Hi [[ session.user.profile.firstName ]]

The Buzz Around Cognitive Computing in Energy & Utilities

Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
Recorded Jun 26 2018 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM
Presentation preview: The Buzz Around Cognitive Computing in Energy & Utilities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trustworthiness: Evolving IT Security to support Digital Transformation Jan 28 2020 4:00 pm UTC 60 mins
    Jim Morrish, Transforma Insights; Bassam Zarkout, IGnPower Inc.
    Digital Transformation (DX) is the strategic realignment associated with the application of digital technologies towards business, industrial models and processes.

    Trustworthiness is the degree to which an industrial system can be relied on to do what it should, and not to do things that it shouldn’t. During this webinar we will explore why Trustworthiness (especially security) is such an important concept, considering that historically OT (Operational Technology) systems were designed to be resilient, reliable and very safe, whilst IT (Information Technology) systems have been built to be secure, private and reasonably reliable.

    With the advent of IoT and Digital Transformation, the requirements of IT and OT become intertwined. Different industrial environments have their own unique challenges, and as they are digitally transformed, they become more connected, and potentially more vulnerable. The trustworthiness of industrial environments need to be handled differently than the traditional IT environment and newly IT/OT-converged systems must meet trustworthiness considerations associated with each.

    Bottom line: Failure to address the trustworthiness issues of IoT systems (especially security) can put the organization’s DX strategy at risk, resulting in serious negative consequences such as missed market opportunities and wasted critical investments in DX initiatives.

    In this webinar we will explore:
    •What is Trustworthiness?
    •How much trustworthiness do you need?
    •The trustworthiness journey
    •Best practice for managing trustworthiness
  • Making your Power Grid Smart Recorded: Nov 6 2019 59 mins
    Michael Enescu, Visiting Scholar | Caltech Engineering & Applied Science Division
    The future of the energy industry is adaptive -- driven by analytics and intelligence. How do you get there?

    Energy adaptive networks and software defined power grids can be used to protect against natural disasters. Hear lessons learned from the 2018/19 California wildfires, and how focusing on power optimization, leveraging IoT and data in motion analytics, based on smart grid research in Optimal Power Flow at Caltech and Open Source collaboration can help transform your power grid.


    Featured speaker: Michael Enescu
    Visiting Scholar | Caltech Engineering & Applied Science Division
    Co-Founder and CEO, Energy Adaptive Networks
  • The Market Opportunity at the Edge of IoT Recorded: Nov 5 2019 47 mins
    Christian Renaud, Research Vice President, Internet of Things, 451 Research
    Digital transformation is causing organizations to revisit ‘Cloud First’ strategies. Where traditional IT workloads are rapidly migrating towards the cloud, the Internet of Things has a diverse set of best execution venues for IoT workloads from the devices themselves to the core. This webinar will walk through the multitude of edge, near-edge, and core locations, as well as the how and why industries are choosing these locations, based on years of end-user surveys. Finally, we will discuss the market opportunities for vendors of edge and near-edge solutions.
  • Industrial IoT: Digital Transformation for Industrial Technology End-Users Recorded: Oct 24 2019 60 mins
    Featured Speakers: 451 Research, NetApp, Wipro, Industrial Internet Consortium
    Digital Transformation means there is a lot of work to do. Whether your role encompasses manufacturing, energy, transportation, healthcare, mining or another industry -- how much would it improve your digital transformation outcomes if you could access tools and know-how from one, vendor neutral resource?

    This webinar will discuss where organizations are deploying IoT today and the specific problems they are solving. Speakers will discuss the state of the market, and how the Industrial Internet Consortium (IIC) is leveraging its diverse membership of enterprises, vendors, and service providers to help industrial technology users and their organizations solve their real-world problems.

    Join guest speakers from 451 Research, NetApp, Wipro Limited and IIC who will share insights and ideas for jumpstarting your digital transformation journey.

    Speakers:
    -Ian Hughes, Senior Analyst, Internet of Things at 451 Research
    -Madhu Pai, Director, Global IoT Partner Engineering, Wipro Limited
    -Russ Sagert, Director Business Development – Industrial Manufacturing / IoT, NetApp
    -Howard Kradjel, VP Industry Programs, Industrial Internet Consortium
  • The State of Industrial Cybersecurity: From Top Priority to Clear Roadmap Recorded: Oct 10 2019 60 mins
    Ekaterina Rudina and Dr. Jesus Molina
    In conversation with Dr. Jesus Molina, Director of Business Development at Waterfall Security Solutions, Ekaterina Rudina, System Analysts Team Lead at Kaspersky ICS CERT, will discuss the findings from Kaspersky's 2019 State of Industrial Cybersecurity report, as well as highlight real-life examples to help understand what is driving stakeholders to pay more attention to cybersecurity. The goal is to help industrial facilities create the best approach; to move from ad-hoc security investment to clear, well-defined OT cybersecurity processes.
  • Manufacturing Cybersecurity Survey Results Recorded: Jul 24 2019 56 mins
    Mark Hearn and Stephen Mellor
    Although connectivity in the Industrial Internet of Things (IIoT) promises to transform the manufacturing and production industry, nearly eight in ten organizations have experienced an IoT cyberattack in the past year. Mark Hearn, Director of IoT Security at Irdeto, explores Irdeto's recent Manufacturing Cybersecurity Survey results in conversation with Stephen Mellor, CTO of the Industrial Internet Consortium. This webinar will also highlight strategies to combat cyberattacks, including the importance of a multi-layered approach to cybersecurity.
  • OTA Infrastructure for Semi-Autonomous to Autonomous Systems Recorded: Jul 9 2019 39 mins
    Kai Hackbarth
    Kai Hackbarth, Evangelist at Bosch Software Innovations GmbH, discusses Over-the-Air updates and the role that Bosch and the Industrial Internet Consortium play in the industry in his presentation, "OTA Infrastructure for Semi-Autonomous to Autonomous Systems".
  • Get a True Sense of Security Maturity Recorded: Mar 18 2019 56 mins
    Ron Zahavi, Microsoft Azure IoT, & Sandy Carielli, Entrust Datacard
    The cybersecurity landscape is complex and ever-changing. Therefore, deciding where to focus your security resources can be a challenge. Security maturity modeling provides a path for communicating with business stakeholders and a strategic step to attaining the necessary support to move forward with a comprehensive security roadmap.

    The Industrial Internet Security Maturity Model (SSM)
    •Provides actionable guidance for specific IoT scenarios
    •Enables IoT providers to invest appropriately in security mechanisms to meet their requirements
    •Helps providers make intelligent choices about which mechanisms to use and how they fit together

    What is your Security Maturity Level?

    In this Webinar you will hear an overview of the Industrial Internet Consortium’s Security Maturity Model and a process for applying that model to:

    •Address your requirements and threat environment
    •Evaluate risks consistently
    •Identify the actions you need to take including
    -Process improvements
    -Security techniques
    -Security mechanisms
    •Learn from case studies and specific practical implementation examples
    •Make intelligent choices about which mechanisms to use and how they fit together
  • Intelligent Mining Enterprises -- Mine Smarter, Not Harder Recorded: Mar 13 2019 51 mins
    Co-presented by Kai Aldinger & Samir Damag, Solution Managers, IBU Mill Products & Mining, SAP
    The mining industry is experiencing dramatic changes as it enters the Digital Age. The industry realizes it needs to mine smarter, not harder. During this webinar, Mining Solutions Managers from SAP will take a look at innovations driving the industry, and how intelligent mining enterprises are applying technology to:

    • Make mining more predictable and safer
    • Collaborate among customers, suppliers, and workers
    • Enhance agility through real time decision support and integration of information technology with operational technology (IT/OT)
    • Improve productivity through automation
  • Interactive Panel: Intelligent Transport Systems Recorded: Feb 15 2019 61 mins
    Conal Deedy, Dr. Rajive Joshi, Christopher Miotke, Dr. Katy Salamati
    Global Event Series - Cary, NC, USA

