At the process automation users association WIB, March 2016, ARC's Valentijn de Leeuw gave a presentation about simple, robust and safe automation and IT from instrument up to and including Industrial IoT networks
Introduction to Operational Technology 0.1Richard Hudson
The document discusses considerations for operational technology and open source as enablers for Internet of Things (IoT) interoperability. It addresses challenges in integrating operational technology (OT) due to siloed IT/OT activities and competing standards. Three key enablers for interoperability are identified: data models, application programming interfaces, and protocol stacks. Open source frameworks are presented as a solution for device integration through their design for interoperability. Examples of open source implementations that can enable OT across devices, networks, and cloud platforms are also provided.
Bolt IoT Platform: How to build IoT products and prototypes easily.Pranav Pai Vernekar
Bolt is an Internet of Things platform (Hardware+Software) that enables businesses and makers to easily build IoT prototypes and products. (http://boltiot.com/)
Currently products such as Dosamatic an Automatic Dosa Maker, iSafe Hooter which looks at crowdsourcing security, Humanoid Robot, Smart Bell - an automated school bell, IoT Lighting, Be Lawn Smart - an automated gardening system etc. are built using the Bolt platform.
Bolt was one of the technologies showcased at Startup-Konnect program 2015 organised on sidelines of the visit by Prime Minister of India to the Silicon Valley, USA.
Bolt has also won awards such as the DST Lockheed Martin India Innovation Growth program and IoT Tech 10 by Intel and IBM for its innovation and patented technology.
Don Pearson and Travis Cox from Inductive Automation, Arlen Nipper, the president/CTO of Cirrus Link Solutions and co-inventor of MQTT, and Gregory Tink, managing owner of The Streamline Group address the improvements to data access to help solve business challenges as well as explore the digital oilfield.
The document discusses challenges associated with converged plantwide architectures that Converged Plantwide Ethernet (CPwE) helps to address. It describes issues like industrial IoT convergence bringing together different automation and control systems on one network, as well as challenges with operational technology and information technology convergence due to differences in technologies, cultures, and functional requirements between OT and IT. The document advocates that a structured and segmented network infrastructure as provided by CPwE reference architectures can help solve problems introduced by large flat networks lacking natural boundaries between systems.
This document discusses approaches for achieving interoperability between coalition systems. It defines a system of systems as a collection of independent systems that pool resources to achieve greater functionality. Interoperability is identified as the key requirement for a system of systems. Different levels of interoperability are described from no interoperability to conceptual interoperability. The document advocates using a formal language and rigorous process for data modeling to define data in a system of systems. This would allow different systems to exchange data unambiguously and achieve semantic interoperability. It presents RTI's data-centric integration solution as an approach that provides technical, syntactic and semantic interoperability between legacy and new systems using common data definitions.
This document discusses how enterprise Internet of Things (IoT) technologies can enable business transformation through connected lighting and building infrastructure. It describes how legacy building networks operate in silos and the trend toward low-voltage connected devices and IP convergence. The benefits of Cisco's UPOE (Universal Power over Ethernet) and connected lighting solutions are presented, including energy savings, improved experiences, facilities optimization, and enabling new IoT analytics applications. The Talem IoT development kit is introduced as a way to connect USB sensors and devices to the network over Ethernet using Power over Ethernet.
Introduction to Operational Technology 0.1Richard Hudson
The document discusses considerations for operational technology and open source as enablers for Internet of Things (IoT) interoperability. It addresses challenges in integrating operational technology (OT) due to siloed IT/OT activities and competing standards. Three key enablers for interoperability are identified: data models, application programming interfaces, and protocol stacks. Open source frameworks are presented as a solution for device integration through their design for interoperability. Examples of open source implementations that can enable OT across devices, networks, and cloud platforms are also provided.
Bolt IoT Platform: How to build IoT products and prototypes easily.Pranav Pai Vernekar
Bolt is an Internet of Things platform (Hardware+Software) that enables businesses and makers to easily build IoT prototypes and products. (http://boltiot.com/)
Currently products such as Dosamatic an Automatic Dosa Maker, iSafe Hooter which looks at crowdsourcing security, Humanoid Robot, Smart Bell - an automated school bell, IoT Lighting, Be Lawn Smart - an automated gardening system etc. are built using the Bolt platform.
Bolt was one of the technologies showcased at Startup-Konnect program 2015 organised on sidelines of the visit by Prime Minister of India to the Silicon Valley, USA.
Bolt has also won awards such as the DST Lockheed Martin India Innovation Growth program and IoT Tech 10 by Intel and IBM for its innovation and patented technology.
Don Pearson and Travis Cox from Inductive Automation, Arlen Nipper, the president/CTO of Cirrus Link Solutions and co-inventor of MQTT, and Gregory Tink, managing owner of The Streamline Group address the improvements to data access to help solve business challenges as well as explore the digital oilfield.
The document discusses challenges associated with converged plantwide architectures that Converged Plantwide Ethernet (CPwE) helps to address. It describes issues like industrial IoT convergence bringing together different automation and control systems on one network, as well as challenges with operational technology and information technology convergence due to differences in technologies, cultures, and functional requirements between OT and IT. The document advocates that a structured and segmented network infrastructure as provided by CPwE reference architectures can help solve problems introduced by large flat networks lacking natural boundaries between systems.
This document discusses approaches for achieving interoperability between coalition systems. It defines a system of systems as a collection of independent systems that pool resources to achieve greater functionality. Interoperability is identified as the key requirement for a system of systems. Different levels of interoperability are described from no interoperability to conceptual interoperability. The document advocates using a formal language and rigorous process for data modeling to define data in a system of systems. This would allow different systems to exchange data unambiguously and achieve semantic interoperability. It presents RTI's data-centric integration solution as an approach that provides technical, syntactic and semantic interoperability between legacy and new systems using common data definitions.
