Hi [[ session.user.profile.firstName ]]
Sort by:
    • Connectivity: The Key to IIoT Data Communications
      Connectivity: The Key to IIoT Data Communications Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc. Recorded: Apr 5 2017 5:00 pm UTC 61 mins
    • Connectivity: The Key to IoT Data Communications
      Unlocking Interoperability via the Industrial Internet Connectivity Framework

      From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

      The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.

      Read more >
    • Advances in IIoT Made Possible by Innovations in 5G, Virtualization & the Cloud
      Advances in IIoT Made Possible by Innovations in 5G, Virtualization & the Cloud Paul Parker-Johnson from ACG Research, Ken Hosac from Cradlepoint, Dave Nowoswiat from Nokia & Prodip Sen from HPE Recorded: May 31 2017 6:50 pm UTC 68 mins
    • An ACG Analysis, Research Brief and Webinar Developed in Partnership with RCR Wireless. Concurrent innovations in 5G radio access and in network control and application delivery using virtualization and the cloud at multiple layers of the ‘stack’ will bring services to market not feasible in the past. This fortunate combination makes the arrival of 5G especially inspiring. Evaluating several of the more impactful new radio access innovations, the way they benefit from virtualization and the cloud in managing the network and and delivering new applications, and examining the benefits these enhancements bring to stakeholders in the 5G and IIoT ecosystems is the focus of this research.

      One area of innovations in 5G and IIoT is to support a massive scale of connectivity for ‘things’ for commercial and industrial use. In many cases use of low power access technologies such as LoRa is integral to supporting new applications at scale. In other cases innovative data distribution mechanisms such as Coordinated Multi-Point communications (or CoMP) to support the use of diverse types of end-stations are crucial to bringing the versatility, efficiency and scale to IIoT that some applications need. In parallel support for highly reliable and ultra-low latency communication for applications in transportation, health care, public safety and other vertical sectors will harness new frequency bands and transmission management techniques to accomplish their functions.

      This research brief and webinar from ACG Research will examine the symbiosis between 5G radio access innovations and the technologies of virtualization and the cloud for delivering IIoT at scale in ways that have not been possible in the past.

      Read more >
    • Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring
      Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring Terrence Barr, Electric Imp; Nisarg Desai, Globalsign; Andrew Ginter, Waterfall Security Solutions Recorded: Apr 18 2017 5:00 pm UTC 62 mins
    • Industrial Internet Security in Action --
      Interoperable IIoT Security Event Monitoring
      (Inlcuding a preview of security interop demo at Hannover Messe)

      With the rise of the Industrial Internet of Things and Industrie 4.0, manufacturers are adding more connected devices and sharing operation data with IT systems within their own factories and businesses, and they are extending information exchange across their entire value chain. This increased digitization offers a host of benefits to businesses, partners, suppliers and customers. But such connectivity must not itself put sensitive equipment at risk. Security is important within a single manufacturers’ plants, and across every participant in the value chain. Since there is no single, homogeneous security environment, multiple companies and systems that need to work together.

      JOIN THE WEBINAR TO LEARN:
      -How a strong Identity and Root-of-Trust forms the foundation of IoT Security

      -How to securely connect systems from the operational domain (OT), to become more accessible to the information technology (IT) domain.

      -How to implement end-to-end security from device to cloud

      -How 24 IIC Members will demonstrate secure, interoperable IIoT event monitoring at Hannover Messe

      Read more >
    • What is the Best Connectivity Solution for Your IIoT Systems?
      What is the Best Connectivity Solution for Your IIoT Systems? Andrew Watson, OMG; Angelo Corsaro, PrismTech; Gerardo Pardo-Castellote, RTI; Nina Tucker, Twin Oaks Computing Recorded: Feb 22 2017 4:00 pm UTC 60 mins
    • Today's computing infrastructure is changing dramatically to support new requirements in design and structure. This is no more evident than in the Internet of Things, where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come.

      These new IoT systems need data-centric technology that directly addresses real-time systems to explicitly manage the communications “data model.” No matter what application – from financial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation – industries need solutions to find right data then communicates it to its intended destination in a reliable, flexible, fast, and secure manner.

      To learn more about the proven standard for data-connectivity in mission- and business-critical systems join OMG's webinar featuring experts from the leading DDS middleware vendors; PrismTech, RTI and Twin Oaks Computing

      Read more >
    • DDS Technical Overview Part II - Applying DDS QoS to Solve Real World Problems
      DDS Technical Overview Part II - Applying DDS QoS to Solve Real World Problems Andrew Watson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Upcoming: Sep 14 2017 3:00 pm UTC 60 mins
    • Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

      To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

      This webinar, Part II of the OMG DDS Webinar series, will cover in detail the mechanisms available in DDS to meet challenging real-world application requirements; from discovery to state management, information consistency, data durability, reliability and scalable information distribution. With over 20 different quality-of-service (Qos) policies DDS provides ready-made configurable patterns that can be used to meet most of these use-cases. Learn to leverage DDS Qos and patterns to simplify your application code and increase the robustness of your system. Presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group.

