Blog

How Prosumers are driving Big Data Innovation at Utilities

Prosumers in the utility sector, who both produce and consume electricity, are increasingly influencing how utilities are interacting with rate payers. These clients utilize distributed renewable energy resources to produce energy, both for themselves and for the grid, and actively monitor and manage their own energy use. This poses a bi-directional flow of energy challenge, as the energy sector’s traditional supply-and-demand management approaches are forced into new territories.

Fog Computing: Bringing SDN to IIoT COMPUTING: BRINGING SDN TO IIOT

The Industrial Internet of Things (IIoT) is heralding a new wave of modernization, across many industries, with customers and internal stakeholders demanding advances in productivity, management, security, and flexibility across various verticals. However, IIoT deployments continue to face considerable head-winds in terms of (largely) manually managed infrastructure, that are mostly un-secure and setup as silos. Fog Computing offers an innovative solution to address these challenges by providing secure access to Operational Technology (OT) infrastructure within the framework of Information Technology (IT) toolsets.

Securing the Internet of Things: Energy and Utilities

As new technologies and innovative solutions enter the picture, companies are working to modernize existing power infrastructures and deliver secure, reliable and affordable energy to end consumers. One significant driver of this transformation is the Internet of Things (IoT). IoT-connected devices have the potential to not only deliver cost savings to energy and utility enterprises, but also provide more value-added services to consumers.

Redesigning Security for Fog Computing with Blockchain

As more connected devices come into use across the industrial IoT (IIoT), traditional cloud computing architectures are no longer sufficient. Current centralized systems simply don’t hold up to the scale and security requirements of so many billions of IoT devices, including the secure storage, availability over intermittent network connections, access control, authentication, and real-time analysis of a near-constant data stream. The traditional approach involves moving data from the edge to a central server for processing, which increases latency and reduces available bandwidth across the network. Most importantly, however, the transfer of massive amounts of data from devices at the edge to a central system greatly increases the chance for a security breach, resulting in lost and compromised information.

Powering Business Decisions with Bitemporal Data

We’re in the middle of another industrial revolution. We’re seeing the digitalization of business processes and operations, and transformation in how goods and services are designed, produced, and delivered. As part of this transformation, organizations are moving to self-healing systems where automation is used to reconfigure networks, systems, and processes improving availability, reliability and quality of their services and products. This article explores the exponential growth of data from sensors and connected devices, and how organizations can manage the increasing pace of change.

Securing the Internet of Things: Devices & Networks

With data from billions of connected devices and trillions of sensors, supply chain and device manufacturing operators are taking advantage of new benefits. Think improved efficiency and greater flexibility among potential business models. But as the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.

How Fog Computing is Driving Industrial IoT Systems Evolution

In the last century, transportation, medical, power, and industrial systems were built from individual devices, usually programmed one at a time. The Industrial Internet of Things (IIoT) is changing all of that, transforming isolated programmable devices into intelligent networks of connected machines, such as autonomous cars, intelligent drone delivery systems, smart grid power systems, automated air traffic control, connected medical devices, robotic oil drilling, and more. As a result, these systems have unique computing requirements including real-time processing, complex data interconnectivity, integrated security, high performance, reliability, and scalability.

IIoT Monetization Concepts

Businesses are starting to look at new monetization opportunities beyond first-generation, IIoT applications. For the industrial sector, the IIC hosted a brainstorming discussion on this topic during the Q4-2017 IIC Member meeting in Burlingame, CA.Here are a few ideas stemming from our corporate experience in supporting multi-user, multi-application IIoT systems.

Send in the Drones: Enabling Operational Efficiencies through Fog Computing

Through advances in control and robotics research, we can reliably deploy drones on manual or pre-planned trajectories. In the near future, we will even be able to anticipate collision avoidance and formation flights in commercial drones. A fleet of drones will be able to self-pilot itself to capture video several hours a day in smart cities and industrial sites, thereby collecting massive amounts of video data. To manage this volume of video data in real-time, drones need fog networks.