The Intelligent Edge: Bringing Transparency to the Factory with Lee Jaderborg (Part 1)

“Quality is never an accident. It is always the result of intelligent effort” – John Ruskin. This rings true in the world of IIoT. For Lee Jaderborg, who wears several hats at FreeWave, from engineering, to quality management and process development, the concept of intelligence-driven quality is what inspired him to learn everything he’s accomplished in his 40-year career, as well as what he’s brought to the future of the factory floor. In our fifth installment of “The Intelligent Edge,” we connected with Lee to discuss his work on the ZumIQ application environment and the purpose of intelligent monitoring. FreeWave: Lee, tell us about your role at FreeWave. Lee Jaderborg: Sure! I don’t have one specific job; I wear five hats. Coming up on my fourth year at FreeWave this April, I’m the manufacturing engineering manager, quality manager, sustaining mechanical support, and I oversee process development and design for new products. I also write SQL for our databases. I manage the procedures for a Printed Circuit Board assembly and Surface Mount Technology (SMT) manufacturing line, ensuring the entire process flows through production to the backdoor to ship. I also handle statistical process control and root cause analysis throughout the manufacturing process, all while monitoring for major operational KPIs. FreeWave: Was IIoT operations always your focus? Lee: No, I began college at age 17 as a drama major. Everything I’ve learned about engineering and management since then has been self-taught. During and after college, I worked in various engineering-type jobs, like designing tools to fabricate jet engine exhausts and helping build Colorado’s Eisenhower Tunnel. Along the way, I became exposed to SQL and got a master’s certificate in 6Sigma for project management. Continuous learning has helped advance me to where I am now. FreeWave: What are you currently working on? Lee: Optimizing FreeWave’s ZumIQ for better data visualizations on the manufacturing floor – a major focus at last year’s annual IMPACT Manufacturing Summit. A panel, which included the director of manufacturing for Rolls Royce, discussed transitioning their workforce to better accommodate millennials, who learn better with visual feedback. So, they put an IO on a light stack – like a stoplight that tells you whether a machine is ready – to give a real-time view of various data points. FreeWave: How exactly would they capture that data? Lee: This is where something like ZumIQ comes in – you need to tie into analog signals to continuously record this data. You do this by having the light stack’s sensor communicate its status to an app programmable device, whose data is then collected by the ZumIQ app environment. ZumIQ gathers and tracks data over time to determine both real-time status and historical trends. This gives a view of the manufacturing floor you can’t get by physically looking down the production line. It determines the collective state and efficiency of each part in the system. Interested in more insights by Lee? We’re continuing the conversation for the next Intelligent Edge blog.