This document discusses how enterprise Internet of Things (IoT) technologies can enable business transformation through connected lighting and building infrastructure. It describes how legacy building networks operate in silos and the trend toward low-voltage connected devices and IP convergence. The benefits of Cisco's UPOE (Universal Power over Ethernet) and connected lighting solutions are presented, including energy savings, improved experiences, facilities optimization, and enabling new IoT analytics applications. The Talem IoT development kit is introduced as a way to connect USB sensors and devices to the network over Ethernet using Power over Ethernet.
This white paper discusses the importance of developing a comprehensive security policy to protect automation systems. It outlines several security guidelines that can be included in a policy, such as restricting physical access, implementing strong authentication and authorization practices, designing secure network architectures, controlling remote access securely, and establishing wireless and maintenance security procedures. The document emphasizes that a security policy coupled with secure products and ongoing maintenance is essential for securing modern automation networks that now connect to open enterprise networks.
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Inductive Automation
In this webinar, a panel of experienced control system integrators will discuss the biggest challenges and technology trends in their field, as identified in a recent survey conducted by Inductive Automation, and will also discuss potential solutions.
Connext DDS Cert provides a certifiable implementation of the Data Distribution Service (DDS) standard for safety-critical and mission-critical systems. It handles connectivity and integration challenges and supports DO-178C Level A certification. Using Connext DDS Cert can reduce certification costs by replacing custom connectivity code and simplifying system architecture. Real-Time Innovations provides a full certification data package to support certification of systems using Connext DDS Cert.
This document summarizes an IoT panel discussion on security for hardware, software, and sensors. The panelists discussed distinguishing characteristics and security concerns for industrial versus consumer IoT applications. They addressed important components of an IoT security architecture like authentication, corruption prevention, and spoofing protection. Panelists also discussed security considerations for sensors, software, hardware, and cloud services - including verifying sensor access, preventing hacking or software corruption, and protecting data in the cloud. The audience then asked questions of the panelists from Flexera Software, Red Hat, RTI, and ThingWorx.
Security and Safety Assurance in Industrial IoTVladimir Sklyar
Vladimir Sklyar presented on security and safety assurance in industrial IoT. Some key points:
1) Industrial IoT (IICS) systems interact with the physical world, so security compromises or degradations can endanger people's health and the environment.
2) IICS have different requirements than traditional IT systems in terms of performance, reliability, risk management, and components.
3) Industrial standards define security and safety levels (SL and SIL) for IICS.
4) The architecture for IICS should be a hybrid of traditional industrial control systems and IoT architectures.
TechWiseTV Workshop: Cisco Digital CeilingRobb Boyd
Would you believe the latest technology transformation is happening right now, right above your head? OK, maybe not yet, but as you’ll hear in our latest TechWiseTV Workshop, the digital ceiling is coming, and the potential benefits for your organization are huge.
Attend the workshop (or replay): http://cs.co/9003B9lkR
Don't miss the video:
Watch the TechWiseTV Episode: http://bit.ly/DigCeiling
The 'Semiconductor Blues: http://bit.ly/semiblues
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
This document discusses lessons learned from space rovers and surgical robots that can inform system architecture. It advocates for a common architecture across industries using the Data Distribution Service (DDS) standard. DDS provides a data-centric middleware that maintains distributed state and facilitates plug-and-play connectivity between devices and across networks. It ensures real-time communication with quality of service guarantees to support applications from robotics to healthcare. DDS has been adopted in over 1000 industrial IoT systems and several standards/consortia due to its ability to securely connect sensors to cloud with interoperability between vendors.
DEVNET-1185 Business Transformation with Enterprise IOTCisco DevNet
This document discusses how enterprise Internet of Things (IoT) technologies can enable business transformation through connected lighting and building infrastructure. It describes how legacy building networks operate in silos and the trend toward low-voltage connected devices and IP convergence. The benefits of Cisco's UPOE (Universal Power over Ethernet) and connected lighting solutions are presented, including energy savings, improved experiences, facilities optimization, and enabling new IoT analytics applications. Finally, the document introduces TALEM, Cisco's IoT device kit that allows any USB device to be connected over Ethernet using Power over Ethernet, extending the reach of IoT in an enterprise.
Factors You Should Consider if Building an IIoT SolutionLaird Connectivity
Connected solutions can generate useful insights, but in between your things, the internet, and the insights are vast combinations of specialized technologies and complexities that you must navigate in order to deliver an effective, profitable, scalable system.
In this webinar, technical experts from Laird Connectivity will examine the top five factors you need to consider when implementing an enterprise-grade, revenue-generating IoT solution.
Learn about:
-Top IoT Challenges
-Architecting Your IoT Solution
-Choosing a Connectivity Option
-Selecting a Cloud Solution
-What Your Competitors are Doing – Live Demo
-Example Applications
The document discusses four keys to securing distributed industrial internet of things (IIoT) systems: 1) using a decentralized architecture rather than a centralized one, 2) implementing access control, 3) not relying solely on TCP and transport layer security, and 4) ensuring interoperability through open architectures and standards. It provides examples of how RTI's Data Distribution Service approach addresses these keys and secures critical infrastructure like power grids.
1) GE Healthcare is using RTI Connext DDS as the connectivity platform for its Industrial Internet of Things (IIoT) architecture. Connext DDS can handle many classes of intelligent machines and satisfies GE's demanding requirements.
2) GE Healthcare is leveraging the Predix architecture to connect medical devices, cloud analytics, and mobile/wearable instruments. The future communication fabric of its monitoring technology is based on Connext DDS.
3) Physio-Control uses Connext DDS to exchange critical patient care information throughout the system of care, connecting vehicle systems, cloud systems, and infrastructure systems.
IoT Cloud Service & Partner IoT Solution harishgaur
Join this session to understand Oracle IoT Strategy and a phased approach to ROI with the Oracle Internet of Things Cloud Service, making IoT implementation straightforward, simple and effective. In this session, you will learn how the feature set will help you to quickly build IoT applications, connect and manage devices, configure and monitor security policies, manage and analyze massive amounts of data and integrate with your business processes and applications.
