Cloud
10/24/2017
11:47 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Industrial Internet Consortium Publishes Industrial IoT Analytics Framework Technical Report

Report aims to be blueprint that maps analytics to IIoT applications.

NEEDHAM, MA –  The Industrial Internet Consortium (IIC), an organization that aims to transform business and society by accelerating the Industrial Internet of Things (IIoT), has published the IIC Industrial IoT Analytics Framework Technical Report (IIAF). It is the first IoT-industry technical document to include a complete set of instructions that IIoT system architects and business leaders can use to deploy industrial analytics systems in their organizations.

IDC has predicted that by 2020 one-tenth of the world’s data will be produced by machines. Yet without an analytics blueprint, that data could sit unused, never being analyzed and turned into useful insights.  The IIAF is the first-of-its-kind blueprint for system architects and designers to map analytics to the IIoT applications they are supporting, to ensure that business leaders can realize the potential of analytics to enable more-informed decision making.

"Using analytics to provide insights is the holy grail of industrial IoT," said Wael William Diab, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Director at Huawei. "The IIC IIAF takes a holistic approach to developing the foundational principles of industrial analytics as well as looking at the complete picture from design considerations to creation of business value and functionality. This entire ecosystem approach is valuable to both business leaders as well as technologists, engineers, and architects looking to deploy IIoT systems."

The IIC IIAF is the first document to offer a broad scope of requirements and concerns for industrial analytics applied to IIoT systems. It shows IIoT system architects the steps involved in developing analytics for IIoT systems with state-of-the-art information, including definitions and information flows that shows how the technologies can be applied to the applications. Guidance is provided how and where to deploy industrial analytics based on the characteristics of the applications and outcome expectations.  In addition, the IIAF looks at emerging technologies including artificial intelligence (AI) and big data, which are expected to play an increasingly important role in industrial analytics.

"Industrial Analytics is changing rapidly, from data lake to stream processing and machine learning. Our framework provides a common understanding and encourages interoperability across the IIoT ecosystem," said K. Eric Harper, IIC Industrial Analytics Task Group Chair, IIC Steering Committee Member and Senior Principal Scientist at ABB. "With this foundation, it is more likely that applications will be able to adopt new technologies and techniques in the future without substantial rework."

Analytics have been applied to other many other fields such as finance and retail to improve the customer experience and increase corporate revenue. The major differentiation in industrial settings is the physicality of the systems. For example, if IIoT systems are not configured correctly, or if their maintenance schedule is wrong, the systems can cause physical harm. Analysis and improvement of operational maintenance across multiple systems must be performed with extreme diligence, and are as important to technology leaders as they are to business leaders looking to increase profits.

"Industrial analytics are the engine that takes data from industrial systems and creates value and insight to get business results," said Will Sobel, IIC Industrial Analytics Task Group Chair and Chief Strategy Officer at VIMANA. "The sophistication of analytical methods in other domains, such as finance and media, have been evolving at a breakneck pace, but little has been done to apply these techniques to industrial systems. The IIAF provides the special considerations one needs to consider before one uses these technologies in an industrial system."

When analytics are applied to machine and process data, they help optimize decision-making and enable intelligent operations. These new insights and intelligence can be applied across all levels of any enterprise in any industry if the appropriate data can be collected, curated and analytics are applied correctly.

"In transforming machine raw data into actionable information, industrial analytics plays a crucial role in the industrial Internet just like refineries that turn crude oil into high energy fuel. The actionable information from the analytics is the fuel that drives the optimization of industrial operations and production, the creation of new revenue streams and the enablement of new business models," said Shi-wan Lin, IIC Technology Working Group Chair and CEO and Co-Founder, Thingswise, LLC.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.