Applying Automation to Save our Water Systems

Each day, billions of people and organizations around the world face some type of water or wastewater issue. From industrial and agricultural enterprises to consumers, a consistent supply of quality water is crucial. According to the American Society of Civil Engineers’ 2017 Infrastructure Report Card, many of these issues are due to aging infrastructure with an annual $82 billion gap in U.S. water and wastewater system infrastructure investment alone. To help combat this, many of the more than 30,000 rural water/wastewater districts in North America are facing new state and local government regulations. The standards require some level of automation be incorporated to validate the integrity and security of water systems and infrastructure data. On Feb. 14 at 4pm MT, our Chief Marketing Officer, Scott Allen, will be speaking in-depth about this topic at the Colorado Rural Water Association’s (CRWA) 37th annual conference and expo. His session, “Connecting it All: Intelligent Edge Remote Networks,” dives into some of the challenges people face with their water and wastewater systems – like broken or frozen pipes – along with security concerns that automation at the edge can quickly identify and remediate. Where automation can be applied Approaches to water and wastewater management are generally divided into two basic focus areas: quality and quantity. Quality is the integrity of the water supply. You may remember the 2014 Flint, Michigan water crisis, which to this day is still dealing with high levels of lead in the city’s drinking water due to insufficient water treatment. In addition to environmental hazards, security breaches, like tampering with water quality test results, are a major concern in hiding evidence of contaminated wells. Quantity is the amount of water being processed for reclamation, agriculture, recreation, industrial and other uses. Due to the aging water system infrastructure, leaks, shortages and even overflowing tanks create the potential for households and cities to be without access to running water. To maintain and secure a pristine and consistent water supply, wireless automation tools and technology can help gain an accurate representation of water conditions, such as temperature, turbidity, salinity, pH and flow. From there, a wireless data network is needed to automatically transmit the collected data and flag any existing or projected problem areas. It can also help immediately report any security breaches, increase equipment and worker efficiency, automatically react to malfunctions and perform control actions, among other benefits. The power of automation: a case study Take for instance the introduction of automation and wireless by the St. George Water Services Department, part of the Washington County Water Conservancy District in Washington County, Utah. To effectively and efficiently manage and optimize the complete water cycle for 82,000 people living in the city of St. George, Utah, the department needed to collect reliable and accurate data from across more than 100 linear miles. By introducing a radio network to transmit sensor data from across their district, the St. George Water Services Department can now employ an automated SCADA system. This provides clear visibility into the performance of their utility- and solar-powered devices, while also simplifying the process to secure separate systems. To learn more about how the city of St. George accomplished this feat, read our case study here! While awareness around what public water and infrastructure issues need to be fixed are known by water and wastewater associations, many are still figuring out how to address it. If you plan on attending the CRWA conference this week, drop by to watch Scott’s session to learn more about why the introduction of automation and SCADA technologies that are crucial to a clean and fully-functioning water supply, and how radio networks enable these technologies. Hope to see you there!

Top Tips for the New Drone Owner

Recent headlines demonstrate how drones can support public safety and government operations. The Los Angeles Fire Department, for example, used drones for the first time in the Skirball fire that wreaked havoc on Southern California earlier this month. The drones offered real-time situational awareness – allowing responders to see what was happening and change their tactics to avoid hazards. Across the world in Dubai, police are using drones to monitor traffic. Drones truly have made a worldwide impact – and these are just a couple of examples. In addition to providing a critical safety role, the commercial drone market is growing. In the midst of the holiday season, drones make for fun gifts for the aerial hobbyist. While drones are sure to provide hours of entertainment, new drone owners should be aware that there are some basic guidelines, offered by the FAA, that will ensure safe operation.  As you peruse the lists of the best drones to buy, make sure to look into the safety guidelines as well. Here are some of the basic rules and regulations that the new drone owner must follow: You Must Register Your Drone The drone registration requirements have been revived. If your drone weighs between .55 pounds and 55 pounds, it must be registered. According to a recent article in Time magazine: “A relative footnote in the National Defense Authorization Act, which was signed into law today, the new regulation requires that drone owners register their unmanned aerial vehicles before taking to the skies. You can register your new drone on the FAA’s drone Unmanned Aircraft System website.” Know Before You Fly Here are a few safety tips (and requirements!) to review before you fly your new drone – straight from the FAA’s website: Fly your drone at or below 400 feet Keep your drone within your line of sight Respect privacy Never fly near other aircraft, especially near airports Never fly over groups of people, public events, or stadiums full of people Never fly near emergencies such as fires or hurricane recovery efforts Never fly under the influence of drugs or alcohol No Drone Zones Did you know that the FAA has a list of locations where drones are forbidden? The FAA recently announced an expanded list of restricted locations, mostly laboratories, where drones cannot fly within 400 feet. When you go out for a day of fun, make sure you’re not close to any of these locations: Hanford Site, Franklin County, WA Pantex Site, Panhandle, TX Los Alamos National Laboratory, Los Alamos, NM Idaho National Laboratory, Idaho Falls, ID Savannah River National Laboratory, Aiken, SC Y-12 National Security Site, Oak Ridge, TN Oak Ridge National Laboratory, Oak Ridge, TN Still unclear on drone requirements? The FAA offers excellent resources: https://www.faa.gov/uas/. If you’re lucky enough to get a new drone this holiday season – enjoy and be safe!  