The document summarizes a security solution called OTPS that is designed to protect utility control systems from vulnerabilities. It notes that control systems have become more vulnerable as they integrate with corporate networks and use commercial operating systems. The OTPS solution uses security event management, intrusion detection, and other tools to monitor systems for breaches, protect critical infrastructure, and detect and prevent security issues across networks, protocols, processes and system health. It is presented as a customizable, scalable solution to implement security best practices for utility control environments.
The document discusses selecting an IoT platform. It notes that 2017 will see a shift towards IoT deployments and monetization. There were many IoT platform announcements in 2016 and acquisitions totaling over $100 billion. However, there are still too many platforms and the market is ready for consolidation. When selecting a platform, considerations include features, managing devices, connectivity, security, analytics and other capabilities. Using an IoT platform can accelerate innovation by focusing on differentiating aspects of solutions.
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
This document provides a summary of a presentation given by Michael Coden and Pete MacLeod on October 7, 2014 about scaling industrial control system (ICS) cybersecurity. It discusses conducting an inventory of ICS assets at an oil and gas facility, comparing manual vs automated inventory methods. The presentation aims to illustrate how centralized OT cybersecurity automation can improve security, reduce time/costs for inventory and incident response, and help address skills shortages through centralization.
Mahindra Group has a history of global collaboration and pioneering globalization. Its purpose is to challenge conventional thinking and enable stakeholders to rise. Tech Mahindra is a leader in engineering for next-gen connected solutions and the internet of things. It provides connected engineering and analytics services across industries like automotive, healthcare, smart cities, and renewable energy to manage the changing world.
ARC Advisory Group Vice President Craig Resnick and Inductive Automation Chief Strategy Officer Don Pearson discuss a new type of IIoT architecture that can increase data throughput, provide greater agility, and improve enterprise-wide communication. Learn how IIoT could reshape the way industrial organizations implement system architectures, and deepen your knowledge of the key factors driving this movement.
Explore megatrends in manufacturing:
- Digital enterprise/IIoT platforms
- Edge computing
- Open enterprise architectures for the IIoT age
- Virtual and augmented reality in factory environments
- The factory workforce of the future
- Cybersecurity needs and solutions
- And more
Wurldtech provides cybersecurity services for operational technology (OT) systems, including assessments of devices, software, and industrial sites. Their services help identify vulnerabilities, evaluate security practices, and certify adherence to standards. They also offer the OpShield product which provides network segmentation, whitelisting, and other controls to enhance OT security.
This document discusses data distribution service (DDS) security for the industrial internet of things (IIoT). It provides background on DDS and the IIoT. It then discusses how DDS security works, including pluggable security architectures, authentication, access control, and message security. The goal of DDS security is to prevent unauthorized access to data in the global data space shared by DDS applications. Built-in security capabilities include X.509 authentication, access control configuration, and encryption/message authentication algorithms.
Arla Foods @ ARC Forum March 2016 - I4.0 & PackMLArne Svendsen
This presentation discusses Industry 4.0 and how it applies to Arla Foods' supply chain. It provides a real-world example of how Arla implemented PackML, an open interface standard, to more easily integrate packaging lines from multiple vendors. For Industry 4.0 to succeed, open standards like OPC-UA and PackML are needed to ensure "any application" can communicate with "any device". Widespread adoption of standards will reduce costs and allow for faster integration of new technologies.
Arla Foods is implementing Industry 4.0 concepts like the PackML standard to more easily integrate packaging equipment from multiple suppliers on their production lines. PackML provides a common interface that allows different machines to communicate their states, modes and other data to the line controller. This helps speed up line integration and reduces costs. Standards bodies are working to define open communication protocols like OPC-UA to connect devices. For Industry 4.0 to succeed, standards need to ensure systems from any vendor can communicate using a common language.
This white paper discusses the importance of developing a comprehensive security policy to protect automation systems. It outlines several security guidelines that can be included in a policy, such as restricting physical access, implementing strong authentication and authorization practices, designing secure network architectures, controlling remote access securely, and establishing wireless and maintenance security procedures. The document emphasizes that a security policy coupled with secure products and ongoing maintenance is essential for securing modern automation networks that now connect to open enterprise networks.
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Inductive Automation
In this webinar, a panel of experienced control system integrators will discuss the biggest challenges and technology trends in their field, as identified in a recent survey conducted by Inductive Automation, and will also discuss potential solutions.
Connext DDS Cert provides a certifiable implementation of the Data Distribution Service (DDS) standard for safety-critical and mission-critical systems. It handles connectivity and integration challenges and supports DO-178C Level A certification. Using Connext DDS Cert can reduce certification costs by replacing custom connectivity code and simplifying system architecture. Real-Time Innovations provides a full certification data package to support certification of systems using Connext DDS Cert.
This document summarizes an IoT panel discussion on security for hardware, software, and sensors. The panelists discussed distinguishing characteristics and security concerns for industrial versus consumer IoT applications. They addressed important components of an IoT security architecture like authentication, corruption prevention, and spoofing protection. Panelists also discussed security considerations for sensors, software, hardware, and cloud services - including verifying sensor access, preventing hacking or software corruption, and protecting data in the cloud. The audience then asked questions of the panelists from Flexera Software, Red Hat, RTI, and ThingWorx.
Security and Safety Assurance in Industrial IoTVladimir Sklyar
Vladimir Sklyar presented on security and safety assurance in industrial IoT. Some key points:
1) Industrial IoT (IICS) systems interact with the physical world, so security compromises or degradations can endanger people's health and the environment.
2) IICS have different requirements than traditional IT systems in terms of performance, reliability, risk management, and components.
3) Industrial standards define security and safety levels (SL and SIL) for IICS.
4) The architecture for IICS should be a hybrid of traditional industrial control systems and IoT architectures.
TechWiseTV Workshop: Cisco Digital CeilingRobb Boyd
Would you believe the latest technology transformation is happening right now, right above your head? OK, maybe not yet, but as you’ll hear in our latest TechWiseTV Workshop, the digital ceiling is coming, and the potential benefits for your organization are huge.
