New Industrial Automation System Topologies made possible by the Industrial Internet of Things

Starting with the introduction of digital computer technology as the delivery vehicle for pro‐cess control systems in the 1960s and 1970s, industrial control system topologies have been designed for industrial operations based on the limitations and con‐ straints of those digital technologies – not on the topology of the industrial businesses and operations. As a result, the physical and logical topologies of traditional industrial control systems have been fundamentally mismatched. Although these control systems worked and performed their functions, they were difficult to apply and maintain – at least in part due to the fact that their physical and logical topologies did not naturally align with industrial operational and business architectures.

Spotlight

The Content Advisory

Content is everything the business creates in order to communicate. In today’s world, the way we communicate is the only thing that separates us from the next: The next click, the next competitor, the next answer. TCA – The Content Advisory is a consulting and training company; blending the art and science of intelligent content to help today’s modern business communication’s strategy.

OTHER WHITEPAPERS
news image

Power-efficient positioning for THE Internet of Things

whitePaper | February 23, 2022

The world is embracing Internet of Things (IoT) applications. Billions of internet-connected devices are capable of sensing, communicating, interacting, computing and actuating, and are set to become even more integrated into our daily lives. By 2022

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Cloud-native 5G –Getting Started

whitePaper | February 28, 2023

As they deploy 5G, telecoms operators around the world are experimenting with cloud¬native core networks, which offer greater flexibility, scalability and automation than conventional telecoms networks. This paper explores how telecoms operators could go about implementing a cloud¬native 5G core network. Most early movers are taking one of two approaches to deploy a cloud¬native 5G core:

Read More
news image

Breaking the Silos in V&V: The IoT Way

whitePaper | May 1, 2022

For Years, testing methodologies have focused on individual elements (Silos) of an organized, connected system. Testing is getting performed in isolation for front-end, back-end and field devices. The result – even though an individual element may work well, the chain of connected system may still appear to be broken due to flaws in integration points.

Read More
news image

Embedding Generative AI and Advanced Search into your Appswith MongoDB

whitePaper | July 11, 2023

Never before has the launch of a new technology so rapidly fired the imagination of enterprises and consumers alike. The arrival of ChatGPT in November 2022 showcased the potential of Generative AI powered by Large Language Models (LLMs) in addressing a vast array of new use cases. These use cases were previously unimaginable with conventional computing and analytical AI (now sometimes described as “traditional” or “classic” AI).

Read More
news image

Using eSIM and iSIM will save money for IoT deployments

whitePaper | June 22, 2022

Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.

Read More

Spotlight

The Content Advisory

Content is everything the business creates in order to communicate. In today’s world, the way we communicate is the only thing that separates us from the next: The next click, the next competitor, the next answer. TCA – The Content Advisory is a consulting and training company; blending the art and science of intelligent content to help today’s modern business communication’s strategy.

Events