Nine Perfect Gifts to Get the App Developer in Your Life

Buying gifts for anyone is a struggle, but buying gifts for someone who loves technology can be even more of a challenge. As connected homes, vehicles and Smart gadgets take the world by storm – there are many options at a variety of price points. This year, go for gold and get something they will really enjoy. We have just the list to get you started. Without further delay, from the outrageous to the useful, here are nine gifts that any app developer will enjoy! Intel Compute Stick A full-fledged Windows 10 computer, the size of a USB stick, that you can plug into any HDMI display like a TV or monitor, is sure to please the special app developer in your life. They can carry it around in their pocket or on their keychain and they’ll always have a PC handy.   Gunnar Computer Glasses Work, emails, social media, or games consume a lot of our time. Studies show that it only takes a few hours in front of a screen to cause computer vision syndrome or digital eye strain. Engineered to eliminate eye strain and block blue light because people, on average, are spending 8-10 hours a day on their digital devices. Gunnar is the only patented computer eyewear recommended by doctors to protect and enhance your vision – the perfect option for the practical gift giver. Pixelated Hand Shaped Mouse Looking for something a little less serious? This gift is sure to make a splash at the office! This quirky pixel mouse replicated the ‘pointer’ cursor type most commonly seen when you hover over a link on a web page.     Cooking for Geeks: Real Science, Great Cooks, and Good Food This fantastic book, written by Jeff Potter, offers some of the science behind cooking and answers burning questions such as, “how quickly will a pizza cook in a 500-degree oven?” It’s orientated towards anyone with a technical approach to life, so is more likely to suit a developer than a designer.   IROLLER: A Reusable Liquid Free Touchscreen Cleaner for Smartphones and Tablets We are SURE every developer has this problem and, no surprise, we have the low-cost answer. Just roll this little stick over the touchscreen of your smartphone or tablet and instantly remove fingerprints, smudges, and smears. Your screen will look better, and you can stop spending money on wipes and sprays.   LED Fiber Optic Men’s Jacket Yes, it’s incredible: This lightweight jacket includes 3/4 miles of fiber optic cables and LEDs! It’s the coolest jacket we’ve ever seen, and if your developer has to go to a conference or company party, this will be the must-pack item. Switch between four colors and keep it on for eight hours on a single charge!   Solar Phone Charger As long as the sun is around (so another 5 billion years) you’ll never run out of battery for your phone again. This high-tech charger works anywhere and is the perfect useful tech gadget for your Developers next epic adventure.     All of these gifts are fantastic but if you want to get your special app developer something a little more meaningful, and by meaningful we mean home-made, try hitting up a thrift store or a yard sale for any spare computer parts. Making Items like floppy disk coasters or keyboard key paper clips/push-pins are sure to be a hit but not to your wallet.   No matter the size of your budget, we hope this gives you some fun and useful ideas for the app developer or techie in your life!