Attend the workshop (or replay): http://cs.co/9003B9lkR
Don't miss the video:
Watch the TechWiseTV Episode: http://bit.ly/DigCeiling
The 'Semiconductor Blues: http://bit.ly/semiblues
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
This document discusses lessons learned from space rovers and surgical robots that can inform system architecture. It advocates for a common architecture across industries using the Data Distribution Service (DDS) standard. DDS provides a data-centric middleware that maintains distributed state and facilitates plug-and-play connectivity between devices and across networks. It ensures real-time communication with quality of service guarantees to support applications from robotics to healthcare. DDS has been adopted in over 1000 industrial IoT systems and several standards/consortia due to its ability to securely connect sensors to cloud with interoperability between vendors.
DEVNET-1185 Business Transformation with Enterprise IOTCisco DevNet
This document discusses how enterprise Internet of Things (IoT) technologies can enable business transformation through connected lighting and building infrastructure. It describes how legacy building networks operate in silos and the trend toward low-voltage connected devices and IP convergence. The benefits of Cisco's UPOE (Universal Power over Ethernet) and connected lighting solutions are presented, including energy savings, improved experiences, facilities optimization, and enabling new IoT analytics applications. Finally, the document introduces TALEM, Cisco's IoT device kit that allows any USB device to be connected over Ethernet using Power over Ethernet, extending the reach of IoT in an enterprise.
Factors You Should Consider if Building an IIoT SolutionLaird Connectivity
Connected solutions can generate useful insights, but in between your things, the internet, and the insights are vast combinations of specialized technologies and complexities that you must navigate in order to deliver an effective, profitable, scalable system.
In this webinar, technical experts from Laird Connectivity will examine the top five factors you need to consider when implementing an enterprise-grade, revenue-generating IoT solution.
Learn about:
-Top IoT Challenges
-Architecting Your IoT Solution
-Choosing a Connectivity Option
-Selecting a Cloud Solution
-What Your Competitors are Doing – Live Demo
-Example Applications
The document discusses four keys to securing distributed industrial internet of things (IIoT) systems: 1) using a decentralized architecture rather than a centralized one, 2) implementing access control, 3) not relying solely on TCP and transport layer security, and 4) ensuring interoperability through open architectures and standards. It provides examples of how RTI's Data Distribution Service approach addresses these keys and secures critical infrastructure like power grids.
1) GE Healthcare is using RTI Connext DDS as the connectivity platform for its Industrial Internet of Things (IIoT) architecture. Connext DDS can handle many classes of intelligent machines and satisfies GE's demanding requirements.
2) GE Healthcare is leveraging the Predix architecture to connect medical devices, cloud analytics, and mobile/wearable instruments. The future communication fabric of its monitoring technology is based on Connext DDS.
3) Physio-Control uses Connext DDS to exchange critical patient care information throughout the system of care, connecting vehicle systems, cloud systems, and infrastructure systems.
IoT Cloud Service & Partner IoT Solution harishgaur
Join this session to understand Oracle IoT Strategy and a phased approach to ROI with the Oracle Internet of Things Cloud Service, making IoT implementation straightforward, simple and effective. In this session, you will learn how the feature set will help you to quickly build IoT applications, connect and manage devices, configure and monitor security policies, manage and analyze massive amounts of data and integrate with your business processes and applications.
The document summarizes a security solution called OTPS that is designed to protect utility control systems from vulnerabilities. It notes that control systems have become more vulnerable as they integrate with corporate networks and use commercial operating systems. The OTPS solution uses security event management, intrusion detection, and other tools to monitor systems for breaches, protect critical infrastructure, and detect and prevent security issues across networks, protocols, processes and system health. It is presented as a customizable, scalable solution to implement security best practices for utility control environments.
The document discusses selecting an IoT platform. It notes that 2017 will see a shift towards IoT deployments and monetization. There were many IoT platform announcements in 2016 and acquisitions totaling over $100 billion. However, there are still too many platforms and the market is ready for consolidation. When selecting a platform, considerations include features, managing devices, connectivity, security, analytics and other capabilities. Using an IoT platform can accelerate innovation by focusing on differentiating aspects of solutions.
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
This document provides a summary of a presentation given by Michael Coden and Pete MacLeod on October 7, 2014 about scaling industrial control system (ICS) cybersecurity. It discusses conducting an inventory of ICS assets at an oil and gas facility, comparing manual vs automated inventory methods. The presentation aims to illustrate how centralized OT cybersecurity automation can improve security, reduce time/costs for inventory and incident response, and help address skills shortages through centralization.
Mahindra Group has a history of global collaboration and pioneering globalization. Its purpose is to challenge conventional thinking and enable stakeholders to rise. Tech Mahindra is a leader in engineering for next-gen connected solutions and the internet of things. It provides connected engineering and analytics services across industries like automotive, healthcare, smart cities, and renewable energy to manage the changing world.
ARC Advisory Group Vice President Craig Resnick and Inductive Automation Chief Strategy Officer Don Pearson discuss a new type of IIoT architecture that can increase data throughput, provide greater agility, and improve enterprise-wide communication. Learn how IIoT could reshape the way industrial organizations implement system architectures, and deepen your knowledge of the key factors driving this movement.
Explore megatrends in manufacturing:
- Digital enterprise/IIoT platforms
- Edge computing
- Open enterprise architectures for the IIoT age
- Virtual and augmented reality in factory environments
- The factory workforce of the future
- Cybersecurity needs and solutions
- And more
Wurldtech provides cybersecurity services for operational technology (OT) systems, including assessments of devices, software, and industrial sites. Their services help identify vulnerabilities, evaluate security practices, and certify adherence to standards. They also offer the OpShield product which provides network segmentation, whitelisting, and other controls to enhance OT security.
This document discusses data distribution service (DDS) security for the industrial internet of things (IIoT). It provides background on DDS and the IIoT. It then discusses how DDS security works, including pluggable security architectures, authentication, access control, and message security. The goal of DDS security is to prevent unauthorized access to data in the global data space shared by DDS applications. Built-in security capabilities include X.509 authentication, access control configuration, and encryption/message authentication algorithms.