      Part I: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technology and co-chair of OMG's DDS Special Interest Group, is available here https://www.brighttalk.com/webcast/12231/252365

      Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President of Twin Oaks Computing here: https://www.brighttalk.com/webcast/12231/252391

      Read more >
    • DDS Technical Overview Part III - Using DDS to Secure Data Communications
      DDS Technical Overview Part III - Using DDS to Secure Data Communications Andrew Watson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Upcoming: Nov 16 2017 4:00 pm UTC 60 mins
    • Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

      To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical oveview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

      This webinar, Part III of the OMG DDS Webinar series, will take an in-depth look at the latest advances in the DDS standards to meet the demanding cyber-security requirements of today’s industrial connected systems. From authentication and access control to integrity and encryption, learn how to leverage DDS Security features to secure your connected system against cyber attacks, while maintaining a flexible, scalable architecture. Presented by Nina Tucker, Vice President of Twin Oaks Computing.

      Part I of the OMG DDS Webinar Series: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technologies and co-chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252365

      Part II of the OMG DDS Webinar series: Applying DDS QoS to Solve Real-World Problems, presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252387

      Read more >
    • Machine Learning and Time Sensitive Networking in the Smart Factory
      Machine Learning and Time Sensitive Networking in the Smart Factory Paul Didier, Internet of Things Solutions Architect at Cisco; Dan Isaacs, Director Connected Systems at Xilinx Recorded: Mar 30 2017 4:00 pm UTC 58 mins
    • Machine Learning and Time Sensitive Networking in the Smart Factory: How the IIoT makes critical data available when & where it is needed.

      In today’s digital age, the rapid emergence of IoT is changing operations throughout the manufacturing domain. Machines and systems have become more intelligent and more connected, and the proliferation of sensors generates a non-stop flow of data. This wealth of actionable information provides the key to unlocking higher efficiency and increased reliability of machines and systems. The opportunity lies in harvesting the data.

      Join IIoT experts from the Industrial Internet Consortium to discover exciting developments in the field of machine learning -- products and systems taking action on their own -- and how this self-optimization will play a pivotal role in enhancing the intelligence of the factory. We will also showcase the Time Sensitive Networking (TSN) testbed and the technology used to support real-time control and synchronization of high performance machines over a single, standard Ethernet network.

      What you will learn:
      -How IIoT connectivity has enabled data from the operational domain (OT), to become more accessible to the information technology (IT) domain.

      -How Machine Learning will lead to real-time, self-optimization of Industrial Systems and help reduce downtime via predictive and preventative maintenance.

      -How TSN capabilities are extending standard Ethernet (IEEE 802.1 & 802.3) to enable more devices, applications, and deterministic potential to manufacturing networks.

      Read more >
    • Building Blocks for Securing the Industrial Internet: IISF
      Building Blocks for Securing the Industrial Internet: IISF Dr. Jesus Molina, Security Consultant, Fujitsu; Dan Isaacs, Director Connected Systems at Xilinx Recorded: Jan 26 2017 4:00 pm UTC 54 mins
    • Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

      Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF).

      On January 26, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will provide an introduction to the approach needed to secure industrial systems and offer insights gained from one of our testbeds encompassing several security technologies.

      Join the webinar to learn:
      • The importance of securing the IIoT and why it differs from securing the IoT
      • The value of securing industrial Internet systems
      • Recommendations for engaging OT about developing an IIoT strategy

      Don’t miss this webinar – first in a series of monthly webinars offered by the Industrial Internet Consortium.

      *Upcoming Webinars*
      February: Securing IIoT Endpoints
      March: Securing the Smart Factory

      Read more >
    • DDS Technical Overview Part I - Introduction to DDS and Key Abstractions
      DDS Technical Overview Part I - Introduction to DDS and Key Abstractions Andrew Watson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Recorded: May 18 2017 3:00 pm UTC 61 mins
    • Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow, DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

      To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group is offering this DDS Technical Overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

      Part I of the OMG DDS Webinar Series will get you started with DDS. We will (1) cover in great details DDS’ key abstractions, (2) introduce the essence of DDS-based data-centric and modular architectures, and (3) clearly position DDS with respect to messaging technologies. After attending this webcast you will know the fundamentals required to start using DDS in your next project. Presented by Angelo Corsaro, Ph.D., CTO at ADLINK Technology and Co-Chair of the OMG's DDS Special Interest Group.