IIoT News Round Up: 2018-Focused Headlines

As the year winds down, industry thought leaders and publications are beginning to release their top trends and predictions for IIoT in 2018. From what we’ve seen circulating around the top news sources, there looks to be a lot in store for Smart Cities and utilities in particular. Reports have shown time and again that IoT devices are being deployed and disrupting industries at an incredible rate. While this has brought a lot of new opportunities to the forefront of many industries – we’re all aware of the lurking giant that needs to be dealt with – security.  Security has been a concern and topic of debate since the beginning of IIoT, but perhaps in 2018, we’ll see the challenge addressed in new ways. The good news is that we’re not shying away from the topic and we’ve encountered it as a common theme in recent headlines – especially in relation to Smart Cities. Here are a few top news stories that stood out to us: The Security Tipping Point An article recently featured in InfoSecurity Magazine (@InfosecurityMag)  by @philmuncaster examines the ongoing security challenges when it comes to IIoT projects for Smart Cities. The article reveals that an international poll by the Wi-SUN Alliance found security as the biggest barrier around the world: “The global, standards-based non-profit polled IT leaders in the UK, US, Denmark and Sweden who are investing in these kinds of IoT projects. It found that although half have a fully implemented strategy already in place, 90% said they struggled to implement a plan and 36% said they found it ‘extremely difficult.’ “ An eWeek (@eWEEKNews) article by @editingwhiz, featuring predictions by leaders in IoT for 2018, echoes the same sentiments, but predicts that service providers might take the issue into their own hands: “Paul Martini, CEO and Co-Founder, iboss: Better IoT network security will come to the fore: ‘The industry will continue to be plagued by IoT botnets and malware. 2018 will be the year that enterprises and service providers finally realize that waiting for device manufacturers to improve hardware security is a losing proposition and take it upon themselves to secure their networks against compromised devices. An increasing number of enterprises will deploy network security solutions that are designed specifically to protect large numbers of connected devices.’” Additionally, a Sys-Con post recently published by @S_Allen_IIoT , also emphasized the importance of security in 2018 and offered insight into solutions: “However, even with a secure communication link, if the individual devices that are connected on the OT side become compromised and an intruder gains access to that communication link, they can push malicious data, cause denial of service (DoS), or introduce malware or viruses to the entire network, IT side included.” Allen recommends the following: “Companies need to prioritize security in their quest to create endpoints for all of their field assets. Some industries, like the smart grid, are already experiencing mandates that ensure a more cyber-secure network. With others, however, it is still up to the organization to make security a top priority. There are technology providers available that are security focused and will provide those extra layers of security to the OT network.” Investment Will Grow in Utilities The Future of things (@Future0fThings)article by @morakhiya2711 looked at IIoT investments and the industries in the near future, and it looks to be an exciting time for utilities, among with manufacturing and transportation. “In addition to the funding of start-ups, overall investment in IIoT technologies and services is growing rapidly with few signs of slowing down. Through 2020, the industries that are expected to invest the most in this area are manufacturing, transportation, and utilities. Last year alone, spending reached $178 billion, $78 billion in transportation and $69 billion in utilities, as these industrial sectors leveraged the deployment of intelligent, networked devices to operate smarter and offset risks.” As investments in IIoT go up, so do the security risks. Based on the buzz in leading IIoT publications, perhaps we will begin to see new efforts to create secure end-to-end IIoT networks, as companies battle both disruption and the need to protect data and assets in 2018.

FreeWave Blog Series: The Intelligent Edge (Part 4)