    Moderator: Dr. Richard Soley, Executive Director, Industrial Internet Consortium
    Panelists:
    -Conal Deedy, Director of Connected Vehicle Services, Volvo Trucks NA
    -Dr. Rajive Joshi, Principal Solutions Architect, RTI
    -Christopher Miotke, Global Director, Automotive Autonomous Transportation, NetApp
    -Dr. Katy Salamati, Transportation SME, SAS
  • Case Study: Tata Consultancy Services Recorded: Feb 15 2019 19 mins
    Dr. Chellury (Ram) Sastry
    Dr, Chellury (Ram) Sastry of Tata Consultancy Services presents a case study on Energy Management Solution for Commercial Buildings and Industrial Facilities at the Global Event Series in Cary, NC, USA.
  • Case Study: Town of Cary, NC Recorded: Feb 15 2019 18 mins
    Terry Yates
    Terry Yates of the Town of Cary, NC presents a case study on Improving Response Time & Customer Experience Using Building Automation Systems at the Global Event Series in Cary, NC, USA.
  • SAS Keynote: Value Generation in the IoT Ecosystem Recorded: Feb 15 2019 25 mins
    Jason Mann, Ann Perreault
    Jason Mann of SAS and Ann Perreault of Honeywell present the SAS Keynote at the Global Event Series in Cary, NC, USA.
  • Interactive Panel: Smart Cities Infrastructures Recorded: Feb 15 2019 24 mins
    Tom Snyder, Ty Roberts, Christopher Beall, Jim Haskins, Jennifer Robinson
    Global Event Series - Cary, NC, USA

    Moderator: Tom Snyder, Executive Director, RIoT
    Panelists:
    -Ty Roberts, Vice President, Product Marketing, Networked Solutions, Itron
    -Christopher Beall, Account Executive, Building Clarity
    -Jim Haskins, Smart & Connected Communities Business Development Manager, Cisco
    -Jennifer Robinson, Director of Local Government Solutions, SAS
  • RIoT Keynote: Smart Cities, Smart Power Recorded: Feb 15 2019 30 mins
    Stan Schneider
    Stan Schneider of RTI presents the RIoT Keynote at the Global Event Series in Cary, NC, USA on February 15, 2019.
  • IIC Keynote: Automotive Trustworthiness: Road to Security Model Recorded: Feb 15 2019 31 mins
    Sven Schrecker
    Sven Schrecker of LHP Engineering Solutions presents the IIC Keynote at the Global Event Series in Cary, NC, USA on February 15, 2019.
  • Monetization of the Industrial Internet Recorded: Aug 27 2018 10 mins
    Stan Schneider
    Samples of how IIC members are monetizing the Industrial Internet and how IIC membership is impacting their success.
  • IoT in Mining: Current Capabilities & Future Pathways Recorded: Aug 22 2018 49 mins
    CSIRO: Australia's Commonwealth Scientific & Research Organisation
    IoT is turning mining into a safer and more productive industry. The technology involves connecting machines, fleet and people with sensor technologies that transfers and receive data over a network.
  • A Framework to turn IoT Technology into Operational Capability for Mining Recorded: Jul 17 2018 58 mins
    Pieter van Schalkwyk, CEO, XMPro
    Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.

    This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.

    This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
  • The Benefit of Securing Industrial IoT Endpoints Recorded: Jun 27 2018 51 mins
    Steve Hanna, Senior Principal, Infineon & Dean Weber, CTO, Mocana
    The beginning of a security strategy starts at the end – securing your IoT endpoints. Endpoints are everywhere in the Industrial Internet of Things (IIoT) landscape. Without proper endpoint security, IIoT systems may put your organization or the greater public at increased risk. Plus, the viability of the IIoT depends on proper implementation of an endpoint security strategy to counter the growing and ever-changing threats.

    During this webinar, the editors of the Endpoint Security Best Practices Whitepaper will discuss this important document, customer use-cases, and the core components of a comprehensive, IIoT solution.
Industrial Internet Consortium
The Industrial Internet Consortium is a global, member-supported, organization that promotes the accelerated growth of the Industrial Internet of Things by coordinating ecosystem initiatives to securely connect, control and integrate assets and systems of assets with people, processes and data using common architectures, interoperability and open standards to deliver transformational business and societal outcomes across industries and public infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Buzz Around Cognitive Computing in Energy & Utilities
  • Live at: Jun 26 2018 4:00 pm
  • Presented by: Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM
  • From:
Your email has been sent.
or close