Arla Foods @ ARC Forum March 2016 - I4.0 & PackMLArne Svendsen
This presentation discusses Industry 4.0 and how it applies to Arla Foods' supply chain. It provides a real-world example of how Arla implemented PackML, an open interface standard, to more easily integrate packaging lines from multiple vendors. For Industry 4.0 to succeed, open standards like OPC-UA and PackML are needed to ensure "any application" can communicate with "any device". Widespread adoption of standards will reduce costs and allow for faster integration of new technologies.
Arla Foods is implementing Industry 4.0 concepts like the PackML standard to more easily integrate packaging equipment from multiple suppliers on their production lines. PackML provides a common interface that allows different machines to communicate their states, modes and other data to the line controller. This helps speed up line integration and reduces costs. Standards bodies are working to define open communication protocols like OPC-UA to connect devices. For Industry 4.0 to succeed, standards need to ensure systems from any vendor can communicate using a common language.
This document outlines the design process and team for a CMUX project. It includes sections on design methods used like affinity mapping, card sorting, mood boards, paper prototyping, and visual exploration. Teams are located in various Chinese cities and include roles like visual design, interaction design, and user research. Sample deliverables shown include prototypes, mood boards, and affinity diagrams. The document also discusses design tools used and includes examples of Cheetah fonts and avatars.
O documento discute o paradigma emergente da Ciência da Informação focado no usuário, conhecido como Sense-Making. Este novo paradigma enfatiza pesquisas qualitativas sobre as necessidades, interesses e uso da informação pelos usuários. A metodologia Sense-Making desenvolvida por Brenda Dervin tem sido amplamente utilizada para compreender como os usuários constroem significado.
The document discusses a project called "Prologue for Peace" which aims to promote mutual understanding and progress between people and establish peaceful coexistence. It argues that great leaders in history have tried but failed to achieve lasting world peace. For peace to be possible, nations must fight wars against issues like hunger and poverty instead of against each other, and there must be trust and goodwill between all people. The document calls for dedicating ourselves to promoting spiritual values and a message of peace around the world.
Effectively Improving Touchpoints - 3 functions of User Experience - Igor Far...Uxeria
1. The document discusses the importance of understanding users at different touchpoints of their experience. It emphasizes understanding their motivations, abilities, expectations, and emotions to ensure the right triggers are used.
2. Three key functions of experience are outlined as being value-driven, personalized, and positive. Companies should understand the values of users and create emotional connections.
3. A behavioral model is presented that states behavior is determined by motivation, ability, and triggers. Motivation and ability can vary by context, so triggers need to account for the user's state.
The document discusses resources available in Calgary for those laid off or in need of assistance. It notes that thousands have been laid off and everyone knows someone impacted. It provides information on where to go for help, including government departments like Alberta Human Services and Services Alberta that offer tips, programs, and services related to employment insurance, taxes, and entrepreneurship. Additional resources mentioned are Facebook and LinkedIn groups and Meetup groups where people can connect to talk, ask questions, and let their networks know about available assistance programs.
Great piece by Paul Wallace (Former Euro Economics Editor at The Economist) on Reuters.com today. Thought I’d share it and some of my thoughts as it’s on point with some of the main ideas that help guide my research.
http://www.franksanpietro.com/silence-is-golden/
Personas are used across a wide variety of design specialties, from UX to Information Design to Industrial Design. They’re often a key deliverable of the discovery phase of most projects, and are used to inspire empathy in the minds of the people who will be designing for them.
But after the discovery phase, the personas often die. And they die without ceremony. No tears are shed, there’s no funeral; it’s rare that there’s even an acknowledgement of their passing.
For a tool that’s meant to create empathy, does this seem particularly non-empathic?
This talk explores the utility of personas as a part of the design process, and how we could perhaps use them differently. (This description is as morbid as it gets.)
The document discusses research conducted to design a new itinerant museum service concept that would make museums more accessible to different user groups. Interviews and questionnaires with potential users found that people want museums closer to home with flexible hours and would be interested in a traveling museum that brings artifacts and exhibitions directly to communities. The research also benchmarked existing mobile museum services and identified families, older adults, people with disabilities, and rural residents as key target user groups for a new itinerant museum service.
Big Data Ecosystem - 1000 Simulated DronesEspeo Software
A description of a complete Big Data ecosystem that can be used for operations on huge collections of data - even up to gigabytes of data per second, and a few hundred thousand customers connected in the same moment. The ecosystem can be upgraded with additional Apache tools: Apache Flume, Ambari, Mesos, Yarn.
Kalyani Technologies provides IT and security solutions and services. It has experience implementing projects for large companies across various industries. It offers managed IT services, network solutions, safety and security systems, and shared IT services. Kalyani Technologies has partnerships with world-class brands and aims to deliver high-quality, customized solutions through a consultative approach.
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
PagerDuty deployed Splunk Cloud running on AWS to gain end-to-end visibility across their operations and enhance their security and compliance efforts. With Splunk, PagerDuty sped incident investigations, provided analysts with rich context for decision making, and reduced costs by 30% over their previous solution. Splunk Cloud provided PagerDuty with security, real-time monitoring, compliance reporting, and insights for engineering and operations across their AWS environment.
Splunk for Industrial Data and the Internet of ThingsSplunk
Splunk software provides a scalable and versatile platform for machine data generated by all of the devices, control systems, sensors, SCADA, networks, applications and end users connected by today's networks. In this session we will discuss and demo how you can use Splunk software to gain insights into machine data generated by devices and control systems. We’ll cover common themes in use cases, and show you how to access the free apps and add-ons that simplify the connection and collection of data from both industrial systems and the Internet of Things. In addition we will introduce you to Splunk’s growing ecosystem of IoT and Industrial focused technology partners.
This document discusses how Splunk provides value across IT operations, application delivery, business analytics, industrial data/IoT, and security/compliance. It highlights Splunk's capabilities for operational visibility, powerful developer platform, extensibility, and ecosystem for industrial/IoT data. An example deployment for oil and gas operations is shown. The document argues that a new approach to ICS/OT security is needed to analyze all relevant data and leverage threat intelligence. Splunk provides an application for enterprise security focused on ICS/OT environments.