The Internet of Things (IoT) has changed the consumer world in ways no one ever imagined.  By placing intelligence in the IoT network, the “Thing” can do whatever we want it to do.  Now Industrial companies are seeking to take advantage of this edge-deployed intelligence in order to maximize profits, improve safety and streamline operations. In addition to the challenges IoT technology had to overcome – such as cybersecurity, scalability and interoperability – Industrial IoT (IIoT) must also focus on reliability, ruggedness and more. FreeWave is uniquely positioned to understand and address all of these challenges. We have delivered world class IIoT platforms for almost 25 years to thousands of industrial and unmanned systems customers. With that experience, we’re now leading the charge to deploy intelligent applications at the edge of industrial networks and unmanned systems. In the fourth installment of “The Intelligent Edge,” we spoke with Helen Xi, a senior firmware engineer at FreeWave who specializes in high-speed wireless LAN performance, to talk about the use of broadband in the IIoT, as well as FreeWave’s industrial Wi-Fi platform, the WavePro. Read parts one, two and three. FreeWave: Can you talk a little bit about the WavePro platform and where it fits into what you work on at FreeWave? Helen Xi: In our company, the radios mostly operate in the narrowband frequencies, however WavePro is a broadband Wi-Fi system. It’s important for us to have this Wi-Fi system because nowadays there are so many Wi-Fi clients. It’s on every mobile phone, in every laptop, in every household. It’s everywhere. You can’t avoid it. When we have this Wi-Fi product, we can provide a whole communication system to customers. It’s easier for us to integrate them together to make sure they work from our Wi-Fi system to our narrowband radios. Our WavePro product has many features. If you compare it with the industry competitors, they have multiple products and models that meet customers’ specific needs. If you want to provide a long-distance point-to-point link and you buy this model, and you want their system to provide Wi-Fi local coverage, then you must buy another model. WavePro integrates all these features together in a single product, and we can do long-distance point-to-point link, local Wi-Fi coverage and mesh. It can have different clients while providing a backhaul communications in a remote area. FreeWave: Walking back a little bit on some of what you just talked about, one of the things that we’ve been discussing is the transition from traditional RF technology into technology that requires higher bandwidth to transmit bigger data packets in real time and run analytics at the Edge. With WavePro, what I’m wondering is when you talk to clients, what is their number-one priority with this technology? Are they trying to update existing systems or are they wanting to implement entirely new systems? And how important is the broadband aspect? Helen Xi: I think both. Let’s say they want to upgrade an older system. Let me give you an example: nowadays because there are so many Wi-Fi clients, Wi-Fi chips are so well-known, and more sensors have Wi-Fi client chips inside them. If we put our WavePro in the field, it can work as an access point (AP) to talk to these sensors. By the way, our product is an outdoor unit. It’s waterproof IP67. IP67 means you can immerse it underneath water. It has the same industrial-temperature range as our other narrowband radios. It goes from minus-40 up to 70 Celsius. It also has surge protectors from lightening. So, you can safely put it outdoors. If you buy a home Wi-Fi router, say from Netgear, you probably do not want to put it outside. FreeWave: And why is that element important? Helen Xi: Because a lot of our customers use it outdoors. For example, in North Dakota, it’s very cold. It can be minus-20 Celsius. I think you can imagine what happens to your iPhone during winter when you go skiing – it goes dead. Our radios don’t do that. You put it outdoors, on the oil-gas fields where it goes from winter to summer – as cold as North Dakota, as hot as Texas in the deserts – and it’s working well. That’s why the temperature requirement is important. FreeWave: When you’re talking about application examples, where else are you seeing this technology deployed? Helen Xi: It can be used in many areas of the Industrial IoT. For example, we have a utility company that uses WavePros to control large quantities of air conditioners on the roof of two apartment buildings. Each air conditioner has a 2.4GHz Wi-Fi chip in it. They all connect to WavePros on 2.4GHz. One WavePro (we call it “master”) is connected to the utility company’s network. The other three WavePros (we call “slave”) connect to the master WavePro on 5GHz. When the utility company needs to send command to air conditions, it first goes to the master WavePro; the master WavePro passes on its 5GHz to the other slave WavePros; then, the  slave WavePros transmit on 2.4GHz to each air conditioner. FreeWave: What do you envision being the trend of the future with regard to Industrial IoT communications? Is it all headed toward broadband? Or do you think that there will still be a balance between that and cellular and RF? Helen Xi: This is a very good question. I believe it will be a combination. I want to elaborate why I think narrowband is still very important where people seem to only be talking about gigabits. Wireless as a resource is very valuable – every Hz (hertz) is valuable. When you are using a frequency band at this location at this instant, other people cannot use it. You are noise to other people.  Plus, not every Hz is free to use. In IoT, we’re mostely using unlicensed band that you don’t need to pay a fee to the FCC to use as long as you follow rules. There are only

