Asset monitoring in the service-oriented Internet of Things empowered smartgrid

March 1, 2016

The smartgrid envisions several sophisticated services that heavily depend on almost real-time monitoring of the assets and the functionality they provide. High-performance smart metering is the flagship of ongoing projects worldwide. In order to succeed, a service-oriented approach must be adopted, tools for simulation and pre-deployment evaluation will need to be created, and finally, adaptive systems targeting self-X behaviour (e.g. self-management, self-optimization, self-monitoring, self-healing, and self-protection) may raise the level of sophistication once the infrastructure is operational. In all of the above, the constraints set by enterprise services need to be respected and collaboratively tune infrastructure’s layers via active monitoring and control in order to enable the best overall system performance. We discuss on considerations and propose directions that could be followed.

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

OTHER WHITEPAPERS
news image

AWS Prescriptive Guidance - Building an industrial Internet of Things (IIoT) digital transformation strategy

whitePaper | June 20, 2022

The industrial Internet of Things (IIoT) refers to the use of internet-connected sensors and devices in the industrial sectors, such as manufacturing, energy, automotive, healthcare, life sciences, and agriculture. IIoT allows telemetry data collection from equipment, machines, and field devices in an operational environment. These environments are commonly subject to industrial regulations; compute, networking, and power constraints; and inclement conditions, and all of these challenges contribute to the complexity of designing an IIoT solution.

Read More
news image

IoT Signals- Edition 3 (Microsoft)

whitePaper | October 5, 2021

The Internet of Things (IoT) is rapidly changing the world around us, transforming a huge range of physical objects through digital intelligence. Beyond our ubiquitous smart personal devices, IoT is revolutionizing the way companies do business – helping them become faster, smarter, safer, and more efficient.

Read More
news image

The Disruptions of 5G on Data-driven Technologies and Applications

whitePaper | December 18, 2019

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge.

Read More
news image

Smart solution for sustainable cities

whitePaper | January 8, 2020

The 19th century was a century of empires. The 20th century was a century of states. The 21st century will be a century of cities.” This quote by Wellington E. Webb, former mayor of the City of Denver, seems plausible when you look at the numbers: Although cities cover only a fraction of the Earth’s surface, they are already home to more than half of the world’s population.

Read More
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

Breaking the Silos in V&V: The IoT Way

whitePaper | May 1, 2022

For Years, testing methodologies have focused on individual elements (Silos) of an organized, connected system. Testing is getting performed in isolation for front-end, back-end and field devices. The result – even though an individual element may work well, the chain of connected system may still appear to be broken due to flaws in integration points.

Read More

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

Events