Desarrollo Software Miramón 4 S.L. is a technology-based company that provides software development and testing services. It has over 20 engineers specializing in various areas including telecommunications, information technology, and engineering. The company focuses on developing robust, functional projects on time for customers in sectors like transport, automation, and energy. It prides itself on repeatable automatic testing and expertise in safety standards to ensure high product quality.
On the Application of AI for Failure Management: Problems, Solutions and Algo...Jorge Cardoso
Artificial Intelligence for IT Operations (AIOps) is a class of software which targets the automation of operational tasks through machine learning technologies. ML algorithms are typically used to support tasks such as anomaly detection, root-causes analysis, failure prevention, failure prediction, and system remediation. AIOps is gaining an increasing interest from the industry due to the exponential growth of IT operations and the complexity of new technology. Modern applications are assembled from hundreds of dependent microservices distributed across many cloud platforms, leading to extremely complex software systems. Studies show that cloud environments are now too complex to be managed solely by humans. This talk discusses various AIOps problems we have addressed over the years and gives a sketch of the solutions and algorithms we have implemented. Interesting problems include hypervisor anomaly detection, root-cause analysis of software service failures using application logs, multi-modal anomaly detection, root-cause analysis using distributed traces, and verification of virtual private cloud networks.
This document provides an overview of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS), including fundamentals, evolution over time, vulnerabilities, security frameworks, good practices, and resources. It defines SCADA/ICS, describes how they have become more interconnected, lists vulnerabilities like outdated systems and remote access, outlines security standards like NIST and NERC, recommends practices like segmentation and patching, and provides example frameworks and resources.
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
Travis Perkins has a complex hybrid IT infrastructure and is in midst of migrating to the cloud. This session will outline the pitfalls from their initial infrastructure-heavy ‘legacy SOC’ approach with a legacy SIEM and the success they gained when they moved to a cloud-based, data-driven ‘lean SOC’.
[Webinar] Software: The Lifeblood of any Medical DeviceICS
This document provides an overview and agenda for a presentation on embedded medical software platforms for global markets. It discusses BlackBerry Technology Solutions (BTS) and its QNX and Certicom divisions. It covers healthcare trends like increasing device complexity and connectivity. Software platform considerations for medical devices are outlined, including reliability, safety and security. An overview of ICS and its Qt application development framework is also provided. User experience and human factors are discussed.
Building cybersecurity transparency with clients using compliance automation...ELEKS
Building cybersecurity transparency with clients using compliance automation tools by Iurii Garasym — Chief Information Officer at ELEKS
In this presentation you can dive into the complexities of managing third-party relationships and highlight the importance of proactive cybersecurity reporting driven by vendors.
NetIQ Solutions for the Data Center
IT Operations Management Solution
IT Infrastructure & Operations Executives
NetIQ AppManager
AppManager helps with:
• Monitoring all the hardware, infrastructure, systems and
applications used to deliver IT services to the business.
• Troubleshooting and resolving IT problems faster
• Reducing monitoring gaps
• Tackling IT problems before they impact service
NetIQ Operations Center: Getting the “big picture”
The document discusses several IoT security and privacy considerations, including using privacy by design principles to embed privacy into systems from the start, establishing accountability standards and open technology standards to build trust, and addressing common problems like lack of developer security experience, insecure communication protocols, and ensuring secure firmware updates throughout the lifecycle of IoT devices.
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
A presentation about Industrial IoT, the value chain and real-world use cases; how to create value with IoT at your organization with an emphasis on predictive maintenance (bearing fault detection).
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
Supervised Active Intelligence: an innovative approach to Automated Incident Response based on Machine Learning, leveraging orchestration, automated playbooks and integration with existing Security Ecosystem
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
This document provides lessons learned from implementing Active Directory domains in control system environments. It covers topics like time synchronization, DNS, Active Directory replication, domain controller maintenance, backup and restore, user and group guidelines, and ICS group policy. The key lessons are: accurate time sync is critical; DNS configuration on domain controllers must include the loopback address; Active Directory replication links need to be properly configured; flexible single master operations roles should be transferred before domain controller maintenance; individual user accounts should be used instead of shared administrator accounts; and group policy can be used to apply security settings to control systems. The presentation provides guidance on best practices, common problems encountered, and their solutions.
Similar to WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation and IT (20)
A good IT (and other technology) governance process, is an opportunity to involve the workforce fully and create positive change dynamics (see also Appreciative Inquiry)
Atelier: les Responsabilités, Compétences et Comportements du Leadership dans la formation "Leadership pour un fonctionnement d'équipe efficace" de Learning Tree International France
Déterminer son profil émotionnel selon Richard DavidsonValentijn de Leeuw
Richard Davidson, neuro scientifique dans le domaine de l'émotion à établi six axes qui décrivent le profil émotionnel. Le questionnaire dans son livre "The emotional life of your brain" est traduit en français, et accompagné d'une brève explication et d'une interprétation. Pour plus de détails, se référer au livre
Résumé des livres de Christophe André comment gérer les personnalités difficiles. Comment ces personnes voient le monde. Conseils pratiques pour le manager, le collaborateur ou le conjoint
This performance appraisal form contains sections for employees and their managers to evaluate performance over a given period. The employee lists key responsibilities and major accomplishments, which the manager then comments on and rates. The employee also notes any disappointments. The manager provides feedback on 16 performance criteria, such as reliability, initiative, and communication skills. Goals are set for the next review period. Once completed, both parties sign and date the evaluation.
Summary of Davidson's Emotional Styles, and his assessment to determine
- how attentive we are
- how self-aware
- how resilient we are
- if our outlook is positive and in how far
- how socially intuitive we are and
- how sensitive we are to social context.
followed by a summary of what extremes on the scales of these styles can mean in practice.
Slides used to guide the discussion during MESA workshop at ARC Europe Industry Forum in Amsterdam, March 3rd, 2016.
Includes notes of the discussion. Subjects: challenges in MOM/MES: complexity related to supply chain, manufacturing and new product introduction. Organizational alignment and governance.