The Industrial IoT Risks You Must Not Ignore in 2018

The haste to adapt IoT technology has left many enterprises facing a growing problem: IoT security. How network and systems architects respond could determine the long-term viability of IoT technology. An interesting paradigm within the Internet of Things has emerged. Stay with us here: IoT technology is designed to improve efficiency and make everything “smarter.” IoT technology is especially vulnerable to security breaches. These security breaches are costly operationally and financially – to the tune of $2.5 million per attack for large enterprises. Security is not the focal point for IoT engineers and developers. One of those statements doesn’t add up.   Like other new technologies before it, IoT is going through its honeymoon phase. Can we cut out a manual process? Can we improve data transmission speeds? Can we make our machines smarter? When the answer is yes, the solution is IoT technology. But the haste to adapt to these new possibilities has left many feeling a growing and very real problem: security. How network and systems architects respond to this problem could determine the long-term viability of technology that holds either the promise or the challenge of fundamentally changing the way our industrial sectors function. For decades, Supervisory Control and Data Acquisition (SCADA) systems have played a significant role in industrial operations. Industries like oil and gas, electric power/smart grid, agriculture, and utilities have implemented SCADA systems and networks to collect data and automate processes, and are always looking to automation systems for more effective ways to operate. The capability to collect more data from geographically dispersed field assets in remote locations has driven the need for enhanced communication technologies. The number of sensors and data points collected will continue to rise dramatically with improved connectivity. This collected data helps operators improve operational decisions, save manpower and, in many instances, keep employees safe by avoiding dangerous environments. Today, industrial network operators are increasingly implementing end-to-end IP connectivity or the Internet of Things (IoT), enabling more capabilities at the edge of these networks. This does not make SCADA systems obsolete by any means; it opens the door to greater possibilities of enabling new applications and analytics with every single data point being captured in the system. There are many implications for the concept of a connected enterprise in terms of network security. Critical infrastructure projects are only as reliable and secure as the technology serving them. Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed. With security, the traditional trade-off is either “easy to use” or “secure”— but not both. We often consider features to be part of the equation, though in most cases operators are not willing to trade off features. Today’s security challenges Traditional SCADA systems have several challenges when it comes to security. With more data being transported than ever before, it’s important not only to secure assets, but to secure the communication link itself. Traditionally, SCADA systems have been on the outside of a firewall from the corporate IT network. Newer SCADA systems that use Ethernet devices are more security focused with measures such as VPN, secure sockets, encryption, and dedicated log-ins on the devices. Intelligent sensors offer value With the growing use of IoT technologies, operators must realize that the system is not only providing a communications path, but also enables intelligent sensors that provide additional value when using that path. Rather than just Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs) at the edge of the networks providing data, the sensors themselves may be running an application on the edge of the network, and many of these devices are using IP. IIoT sensors bring more capabilities and increased connectivity to these devices, and their full value may not be realized if the only connection to the device is through a PLC or RTU. Long-promised benefits, such as assessing predictive failure, become possible when the device can be accessed directly. IoT implies that data flow is no longer strictly controlled and only accessible via the SCADA system, but that data in any form from any device can be accessed by any system which needs it. There is no longer a reliance on SCADA system providers to support device compatibility if the data can be accessed through another means. With IoT, many industries are now looking at how every single asset, across every facility, can be connected through the internet (or an intranet), making data readily available to key decision makers, without the time and resource bottleneck of routing all of that information through a central SCADA system. When there is Ethernet everywhere and IP devices going out to the edge in the field, each one of those devices has the potential to become a threat to the entire corporate IT network if not secured properly. In comparison to a traditional SCADA system, this is a communication network on a much larger scale with thousands of potential end points. Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. This IoT data can be extremely useful, but safely enabling it requires a network that can meet the necessary security requirements. Using standards like TLS/SSL and basic AES-128 data encryption, secure connections can be established, even where data moves across an open network and it’s assumed that an unauthorized party could potentially see the traffic, such as in an Industrial IoT environment. When data is properly encrypted, an unauthorized party cannot access it even if they can see it. In wireless connections, standards-based connections allow relatively easy access to the moving data, leaving encryption as the only line of defense against snooping. The dangers that lurk in IT/OT convergence Traditionally, companies have a corporate firewall that divides the corporate IT space from operational technology (OT) space. With an IoT network this division is greatly reduced, and so there is a need to protect the sensors and new applications on the OT side. However, even with a secure communication

