Cloud

10/24/2017
11:47 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Industrial Internet Consortium Publishes Industrial IoT Analytics Framework Technical Report

Report aims to be blueprint that maps analytics to IIoT applications.

NEEDHAM, MA –  The Industrial Internet Consortium (IIC), an organization that aims to transform business and society by accelerating the Industrial Internet of Things (IIoT), has published the IIC Industrial IoT Analytics Framework Technical Report (IIAF). It is the first IoT-industry technical document to include a complete set of instructions that IIoT system architects and business leaders can use to deploy industrial analytics systems in their organizations.

IDC has predicted that by 2020 one-tenth of the world’s data will be produced by machines. Yet without an analytics blueprint, that data could sit unused, never being analyzed and turned into useful insights.  The IIAF is the first-of-its-kind blueprint for system architects and designers to map analytics to the IIoT applications they are supporting, to ensure that business leaders can realize the potential of analytics to enable more-informed decision making.

"Using analytics to provide insights is the holy grail of industrial IoT," said Wael William Diab, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Director at Huawei. "The IIC IIAF takes a holistic approach to developing the foundational principles of industrial analytics as well as looking at the complete picture from design considerations to creation of business value and functionality. This entire ecosystem approach is valuable to both business leaders as well as technologists, engineers, and architects looking to deploy IIoT systems."

The IIC IIAF is the first document to offer a broad scope of requirements and concerns for industrial analytics applied to IIoT systems. It shows IIoT system architects the steps involved in developing analytics for IIoT systems with state-of-the-art information, including definitions and information flows that shows how the technologies can be applied to the applications. Guidance is provided how and where to deploy industrial analytics based on the characteristics of the applications and outcome expectations.  In addition, the IIAF looks at emerging technologies including artificial intelligence (AI) and big data, which are expected to play an increasingly important role in industrial analytics.

"Industrial Analytics is changing rapidly, from data lake to stream processing and machine learning. Our framework provides a common understanding and encourages interoperability across the IIoT ecosystem," said K. Eric Harper, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Principal Scientist at ABB. "With this foundation, it is more likely that applications will be able to adopt new technologies and techniques in the future without substantial rework."

Analytics have been applied to other many other fields such as finance and retail to improve the customer experience and increase corporate revenue. The major differentiation in industrial settings is the physicality of the systems. For example, if IIoT systems are not configured correctly, or if their maintenance schedule is wrong, the systems can cause physical harm. Analysis and improvement of operational maintenance across multiple systems must be performed with extreme diligence, and are as important to technology leaders as they are to business leaders looking to increase profits.

"Industrial analytics are the engine that takes data from industrial systems and creates value and insight to get business results," said Will Sobel, IIC Industrial Analytics Task Group Chair and Chief Strategy Officer at VIMANA. "The sophistication of analytical methods in other domains, such as finance and media, have been evolving at a breakneck pace, but little has been done to apply these techniques to industrial systems. The IIAF provides the special considerations one needs to consider before one uses these technologies in an industrial system."

When analytics are applied to machine and process data, they help optimize decision-making and enable intelligent operations. These new insights and intelligence can be applied across all levels of any enterprise in any industry if the appropriate data can be collected, curated and analytics are applied correctly.

"In transforming machine raw data into actionable information, industrial analytics plays a crucial role in the industrial Internet just like refineries that turn crude oil into high energy fuel. The actionable information from the analytics is the fuel that drives the optimization of industrial operations and production, the creation of new revenue streams and the enablement of new business models," said Shi-wan Lin, IIC Technology Working Group Chair and CEO and Co-Founder, Thingswise, LLC.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0291
PUBLISHED: 2018-06-20
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol ...
CVE-2018-0292
PUBLISHED: 2018-06-20
A vulnerability in the Internet Group Management Protocol (IGMP) Snooping feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in ...
CVE-2018-0293
PUBLISHED: 2018-06-20
A vulnerability in role-based access control (RBAC) for Cisco NX-OS Software could allow an authenticated, remote attacker to execute CLI commands that should be restricted for a nonadministrative user. The attacker would have to possess valid user credentials for the device. The vulnerability is du...
CVE-2018-0294
PUBLISHED: 2018-06-20
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive...
CVE-2018-0295
PUBLISHED: 2018-06-20
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading. The vulnerability is due to incomplete input validation of the BGP update...