Emotional intelligence skills in a leadership context. Distinguishing skills for excellent leaders are highlighted. Includes references and further reading.
My preferred books on management, leadership applied psychology and emotional...Valentijn de Leeuw
Boring list, but contains great reading. The powerpoint file with management literature I share, also contains comments about the content and recommendations for reading
Screen shots and Flip Charts during Learning Tree 906 in EnglishValentijn de Leeuw
Screen shots of hand drawns and flip charts made during a Learning Tree 906 training, "Management Techniques for an IT Environment, by Valentijn de Leeuw.
All pictures are within a single Word document for ease of up and download. For comments and questions please contact me at v.deleeuw@controlchaingroup.com
Management role model: improvement opportunities by MintzbergValentijn de Leeuw
Mintzberg's role model aims to describe how we work as managers. Mintzberg suggests to reflect on our current management, to improve. This short presentation summarizes the potential for improvement as described in his article "The Manager's Job: Folklore and Fact". For now this article is in French. I will
an English version too.
Valentijn de Leeuw, PARTICEPS sarl, v.deleeuw@controlchaingroup.com
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
6. Wish list for efficiency improvement
• Seamless communication
• Plug and Play (or Plug and Produce)
• Autonomous systems
• Robust and resilient system behavior
• Intrinsic safety and security
• Maximize shared standards
V de Leeuw, ARC Advisory Group, 2016
Creating time for concepts, standards, design, value creation
8. 3rd Party
Services
Plant Systems
and Assets
Enterprise Systems
Connected
Enterprise
Flexible Worker
Schedules
Location/Nav Services
Video Presence
(Expert Help)
Augmented Reality
Smart
Tools
Connected Worker
Collaboration
Self-Planning
Systems
Smart Metrology
Smart Logistics
Smart
Carriers
RFID
Smart Warehouse
Remote
Monitoring & Services
Connectivity
Platform
Advanced Analytics
Apps
Connected
Machine
Smart Containers
Advanced Analytics
Logistics
Services
Connected
Supply Chain
Value Chain
Smart Consumers
Smart Machines
IIoT Smart
Module
Smart
Products
Smart
Components
Connected
Products
Vision Plug & Play IoT
V de Leeuw, ARC Advisory Group, 2016
9. Flexible Worker
Schedules
Location/Nav Services
Video Presence
(Expert Help)
Augmented Reality
Smart
Tools
Connected Worker
Collaboration
Smart Metrology
Smart Machines
IIoT Smart
Module
Plug & Play tools and instruments
V de Leeuw, ARC Advisory Group, 2016
10. Plug & Play tools and instruments
• Standardized parameter sets (NAMUR)
– Basic: minimum standard set, specification required
– Advanced: default values, optional use
– Expert: default values, optional use
– Standardized diagnosis parameters (NE107)
• Essential issues
– standard devices (NE131)
– self-monitoring and diagnosis (NE107)
11. Plug & Play automation components
• ExxonMobil initiative “It Just Happens”
• Motivation
– High cost of ‘technology refresh’ limits access to leading
edge performance
– Expensive to integrate third-party components
– Application market liquidity is limited; lack of
sophisticated development tools
– Solutions are bundled versus best-in-class
– Security model is not intrinsic; bolted-on, not built-in
Source: Don Bartusiak, ExxonMobil, ARC Forum Orlando 2016
12. real-time service bus
DCS
DCN
Analyzer
Machinery
Monitoring
Safety
System
s
Wireless
Gateway
PLC
Core
Real-Time
Functions
Open Systems Architecture Vision
A system of systems …
Network
Services
New
New
Ne
w
Migration
Transactional Services
• Maintenance
• Planning & Scheduling
• Enterprise Data Analytics
Cloud Services
• Predictive Maintenance
• Global Data Analytics
• Remote Operations
• Fleet Optimization
App A App B
Operations Platform
High-Availability, Real-Time
Advanced Computing Platform
L1 L3
Functions
OT Data Center
L1 L3 Functions
I/O Processing
Regulatory Control
Application Hosting
L4 Functions
IT Data Center
Existin
g
New
Legen
d
Business
Platform
Transactional
Computing
Platform
DCN
RTAC Platform
Source: Don Bartusiak, ExxonMobil, ARC Forum Orlando 2016
13. Connected
Enterprise
IIoT Smart
Module
Plug & Play Machine Integration
Plant Systems
and Assets
Enterprise Systems
Connected
Enterprise
V de Leeuw, ARC Advisory Group, 2016
• Semantic interoperability
– Domain specific dictionaries (ontologies)
• Away with the integration head-ache
• Enable modular production
14. ISA 88 PackML as a USB Connector
LINE Control
PackML
LINE Control
PackML PackML
Arne Svendson, Arla Foods ARC’s Europe Forum 2016
15. 3rd Party
Services
Plant Systems
and Assets
Enterprise Systems
Connected
Enterprise
Flexible Worker
Schedules
Location/Nav Services
Video Presence
(Expert Help)
Augmented Reality
Smart
Tools
Connected Worker
Collaboration
Smart Metrology
Connected
Machine
Connected
Supply Chain
Smart Machines
IIoT Smart
Module
Connected
Products
Plug & Play IoT machine
Remote
Monitoring & Services
Connectivity
Platform
Advanced Analytics
Apps
Self-Planning
Systems
V de Leeuw, ARC Advisory Group, 2016
16. 3rd Party
Services
Plant Systems
and Assets
Enterprise Systems
Connected
Enterprise
Flexible Worker
Schedules
Location/Nav Services
Video Presence
(Expert Help)
Augmented Reality
Smart
Tools
Connected Worker
Collaboration
Smart Metrology
Connected
Machine
Connected
Supply Chain
Smart Machines
IIoT Smart
Module
Connected
Products
Plug & Play IoT Product
Remote
Monitoring & Services
Connectivity
Platform
Advanced Analytics
Apps
Self-Planning
Systems
Smart
Products
Smart
Components
V de Leeuw, ARC Advisory Group, 2016
17. Plug & Play IoT Services
Secure data collection over the cloud
Reducing time to decision
increases value
Kerry O’Sullivan, Outotec, OSIsoft EMEA User Conference 2015
18. 3rd Party
Services
Plant Systems
and Assets
Enterprise Systems
Connected
Enterprise
Flexible Worker
Schedules
Location/Nav Services
Video Presence
(Expert Help)
Augmented Reality
Smart
Tools
Connected Worker
Collaboration
Smart Metrology
Connected
Machine
Connected
Supply Chain
Smart Machines
IIoT Smart
Module
Connected
Products
P&P Logistics, WH
Remote
Monitoring & Services
Connectivity
Platform
Advanced Analytics
Apps
Self-Planning
Systems
Smart
Products
Smart
Components
Smart Logistics
Smart
Carriers
RFID
Smart Warehouse
Smart Containers
V de Leeuw, ARC Advisory Group, 2016
22. Principles – from experience
• Corporate safety/security excellence
• Managed
• Competence
• Culture
• Objectives and KPI’s
• Incentives
• Independent audits
See also Total’s
Organizational
Fundamentals for the
Process Industries
V de Leeuw, ARC Advisory Group, 2016
24. Risk management Threats
Assets
Activities
Security
Assurance
Processes
And Practices
produce
Evaluations
Prove
Confidence
Operators
demand
Stakeholders
require
Vulnerabilities
exploit
Layers of
Protection
reduce
Ccountered by
Risks
forSecurity assurance
Risk evaluation
Balancing residual risk and means deployed
Source: Bertrand Rique, controlchaingroup.netV de Leeuw, ARC Advisory Group, 2016
25. Layers of protection
• Safety by design
• Not fixing problems!