What We’re Thankful for in IIoT

As we approach Thanksgiving, we can’t help but reflect on what an unforgettable year it has been. Transformation and innovation have been at the forefront of the digital technology landscape as Industrial IoT emerged as a clear game changer. Businesses, looking to modernize and stay competitive, are changing the way they operate – and we are incredibly grateful that we get to play a small role in their efforts to adapt digitally. Businesses, especially those in the industrial and commercial sectors, now have the ability to incorporate intelligence and automation at the most remote edge of their networks. Today, we are looking at networks that can reliably monitor data, execute logic locally and enable visibility globally through the Cloud. In these times of transformation, learning, and change, we’ve found a lot of things to be thankful for. Here’s what we are thankful for in IIoT: Business Transformation and Beyond Businesses are transforming in ways we never thought possible thanks to the powers of automation through IIoT technology. Today, organizations are focusing on things like increased throughput, intelligent hardware, app dev and security as they look to improve their business operations. With the right set of technology in place, ROI happens fast and production is optimized.  With new approaches like fog and cloud computing we are expecting to see more bandwidth and better real-time data analytics in these types of networks where data is critical for operations. Beyond the business benefits, IIoT is set to improve things like environmental and seismic monitoring Edge Intelligence Businesses today have the option of leveraging low-power FHSS technology to automate processes at the network edge. The proliferation of smart sensors and high-bandwidth devices makes low-power FHSS technology a viable and cybersecure wireless data option. By employing FHSS technology, businesses can take advantage of intelligent edge communication devices that can be deployed as process automation nodes that make decisions and take action at the Access Level (or at the sensor or device). Increased Safety Thanks to devices at the edge and self-healing networks, IIoT has enabled environments where less manpower is needed in the field, facilitating a safer work environment in industries where field sites can be hazardous. Modern technologies can now collect data in remote and hazardous environments, significantly reducing the number of trips to unsafe locations. The reduction in man power in the field, allows companies to re-focus that man power where it’s needed to improve business operations. Opportunities for developers New hardware solutions have the ability to host third-party applications at the edge of the network. This has created a big opportunity for developers to create apps designed for IIoT needs. Additionally, as Node-RED programming has risen, it is has become feasible for non-developers to create proprietary applications without a computer engineering degree. Professional developer or not, there is plenty of room for app development in IIoT. IIoT is changing the way businesses operate and we now have the power to make decisions that optimize production and minimize downtime. As a technology provider in this space, it is an incredible opportunity to innovate and create solutions that meet both today’s needs and the demands of tomorrow. We’re thankful for the opportunity to innovate in this space, but most importantly we’re thankful for our employees, customers, and partners who are on this journey with us. Have a Happy Thanksgiving!  

IoT News Roundup: Where is IoT headed?

The holiday season is fast-approaching and it seems there’s always a never-ending list of tasks that need to be completed every year. Just like the holiday checklist, tech in the IoT space seems to be ever-changing and expanding. As tech leaders and innovators we understand that life is hectic and unpredictable, but to make sure you don’t miss a beat, check out this week’s line-up for news in the IoT industry. Previously, we explored “How IoT is Saving Lives” when two massive natural disasters struck the U.S. In this post, we’ll ask the question, what’s next for the world of IoT/IIoT? Take a look at some of the top stories from the past couple of weeks: Forrester predicts what’s next for IoT In this recent post from @NetworkWorld about Forrester Research’s predictions post, Fredric Paul, @TheFreditor, asks the question on many people’s minds: Where is IoT headed? Among many points Paul makes in his article, one points out how IoT is likely to become more specialized in the coming year, moving away from generic hardware and software into platforms designed for specific industries. So-called “design and operate scenarios” will let IoT developers focus on the attributes that matter most to their own industries and use cases. Smart networks must evolve for mission-critical environments   From @embedded_comp, Michael Ulch explains how the IoT industry has been flooded with advances in smart home automation, self-monitoring appliances, and connected security systems. All of these facets are important for the IoT existence but Ulch asks the same question as other reporters: what is next for IoT? Ulch believes that some of the greatest potential of the IoT is in the industrial and manufacturing realm, where Industrial IoT (IIoT) has the promise to monitor systems for preventative maintenance and boost energy efficiency and workplace productivity. However, Ulch says, successfully scaling from the smart home to the smart factory will require overcoming a number of technical challenges.   How manufacturers are benefitting from the IoT revolution In this @NetworkWorld article by Majid Ahmed, it’s made clear that few people stand to benefit more from the IoT revolution than today’s manufacturers. Ahmed states in his article that whether it’s harnessing the power of data and metadata to make wiser decisions, or developing new and more efficient technologies capable of saving energy cost, the IoT is fundamentally reshaping how manufacturers produce the goods we use in our everyday lives. Businesses not aware of IoT issues This article from @techradar by @maxcooter ‏ briefly starts off by referencing an article from January, 10 surprising trends in the IoT for 2017, then Cooter continues, stating that Cradlepoint survey finds lots of interest in technology deployment but lack of security awareness. Cooter points out that, from these findings, IoT-using companies should be prepared to have a thorough overhaul of its infrastructure before deploying the technology. Despite the serious concerns about security, most are not having a second thought about rolling out IoT. Will this security breach take down most companies? Time will tell.   The Industrial Internet of Things is Here to Stay In this article from @cbronline (Computer Business Review), author David Stain discusses how manufacturers are welcoming in a new era of productivity by enhancing Industry 4.0. The IIoT is at the heart of this transformation. Stain explores how a company’s success is often linked to its efficiency, hence visibility, across the plant floor, and how extending into the supply chain is a necessity. To keep pace with this competitive environment and the ever-increasing customer demands, every stage of the manufacturing process is facing the digital revolution. Final Thoughts: Virtually all industries and workers are benefitting from the technological revolution brought about by the inception and ensuring growth of IoT. Every industry does need to be cautious of the security threats that IoT comes with. Knowing this, we will still continue to see the growth for IoT especially in the manufacturing and Industrial industries.   Be sure to stay tuned to our blog for the latest industry news and to read more about our own insights into some of these major trends.