      Part II: DDS QoS to Solve Real World Problems presented by Gerardo Pardo-Castellote, CTO of RTI and Co-Chair of OMG's DDS Special Interest Group is available here: https://www.brighttalk.com/webcast/12231/252387

      Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President, Twin Oaks Computing is available here: https://www.brighttalk.com/webcast/12231/252391

      Read more >
    • The Industrial Internet of Things: Rise of the Machines
      The Industrial Internet of Things: Rise of the Machines IoT expert, Bill Roberts and IIA Research Director, Dan Magestro Recorded: Sep 22 2016 4:00 pm UTC 61 mins
    • Presented by IoT expert, Bill Roberts, this webinar explores how the Industrial Internet of Things (IIoT) is having a dramatic impact on how manufacturers and service providers operate. From the factory floor to a distributed energy generation facility to anywhere a critical piece of equipment operates, machine data holds enormous potential to drive high levels of operational efficiency and unlock new service innovations.  This blending of operational technologies (OT) with Information Technology (IT) has created challenges with the data, the analytics lifecycle and a deep thinking into the roles of personnel.  A robust IoT analytics lifecycle can play a critical role in helping organizations separate the relevant signals from the noise in IIoT data, gain real time critical insights, and drive appropriate, timely action to realize the promised value of IIoT.  This session will explore these topics and offer insights on pursuing a successful industrial IoT strategy that leverages a robust analytics lifecycle.

      Read more >
    • Evolving the Industrial IoT Into Strategic Advantage
      Evolving the Industrial IoT Into Strategic Advantage Bill Roberts, Director, Global IoT Practice, SAS; Ted Connell, Director, Solution Architect Group, Intel Recorded: Feb 15 2017 7:00 pm UTC 56 mins
    • Heavy industry was first to arrive at the IoT party, quickly recognizing the potential to augment existing processes and establish new protocols. As a result, organizations that embraced the industrial internet of things (IIoT) have been at the forefront of fine-tuning applications and establishing best practices. And while many of those practices have turned out to be impactful, it’s becoming increasingly apparent that the opportunity is much bigger with predictive analytics.

      We’ve entered a perfect storm where the falling costs of capturing, processing and analyzing data coincide with the explosion of data streams generated by millions of pieces of connected equipment, devices and systems. And the same technology that created the perfect storm has empowered customers with near-instant data and instantaneous engagement with each other and also with your organization. So the opportunities extend beyond tactical process improvements and have become both strategic and enterprise-wide.

      Recognizing and capitalizing on the opportunities requires an evolution of skills and mindset, made possible with key technology relationships. The Industrial IoT collaboration between SAS and Intel enables organizations to capture, process and analyze data. The end result is the ability to evolve their strategic advantage and realize the full value of their IIoT data.

      Tune in to this webinar to gain insights and best practices for evolving the industrial IoT into strategic advantage for your organization.

      Read more >
    • Protecting the ICS through Segmentation
      Protecting the ICS through Segmentation Lionel Jacobs - Sr. Architect, Industrial Controls Systems - Palo Alto Networks Recorded: Oct 19 2016 6:00 pm UTC 50 mins
    • Segmentation is a crucial element to modern network design and accepted widely as a recommended best practice. It is believed that many of the current successful cyber-attacks against ICS/SCADA infrastructures could have been prevented or contained if proper segmentation had been in place.

      Unfortunately, many existing ICS/SCADA systems predate modern best practices. Owner-operators are challenged to face cybersecurity risks with outdated defense mechanisms. Implemented during an era where air gaps existed, the use of commercially available off-the-shelf products (COTS) have connected the serial based on brownfield systems into the industrial Internet of things (IIoT). In doing so exposing the ICS/SCADA to the same threats and perils as its enterprise counterpart. Come join us as we discuss ways and techniques that Palo Alto Networks NGFW can be used to achieve ideal network segmentation.

      Read more >
    • Why Business Architecture Now, Not Later? A Lesson from Crisis Management
      Why Business Architecture Now, Not Later? A Lesson from Crisis Management William Ulrich, President, Business Architecture Guild Recorded: Apr 13 2017 4:00 pm UTC 60 mins
    • The inability to track customers, partners, accounts, agreements, and policies across complex business ecosystems triggers compliance failures and crisis management challenges that degrade brand value, undermine investor confidence, and chip away at consumer loyalty. Executives have found that efforts to address these shortcomings are more time consuming, error prone, and expensive than they could have imagine. Ironically, these same executives either refuse to sponsor business architecture efforts or are forcing business architecture proponents to “prove” its value on small scale, narrowly defined initiatives. This BrightTALK discusses crisis response challenges at a major financial institution and the role business architecture should play in addressing a variety of related scenarios across a multitude of industry sectors.

      Read more >