• Seems expensive until the incident
happens
Picture: http://bit.ly/1Ml1jPU
26. Layers of ProtectionPublic emergency plan
Site emergency plan
Physical protection (retention)
Physical protection (containment)
Safety/Security Systems
Alarms, Operator Intervention
Control
Installation
Limitative
Corrective
Preventative Probable, Low
severity
Improbable, high
severity
Process and
functional
safety view
Source: Bertrand Rique, controlchaingroup.netV de Leeuw, ARC Advisory Group, 2016
27. Process SafetyPublic emergency plan
Site emergency plan
Physical protection (retention)
Physical protection (containment)
Safety Instrumented Systems
Alarms, Operator Intervention
Control
Installation
Limitative
Corrective
Preventative
Human factors
Alarm Management
HMI Design
Process, equipment,
Control design
Safety system
design
V de Leeuw, ARC Advisory Group, 2016
28. Functional safety by Design
• Safety system design
• Alarm management
• HMI Design
• Process, equipment and control design
– Procedural automation
V de Leeuw, ARC Advisory Group, 2016
29. Applicable standards
IEC 61508
Framework
IEC 61511
Process industries
IEC 62061
Machines
IEC 61513
Nuclear
ISO 26262
Automotive
Rail
EN 50126, EN 50128
EN 50129
IEC 61800
Variable speed
control
ISO 13849
E/E low complex
machine (EN954)
EN 60079
Equipment in
Expl. atmospheres
EN 50402
Gas detection
EN 50271
Soft gas detectors
Sources: Bertrand Rique, Controlchaingroup.net
Valentijn de Leeuw, Thomas Menze, ARC Europe
Updated for security
ISA 106
Procedural Automation
ISA 101
HMI
V de Leeuw, ARC Advisory Group, 2016
30. IT SecurityPublic emergency plan
Site emergency plan
Physical protection (retention)
Physical protection (containment)
Reactive automated protection
Alarms, Operator Intervention
Control
Installation
Limitative
Corrective
Preventative
Human factors
Detection, Alarms
Backup, Recovery
Computer, controller
fieldbus and
network design
Hot swap,
shutdown, cut-
off,…
Security /
privacy view
V de Leeuw, ARC Advisory Group, 2016
31. Applicable standards
• General IT (L5-L3)
– ISO 27000 series
• Automation, industrial systems and
networks (L5-L1)
– ISA 99 / IEC 62443
• Specialized
Sources: Bertrand Rique, controlchaingroup.net
Hudson Cybertec http://bit.ly/1YX7hhbV de Leeuw, ARC Advisory Group, 2016
32. Common aspects
• Leadership, organization and accountability
• Safe/secure work procedures and work permits (and
following them)
• Safe work practices
• Proper plant and equipment status
• Proper operational communications
• Operations discipline and capability
• Common risk evaluation and management
Total’s Organizational
Fundamentals for the
Process Industries
ARC
V de Leeuw, ARC Advisory Group, 2016
Sources: Van Roost, Total, ARC Europe forum 2010
Eric Cosman, ARC, 2016, http://bit.ly/1PaxC3Z
33. Smart Manufacturing and Services
• New standardization ongoing
– IEEE P2413 Reference Architecture (http://bit.ly/1U5gViK)
• protection, security, privacy and safety
– AIOTI high-level architecture and semantic interoperability
with security and privacy (http://bit.ly/1SQGLWk)
– Industrial Data Space (http://bit.ly/1QVKiBw)
• Standardization for privacy and ownership
• Complimentary to I40 and Smart Services “Welt” (http://bit.ly/1ppJXwS)
– And more
Picture: http://bit.ly/1PayghUV de Leeuw, ARC Advisory Group, 2016
35. Shape your world!
• Design for robustness, safety and security
– Require the same from suppliers and partners
– Interoperability, intrinsic safety and security
• Simplify, standardize, apply standards
– WIB, NAMUR, ISA, ISO, …
• Innovate, push to innovate and robustify
– Common requirements: NAMUR,..
– ExxonMobil It Just Happens, …
– Add new value, embrace Smart Manufacturing
V de Leeuw, ARC Advisory Group, 2016
36. Disclaimer
• This presentation has been made with
rigor and attention but has not been
audited, and small errors may have
crept in.
• The presentation is not exhaustive.
V de Leeuw, ARC Advisory Group, 2016