Four Ways to Optimize Your Operations for IIoT

The phrase, “the future is here,” is overused and has evolved into a catchphrase for companies struggling to position themselves in times of technological or digital transformations. Still, the sentiment is understood, especially in times like today, where the Internet of Things is quite literally changing the way we think about hardware and software. We’d like to offer an addendum to the phrase: “The future is here more quickly than we thought it would be.” Digital transformation, increased computing ability, smart hardware and the growth of connectivity capabilities created a perfect storm of accelerated industry, and many were left scrambling to sift through the large amounts of information and solutions available. With that in mind, we wanted to provide some advice for companies across the industrial sector for the best ways to optimize operations for the Industrial IoT. 1) Upgrade your network and throughput capabilities. Nothing can kill the ROI of automated processes more quickly than the literal inability to function. It’s important to understand that as you upgrade machinery and invest in the software to run it all, those systems demand greater bandwidth in order to effectively utilize the big data and analytics capabilities. Several options exist, but for most companies some combination of industrial-strength broadband (WiFi), narrow-band, cellular and RF communications will create the most effective network for the needs. 2) Invest in smart hardware. This may seem like a no-brainer, and really, in the not-too-distant future, you may not even have a choice, but the shift toward Fog Computing is gaining momentum and being able to run decentralized computing between hardware and the Cloud can not only create greater operational efficiency, but it can also allow your data transmission to run more smoothly as well. The beauty of a Fog Computing system is that it allows a greater number of devices to transmit smaller data packets, which frees up bandwidth and speeds real-time data analytics. The core of this lies in the smart hardware. 3) Be proactive about application development. Smart hardware means that it has the ability to host applications designed specifically for your needs. Previously, many companies shied away from app development because it required highly skilled developers and devices capable of hosting those apps – a combination that wasn’t readily available. Today, the scene has changed. With the rise of Node-RED, it is much easier today to create proprietary applications without a computer engineering degree, and any company serious about leveraging IIoT technology needs to be able to to use the full scope of its data. 4) Secure your communications. There isn’t much more to be said about the importance of cybersecurity. If the last few years of massive data breaches haven’t rung alarm bells, then you aren’t paying attention. Cybersecurity today is a multi-layered need. Most companies building smart hardware are beginning to build encryption directly into the devices. But, since many companies use Cloud applications for computing and analytics, it is important to invest in strong security measures at that level as well. Unfortunately, the sophistication of cyber-attacks are only going to increase, along with the increase in importance of the data needing to be protected. It pays to be paranoid and act accordingly.  

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.