Connect with us

Tech

How Internet of things is accelerating the progress of Industry 4.0

Avatar

Published

on

As the prices of sensor technology fall, manufacturers are developing and offering more intelligent products and assets with the Internet than ever. As technology continues to advance along the acceptance curve, the IoT hype is giving way to real IoT implementations. Today we are far behind the proof of concept phase. The time for IoT is NOW.

The backbone of industry 4.0

IoT has long been seen as the backbone technology behind Industry 4.0, and as real IoT implementations move faster and faster, we can now see the vision of Industry 4.0 in the form of smart factories and digital supply chains based on data, should take shape. Insight and automation.

The adoption begins to snow. Here at SAP, IoT implementations will increase their speed in 2020 as technology becomes increasingly common. Gartner believes that by 2024 at least 50% of business applications in production will be enabled for IoT.

In fact, companies around the world are now implementing IoT on a large scale and with a level of sophistication that allows them to increase efficiency, meet growing demand and offer better customer experiences. The result is that the traditional production stack is evolving towards a digital manufacturing platform that supports fully automated equipment, mass production, mass adjustments and cost-effective production of customized products.

With the IoT that drives Industry 4.0, machines and business processes now interact without human intervention, so that companies can focus on business results. In this way, companies can improve business automation, improve business agility and improve customer experience.

The way people work in production environments is also changing. Employees in the workplace receive more and more personalized information and decision-making aids on their smart devices. To further facilitate this change, the systems that support production are changing from a focus on the execution of transactional productions to a data-based execution and optimization of business processes.

Context-rich data is processed at the edge

In fact, the raw telemetry data collected from the machines has little value in themselves. For IoT to be a business reality, companies need a way to put this data in the business context. In other words, the sensor data must be complemented with the commercial semantics stored in materials, products, customers, inventory, assets and more registration systems. This can make sense of unprocessed data and allow companies to obtain information that leads to better business results and better decisions.

The increase in applications and platforms that can transfer large amounts of large data from devices connected through the cloud is an important step forward in this regard. But what about the cases where there is no connection available? And what about the cases where low latency is critical?

Here is the solution in cutting-edge computing. Think of cutting-edge computing as a new form of distributed computing where data, applications and business processes run near the source of the generated data. The ability to marginally expand and execute business processes allows companies with factories and factories to fully automate their operations and execute them independently, even in situations of low bandwidth or when certain security and regulatory requirements dictate that the data be local in place of must be processed in the cloud

Edge computing, like IoT, affirms itself. According to IDC, “by 2023, 70% of IoT implementations will include edge-based decisions to support the operational and strategic agendas of organizations.” The report also says that by 2023, 70% of companies on the periphery of IoT will perform different levels of data processing. At the same time, companies will spend more than $ 16 billion on IoT edge infrastructure during this time. “

New business models.

The result of all this means that companies are now beginning to meet one of the key requirements of the Industry 4.0 vision: use the data intelligently to achieve better business results.

IoT data derived from local resources, for example, allow companies that use advanced analysis and machine learning to predict machine maintenance requirements and take measures to avoid downtime, also known

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Pixel 4a photo leaks indicate a simple budget phone

Avatar

Published

on

These first rumors about Pixel 4a could only have some weight. Photo leaks on Twitter and Reddit seem to show Google’s next economic phone in nature, and seem to confirm the previous claims. The worn out prototype 4a in the images apparently has no facial recognition and the dual cameras of the normal Pixel 4 in favor of a more conventional fingerprint reader and a single rear camera. There is a pinhole camera for selfies in the front, and Google keeps the headphone jack for those who can’t justify Bluetooth headphones.

Snapshots do not show much more about what is in the phone, although an available memory log suggests that you should still be satisfied with 64 GB of non-expandable memory. A 5.7 or 5.8-inch screen is expected to be equipped with a medium-sized Snapdragon processor (probably 600 or 700 series) to keep costs low and extend battery life.

It is not certain when Pixel 4a could arrive, especially given the outbreak of the corona virus, which affects the production of many companies. Now that I / O is canceled, Google is certainly not linked to a specific start window. However, it is hard to imagine that Google will wait a long time. The Pixel 3a served not only as an entry point for the Google smartphone line, but also as a way to keep the series fresh and in the spotlight while the main pixel was still in the middle of the cycle.

