santa-wish-list

‘Tis The Season To Be Deploying Sensors

Deploying Sensors

Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list (Twice). In the end to produce two lists. The good list of kids. The bad list of kids. I am pretty sure I am on the bad list, again.

Big-Data-Santa

Cyber Physical Systems Wishlist

It is the season of giving. So far this year I’ve gotten two colds and a wooden Jaguar. Needless to say I kept the Jaguar (it is actually quite nice) and have done my best to get rid of the colds. I decided to share my wish list for Cyber Physical Systems for the next year to help spread the Christmas cheer!

1. Other than my two front teeth I also want Cyber Physical System device security. Replaceable security modules that can be quickly replaced without requiring the organization replace the entire CPS device.

2. A bicycle and Cyber Physical System data management. Perhaps a standard for and support of on device data, cached data, data in transit and also data on that cell phone in your pocket.

3. Please don’t bring me ghosts again Santa, five years in a row is enough. Beyond no ghosts I would also like to see a Cyber Physical Systems integration standard. The growing number of CPS devices deployed make it really hard to integrate everything. Going forward the value of integration for the devices will be critical.

It’s a short list and frankly I hope to get all of them by the end of the year. The concept of replaceable security modules within CPS devices is a great opportunity. That way you won’t have to replace your CPS devices as security standards change. You just replace the security hardware.

connected-devices

CPS or the more consumer Internet of Things (IoT) represents a growing number of systems. As more and more of these devices are deployed the opportunity for a single unified management standard will be of significant value. A unified management protocol and standard would allow organizations to implement devices knowing they can quickly connect and manage them!

The next concept is that of integration is critical for CPS. Today there are 10 billion devices in the world. They offer services, data and connection in any number of ways. A standardized approach to integrating all these devices will be a great present.

Santa knows the value of CPS and supply chain management. I suspect if you asked him what his holiday list was about it would be just that. Taking the integration framework and management framework and applying that to the entire supply chain. Know where your parts are at all times. Create a JIT (Just-in-Time) supply chain that doesn’t have parts paid for and waiting for parts that are delayed or still in transit. Have a system where the parts arrive and are paid for at the same time. Reduce the time from ordering parts to selling your system by managing where parts are in the system and when they will be in your facility. I think Santa would like such a system. I might even get off the naughty list.

(Image Source: Shutterstock)

By Scott Andersen

Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

CONTRIBUTORS

The New Kids On The Block: Data Protection Officers

The New Kids On The Block: Data Protection Officers

Data Protection Officers The General Data Protection Regulation (GDPR) is officially here. Yet, organizations are still unaware, are ignoring, or ...
Over 100 New Ransomware Families Discovered Last Year

Over 100 New Ransomware Families Discovered Last Year

100 New Ransomware Families The world in 2016 sees a rapid rise of ransomware attacks that are increasingly targeting specific ...
Ransomware's Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to ...
5 Simple Tips to Help Avoid Ransomware

5 Simple Tips to Help Avoid Ransomware

5 Tips to Avoid Ransomware Ransomware is a particularly pernicious form of malware: unsatiated by simply using your system as ...
Cloud Computing In Education

Cybersecurity Policies Must Address Internal Threats

Cybersecurity Policies The contentious U.S. election campaign offered up many highlights, but the aftermath of election night – explosive cyberattack ...
Chris

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

Security Issue In order to stay ahead in today’s competitive business landscape, companies need to constantly innovate. Development teams must ...
Security Audits, Cyberattacks and other Potential Front Line Issues

Security Audits, Cyberattacks and other Potential Front Line Issues

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
IoT Trends

The Internet of Attacks: Disturbing Online IoT Trends

Disturbing Online IoT Trends If you thought the worst thing to come out of the Internet of Things (IoT) trend ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...