DCAM. It can receive working ticket remotely, and manage
off-rack assets by scanning UTAG with NFC.
Rack with Pre-installed SmarRack
Standard 42U rack, universal design, with SmarRack module
pre-installed.
14. The Value of SmarRack
14
Precise positioning asset to rack unit, help operator
find the failed device quickly.
1、Real-time IT Assets Positioning
15. 2、Automated Assets Change Recording
Automated rack-unit-level assets change recording, includes device adding, device removal,
position transfer. By using SmarRack, operators can save the time to do assets position
recording, and the position record is 100% accurate.
The Value of SmarRack
16. * Monitor the utilization rate of every rack
* Monitor the utilization rate of the whole data center
80%
Provide accurate rack space utilization rate, for making
escalation decision.
After deploying SmarRack, the utilization rate increases by
10%~20%
The Value of SmarRack
3、Rack Space Utilization Rate Monitoring
17. * Green means the unit is available
* Red means not available
* Yellow means need maintenance.
Scenario: SmarRack can calculate the
combined max power of the devices in the
rack, if about to be overloaded, all the
LEDs turn to red, means the units are
unavailable. If any other device added on,
SmarRack will make audio alarm.
4、Operational Status LED Indicator
The LED indicators on SmarRack
can show the operational status
of the rack unit.
The Value of SmarRack
18. * When assets change happens, SmarRack will
calculate the total weight of the assets in the rack.
* If the rack is about to be overloaded, there will
be warning on site and in software.
* If already overloaded, there will be constant
warning on site and in software.
5、Weight Overload Warning
The Value of SmarRack
19. 6、Power Overload Warning
The Value of SmarRack
* When assets change happens,
SmarRack will calculate the total power
of the assets in the rack.
* If the rack is about to be overloaded,
there will be warning on site and in
software.
* If already overloaded, there will be
constant warning on site and in software.
20. 7、Lifecycle Monitoring and Warning
* After every device is deployed, SmarRack will monitor the life cycle of the device.
* When the device is approaching the end lifecycle, there will be early warning both
on site and in software.
* When already reached the full lifecycle, there will be constant warning both on site
and in software.
Deployed Approaching the
End of Lifecycle
Reached Full
Lifecycle
WarningEarly Warning
The Value of SmarRack
22. 9、Assets Residual Value Calculation
To get the accurate value of fixed assets, SmarRack DCAM can calculate the residual value of
each server, according to the lifecycle, time since deployed, depreciation rate, original value and
etc. of each asset. This function can give the accurate data of fixed assets to financial department.
The Value of SmarRack
23. 10、Mobile APP
Monitor the on-rack servers from anywhere, anytime.
Manage off-rack servers by using NFC function of
mobile terminal.
The Value of SmarRack
25. 25
A. Ensure the consistency of your business
SmarRack can ensure quick action of maintenance. And automatically recognize operational
error, warn the operator to correct in time, make the risk of manual operation to the lowest.
SmarRack can keep the availability your data center, no matter how many assets are in it.
B. Improve the efficiency and accuracy.
Simplify the process of operation, and eliminate operational errors.
Automated assets information recording and sum-up, 100% accuracy ensured.
C. Save cost
Save the cost of maintenance process by 80%
Save the cost of labor by 10%~30%
The Value of SmarRack
26. The Key of Differentiation
By lowering the risk of data center operation, to ensure the consistency of
business, and lowering the operational cost, will be the key of differentiation.
SmarRack is the core of this differentiation.
27. Scenario 1: Add device
How Operational Process Changed
After Deploying SmarRack
• Simplify the process of adding new device.
• After mounting the device in the rack, all the information will be uploaded to
database by simply attaching the UTAG to the reader of SmarRack module. No
extra manual operation is needed.
Mount
Device
Read the
information
of the
assets
Paste the
tag to the
device
Edit the
location
info.
manually
Finish
Mount
Device
Attach
SmarRack
tag
Finish
Import the
asset’s info
to CMDB
Now
Before
28. • Simplify the process of removing device, just detach the UTAG from reader
after dismount the device
• SmarRack database will automatically recognize the removal of the device. If
the device enters inventory or other racks, it still can be traceable via
integrated access control system.
How Operational Process Changed
After Deploying SmarRack
Scenario 1: Remove device
Dismount
Device
Edit the
availability
of the rack
Record
the
removal
info.
Finish
Dismount
Device
Finish
Delete the
info. of the
asset in
CMDB
Before
Now
29. • When moving the device, operators do not need to record the
change in database, just focus on moving the device is enough.
How Operational Process Changed
After Deploying SmarRack
Scenario 3: Move device
Before
Now
Dismount
the device
from old
rack
Mount the
Device to
new rack
Edit the
availability
of the new
rack to
‘NO’
Finis
h
Dismount
the device
from old
rack
Finis
h
Edit the
availability
of the old
rack to
‘YES’
Edit the
location
info.
manually
Mount the
Device to
new rack
30. Wait for
next check
sum without
any solution
• Before: Heavy workload, annoying environment, no method
to ensure the accuracy.
• After: Fully automated sum-up, no labor needed.
SmarRack DCAM can also provide diverse report to
financial department and purchasing department, for
example, the distribution map of device, lifecycle
report, maintenance report.
How Operational Process Changed
After Deploying SmarRack
Before
Now
Scenario 4: Assets sum-up
Finance
department
provides the
finance list
Find all
the
devices in
IDC
Device
inventory
check
sum
Finis
h
Automatic
Report
Generator
Operation
department
provides
the device
list
Check
sum with
the
finance list
Inaccurate
result
Finance
department
reports your
mistakes
You promise
to figure out
the mistakes
next time
31. • After: When hardware failure happens, SmarRack mobile APP
can notify engineer to fix, engineer can find the device
quickly by searching for the flashing LED on site.
• Before: Finding the target device will take most of the
operational time, it lowers the efficiency of operation
How Operational Process Changed
After Deploying SmarRack
Before
Now
Scenario 5: Device targeting
System
find
hardware
failure
Tell the location
info. to the
maintenance
staff
Find the
device in
IDC
Finish
System
find
hardware
failure
Finish
Find the
location record
of the device in
CMDB
Maintenance
staff receives
the push
message via
APP
Find the
flashing LEDs
that indicate
the location
32. • Before: Mostly, the asset’s position information recorded by man is not
accurate. The reliable method is to check one by one on site.
• After: One click to get the full report of 100% accuracy.
How Operational Process Changed
After Deploying SmarRack
Before
Now
Scenario 6: Escalation Plan
Check the
data in
CMDB
Analyze the
data and
write the
report
Finish
System
generates the
report
automatically
Finish
Re-check
the devices
in IDC one
by one
Export the
report
33. Comments from Experts
SmarRack filled‘the last gap’of automated data center operation.
---Yang Shideng, IDC Operation Service Director of Maslong
John Curran
Digitalor's SmarRack really surprise me with
its unique patent technology and simple
design, which improves the product
performance and sustainability during assets'
lifecycle. SmarRack is a great invention that
will impact on data center greatly.
Avocent,
VP of Product Management
68
Dmitry
Bokotey
Digitalor's SmarRack product resolves the
issues for IT assets tracking, and impressed
me. It is sexiest and innovative IoT product
for data center, we would love to integrate
SmarRack into our platform for a long term
business partner with Digitalor.
nuPSYS
CTO & Founder