Continue Reading

Tech

Jonathan Kraft makes an unpleasant compliment to Bill Belichick: “Machine Learning”

Avatar

Published

on

BOSTON, Mass. – Soccer is not exactly known for being a leader in the world of sports analytics, but Patriot President Jonathan Kraft says that Bill Belichick’s own melancholic looks and short answers are behind the version of “machine learning” of the coach.

“I think if you want to use a soccer coach like Bill Belichick, who has been a soccer coach for 40 years, you may not call him data, but he has a steel trap in his head,” Kraft told Sloan Sports conference Friday analytics. “Every instance of everything you’ve seen: it won’t call it data and it won’t call it machine learning, but its brain is a machine and it’s machine learning. So you can call it old-school training – Bill probably wouldn’t call it machine learning, but that is exactly. “

Last season, Belichick, 67, told reporters that the analysis was not his “thing”, and that he puts “less than zero” emphasis on decision making.

“You can use these advanced websites wherever you want,” Belichick said in 2016. “I don’t know. I have no idea that I’ve never seen one. I don’t even want to look at one. I don’t care what they say … All metric pages and all that, I mean, I have no idea. You should ask a coach smarter than me. “

The annual Sloan conference, organized by the Massachusetts Institute of Technology, discusses advances and problems in the sports analysis industry. Kraft spoke with Commissioner Don Garber in a panel discussion about the success story of Major League Soccer.

Regardless of whether Belichick actively uses advanced analysis or not, Kraft emphasized that it would be silly to completely ignore the progress of the industry.

“I think the data should be part of the decision-making aids in everything you do,” Kraft said. “If you’re not ready to understand what’s out there, put your team at a competitive disadvantage.”

Jonathan Kraft is co-owner of the New England Revolution of MLS with his father Robert Kraft, who also attended the annual sports technology summit here. The younger force talked about the differences in the way the two sports use and use the data.


“On the football side of the house, the data is not used as often [as in football] to capture the content game by game.” I know that people talk about it all the time, they still don’t, ”said Jonathan Kraft. “You could look at certain trends and other things and probabilities related to certain decision-making tools, but I would say that in football it is one of several ingredients that come into a game plan, while in football I am now for coaches who they believe in him. ” , I think it could even be the main one, one of the two or three main controllers. “

Kraft says that, unlike the patriots, the revolution was always up to date with the analyzes.

“On the football side of the house, we hired our first data analyst more than a decade ago. I think maybe we were the first team in the league to have one, ”he said. “We monitor the movement of each player on the field, how passes are made, how teams perform in different thirds, and so on.”

Continue Reading

Tech

The new Intel chip failure threatens encryption, but Macs are safe

Avatar

Published

on

The vulnerabilities inherent in Intel chips have been a common problem in recent years, with fatal errors such as Meltdown, Specter and ZombieLoad that affect virtually all Intel-equipped devices.

In 2019, Positive Technologies security researchers discovered another problem with Intel chips. In particular, it is a vulnerability that affects the Intel converged security management engine, an important security feature in Intel technology and firmware that runs on Intel hardware.

In addition to loading and varying the BIOS and power management firmware, CSME also offers the “cryptographic base” for functions such as DRM (Digital Rights Management), TPM (Firmware-based Trusted Platform Module) technologies or the ID itself Intel enhanced privacy.

Intel released a patch in 2019 to fix the problem. However, Positive Technologies researchers have discovered that it is much worse than originally thought. New research published Thursday shows that the vulnerability could be exploited to recover a cryptographic root key, which could allow an attacker to access all the data on a device.

This could be a big problem for DRM protected media. If used aggressively, the error can be used to decrypt incoming or outgoing data traffic from the affected device. On a larger scale, it could be used on Intel-based servers.

Although Intel’s previous vulnerabilities affected Apple devices, this error does not affect newer Macs equipped with an Apple T1 or T2 chip. Because these chips are based on proprietary technology and are released before Intel chips, a user’s encryption keys are secure.

Of course, older Macs without a T-Series chip, or the current iMac family without the iMac Pro, may be vulnerable to exploitation, which may compromise FileVault encryption. The error is undetectable and Intel advises users to maintain the “physical possession” of their devices, since there is no way to use the attack vector remotely, for example, by clicking on an incorrect ad.

However, Intel notes that the tenth generation chips are safe from this. The vulnerability and others that they like are also one of the many possible reasons why Apple may soon switch its Macs to ARM-based processors.

Continue Reading

Trending

Copyright © 2017 Rebloco.com