'Tis The Season To Be Deploying Sensors

Deploying Sensors

Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list (Twice). In the end to produce two lists. The good list of kids. The bad list of kids. I am pretty sure I am on the bad list, again.

Cyber Physical Systems Wishlist

It is the season of giving. So far this year I’ve gotten two colds and a wooden Jaguar. Needless to say I kept the Jaguar (it is actually quite nice) and have done my best to get rid of the colds. I decided to share my wish list for Cyber Physical Systems for the next year to help spread the Christmas cheer!

1. Other than my two front teeth I also want Cyber Physical System device security. Replaceable security modules that can be quickly replaced without requiring the organization replace the entire CPS device.

2. A bicycle and Cyber Physical System data management. Perhaps a standard for and support of on device data, cached data, data in transit and also data on that cell phone in your pocket.

3. Please don’t bring me ghosts again Santa, five years in a row is enough. Beyond no ghosts I would also like to see a Cyber Physical Systems integration standard. The growing number of CPS devices deployed make it really hard to integrate everything. Going forward the value of integration for the devices will be critical.

It’s a short list and frankly I hope to get all of them by the end of the year. The concept of replaceable security modules within CPS devices is a great opportunity. That way you won’t have to replace your CPS devices as security standards change. You just replace the security hardware.

 

CPS or the more consumer Internet of Things (IoT) represents a growing number of systems. As more and more of these devices are deployed the opportunity for a single unified management standard will be of significant value. A unified management protocol and standard would allow organizations to implement devices knowing they can quickly connect and manage them!

The next concept is that of integration is critical for CPS. Today there are 10 billion devices in the world. They offer services, data and connection in any number of ways. A standardized approach to integrating all these devices will be a great present.

Santa knows the value of CPS and supply chain management. I suspect if you asked him what his holiday list was about it would be just that. Taking the integration framework and management framework and applying that to the entire supply chain. Know where your parts are at all times. Create a JIT (Just-in-Time) supply chain that doesn’t have parts paid for and waiting for parts that are delayed or still in transit. Have a system where the parts arrive and are paid for at the same time. Reduce the time from ordering parts to selling your system by managing where parts are in the system and when they will be in your facility. I think Santa would like such a system. I might even get off the naughty list.

By Scott Andersen

Digital Transformation – Updated Metrics for the Cloud Era

Cloud Era Metrics Undertaking digital transformation means also transforming how IT success is defined, including metrics that address business in the cloud.  With up to 90% of budgets spent keeping the lights on, cost is ...

Why ‘Cloud’ Should Be A Skill In This Age of Automation

The Age of Automation It is astonishing how the world around us is changing rapidly. More and more companies are now planning their move to the cloud and revamping their business models. Cloud computing has ...

The Criticality of Data Governance in a Multi-cloud Environment

The Criticality of Data Governance Multi-cloud has emerged as an enterprise favorite in almost no time.  In fact, Security Boulevard  makes a reference to a Forrester Research Report which confirms that almost 86 percent of ...

Identity Assurance – Sufficient and Necessary Conditions

Identity Assurance It is not easy to define the 'sufficient condition' for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto ...

The Top 20 Cybersecurity Startups To Watch In 2021

20 Cybersecurity Startups Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout ...

12 Cybersecurity CEOs On What Each Learned Leading During The Pandemic

Cybersecurity CEOs’ lessons learned from navigating the pandemic provide a valuable framework for leading and growing a business through anxious, uncertain times. How each cybersecurity CEO responds to the challenges of keeping employees safe, customers ...