Cloud

10/24/2017
11:47 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Industrial Internet Consortium Publishes Industrial IoT Analytics Framework Technical Report

Report aims to be blueprint that maps analytics to IIoT applications.

NEEDHAM, MA –  The Industrial Internet Consortium (IIC), an organization that aims to transform business and society by accelerating the Industrial Internet of Things (IIoT), has published the IIC Industrial IoT Analytics Framework Technical Report (IIAF). It is the first IoT-industry technical document to include a complete set of instructions that IIoT system architects and business leaders can use to deploy industrial analytics systems in their organizations.

IDC has predicted that by 2020 one-tenth of the world’s data will be produced by machines. Yet without an analytics blueprint, that data could sit unused, never being analyzed and turned into useful insights.  The IIAF is the first-of-its-kind blueprint for system architects and designers to map analytics to the IIoT applications they are supporting, to ensure that business leaders can realize the potential of analytics to enable more-informed decision making.

"Using analytics to provide insights is the holy grail of industrial IoT," said Wael William Diab, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Director at Huawei. "The IIC IIAF takes a holistic approach to developing the foundational principles of industrial analytics as well as looking at the complete picture from design considerations to creation of business value and functionality. This entire ecosystem approach is valuable to both business leaders as well as technologists, engineers, and architects looking to deploy IIoT systems."

The IIC IIAF is the first document to offer a broad scope of requirements and concerns for industrial analytics applied to IIoT systems. It shows IIoT system architects the steps involved in developing analytics for IIoT systems with state-of-the-art information, including definitions and information flows that shows how the technologies can be applied to the applications. Guidance is provided how and where to deploy industrial analytics based on the characteristics of the applications and outcome expectations.  In addition, the IIAF looks at emerging technologies including artificial intelligence (AI) and big data, which are expected to play an increasingly important role in industrial analytics.

"Industrial Analytics is changing rapidly, from data lake to stream processing and machine learning. Our framework provides a common understanding and encourages interoperability across the IIoT ecosystem," said K. Eric Harper, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Principal Scientist at ABB. "With this foundation, it is more likely that applications will be able to adopt new technologies and techniques in the future without substantial rework."

Analytics have been applied to other many other fields such as finance and retail to improve the customer experience and increase corporate revenue. The major differentiation in industrial settings is the physicality of the systems. For example, if IIoT systems are not configured correctly, or if their maintenance schedule is wrong, the systems can cause physical harm. Analysis and improvement of operational maintenance across multiple systems must be performed with extreme diligence, and are as important to technology leaders as they are to business leaders looking to increase profits.

"Industrial analytics are the engine that takes data from industrial systems and creates value and insight to get business results," said Will Sobel, IIC Industrial Analytics Task Group Chair and Chief Strategy Officer at VIMANA. "The sophistication of analytical methods in other domains, such as finance and media, have been evolving at a breakneck pace, but little has been done to apply these techniques to industrial systems. The IIAF provides the special considerations one needs to consider before one uses these technologies in an industrial system."

When analytics are applied to machine and process data, they help optimize decision-making and enable intelligent operations. These new insights and intelligence can be applied across all levels of any enterprise in any industry if the appropriate data can be collected, curated and analytics are applied correctly.

"In transforming machine raw data into actionable information, industrial analytics plays a crucial role in the industrial Internet just like refineries that turn crude oil into high energy fuel. The actionable information from the analytics is the fuel that drives the optimization of industrial operations and production, the creation of new revenue streams and the enablement of new business models," said Shi-wan Lin, IIC Technology Working Group Chair and CEO and Co-Founder, Thingswise, LLC.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.
CVE-2018-20154
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses.
CVE-2018-20155
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings.