Cyber Security - a New Challenge for Production (Management) Heiko Wolf, Manager R&D Program PSImetals FutureLab
|
|
- Marjorie Mason
- 6 years ago
- Views:
Transcription
1 Cyber Security - a New Challenge for Production (Management) Heiko Wolf, Manager R&D Program PSImetals FutureLab
2 The Challenge Complexity of IT-Systems is rising Landing on the moon with lines of code Today: Boeing 787: 6,5 million Mercedes S: 20 million Chevrolet Volt: 100 million Systems are becoming more interconnected Internet-of-Things, Industry 4.0, M2M, V2X, etc. Virtual infrastructures (Cloud, etc.) Dependency on IT is growing Smart Grid, Smart Home, Smart City, Smart Phone ecommerce, Digital Production, etc PSI - Software Excellence in Metals
3 Cybercrime Ransomware Source: Symantec Internet Security Threat Report PSI - Software Excellence in Metals
4 Motivation for Attacks Is Changing Cracker / Script Kiddies Cybercrime State-sponsored Attacks PSI - Software Excellence in Metals
5 Yes, It Happens PSI - Software Excellence in Metals
6 There s No Alternative to Digital Transformation Already today, the steel industry is automated to a degree. A complex and quality-focused production would be impossible without integrated IT systems PSI - Software Excellence in Metals
7 Industry 4.0 Turbo-Charging Digital Transformation PSI - Software Excellence in Metals
8 Getting Rid of the Pyramid From traditional integration layers To business driven connectivity Level 4 Level 3 Sensors / IoT HMI Level 2 unicast broadcast Service Bus synchronous asynchronous Process Control ERP / CRM Level PSI - Software Excellence in Metals
9 How Do These Attacks Work? Remote control, data exfiltration IT (Office/Enterprise Network) OT (Industrial Control Systems) Attacker Initial attack by phishing mail or drive-by download Office Users Lateral movement Distributed Control System (PLC s, etc.) Disrupting operations Firewall Firewall Internet Administrators Accessing the Process Control Network SCADA Systems PSI - Software Excellence in Metals
10 Social Engineering Effort to attack a system vs. reaching a goal If technical attacks are hard Social engineering Source: XKCD - Source: Microsoft Security Intelligence Report PSI - Software Excellence in Metals
11 Security Has Costs Setup effort Reduced comfort Reduced performance Money Level of security Pareto principle Effort PSI - Software Excellence in Metals
12 Good enough Security Economics A perfect security system is not necessary! Also not feasible/possible/affordable Too strong focus on one area risks neglecting others weakest link There are no secure systems, only degrees of insecurity (Adi Shamir) It s all about risk first thing should be a risk analysis A absolutely secure system that s not usable any more has the same business value as a system without any security Security Comfort Functionality Performance Find the balance that s right for you! PSI - Software Excellence in Metals
13 IT Security Definition of Risk According to ISO 73:2002: Risk: combination of the probability [ ] of an event [ ] and its consequence Threat Probability of occurrence Risk = Vulnerability Impact PSI - Software Excellence in Metals
14 Difference Between IACS / Office IT Industrial automation & control system General purpose information technology (IT) systems Availability Integrity Priority Confidentiality Integrity Confidentiality Availability PSI - Software Excellence in Metals
15 PSImetals Integrated Modules & Integrative Solution PSI - Software Excellence in Metals
16 PSImetals Comprehensive Support of End-To-End Processes Commercial Processes Sales Order Entry Pricing Purchasing Plant Maintenance Costing Billing Order Dressing Demand & Sales Planning Product Configuration Sales Order Dressing Production Order Elaboration Demand Management Sales & Operations Planning Due Date Quoting Scheduling Production Planning Delivery Order Scheduling & Material Allocation Flow & Order Planning Capacity & Campaign Management Transport Management (outbound) Caster & Melt Shop Scheduling Hot Mill Scheduling Cold Mill & Finishing Scheduling Net Demand Calculation Plate & Coil Combination Shipping Planning Production Execution & Material Logistic Production Order Life Cycle Material & Stock Management Schedule Execution Management Production Tracking Quality Control & Exception Management Warehouse & Transport Management Shipping Execution PSI - Software Excellence in Metals
17 Customer Risks from a Production Management System Confidentially Product configuration / steel grades Process know-how Algorithms / optimizations Availability Disruption of production due to no or limited availability of PMS Integrity Disruption of production due to corrupt data Production of sub standard quality metals Inaccurate reporting PSI - Software Excellence in Metals
18 Security by Design with PSImetals Organization Information Security Management System ISO27k certified Encryption Use latest standard to secure sensible data Authentication Use safe & up-to-date standard protocols xxxx Create Awareness Safe Data Transmission Updates & Recovery PSI - Software Excellence in Metals
19 Security by Design: Key Areas We Are Working On Processes within PSI Metals IT Technology and SW Development Process Project Implementation Methodology PSI - Software Excellence in Metals
20 Security by Design: Key Areas We Are Working On Processes within PSI Metals IT Technology and SW Development Process Project Implementation Methodology PSI - Software Excellence in Metals
21 Information Security Management Terms poses exploits Threat Create awareness leads to Improve processes and take measures Vulnerability addresses Manage and respond to incidents Asset may corrupt Risk Assess Safety Measure can be countered by Damage causes Classify and evaluate PSI - Software Excellence in Metals
22 Security by Design: Key Areas We Are Working On Processes within PSI Metals IT Technology and SW Development Process Project Implementation Methodology PSI - Software Excellence in Metals
23 Secure Software Development Lifecycle Core Security Training Establish Security Requirements Create Quality Gates / Bug Bars Security & Privacy Risk Assessment Establish Design Requirements Analyze Attack Surface Threat Modeling Use Approved Tools Deprecate Unsafe Functions Static Analysis Dynamic Analysis Fuzz Testing Attack Surface Review Incident Response Plan Final Security Review Release Archive Execute Incident Response Plan Training Requirements Design Implementation Verification Release Response Source: Microsoft SDL PSI - Software Excellence in Metals
24 Data Flow Diagram Steel Grade Maintenance Rich Client Java PSImetals GUI Login Screen DB- Session Order Dressing/ Edit Grade Data Third Party Systems e. g. Level 2 Application Server Java Database Server Oracle Client User/ Password Web Service DB Server-User/ Password Establish DB-Connection JDBC PSIauth Authentication/ Authorization Service Oracle Access Management PSIauth Database Scheme Permissions DB Client User/ Password Permissions DB Client User/ Password Establish DB-Connection JDBC Oracle Access Management Transactions Grade Data DB Server-User/ Password PSIintegration Communication Adapter Establish DB-Connection JDBC Oracle Access Management Business Logic PL/SQL PSImetals Factory Model Scheme Send Grade Data TCP/IP, Web Services, Grade Data PSI - Software Excellence in Metals
25 STRIDE Model Attack Target Example of an attack Examples of countermeasures Spoofing Person, Account, Application Impersonation, account take over, manin-the-middle attack Authentication with passwords, LDAP/AD, Oracle Wallet, encrypted communications Tampering Client application, database, configuration Usage of modified client, manipulation of Data in Database (e.g. grade data) Access control, digital signatures, integrity check (hashing, etc.), etc. Repudiation Application, Logs/History Query/manipulate data, manipulate logs Authentication, log access and actions, undo logs, timestamps, validation of data Information disclosure Network, Application, Database, Files Eavesdropping of data (e.g. passwords), access to sensitive data Encryption incl. key mgmt., access control (client/server/database) Denial of service Database, Application, Service Overload with complex queries, manipulate configuration Check input data / query parameters, integrity checks, quotas Elevation of privilege Database, Application, Network SQL-Injection, manipulated authentication information Input validation, programming style, integrity validation of authentication data PSI - Software Excellence in Metals
26 Security by Design: Key Areas We Are Working On Processes within PSI Metals IT Technology and SW Development Process Project Implementation Methodology PSI - Software Excellence in Metals
27 Product-based Project Methodology Come Together Meetings Get to know each other Project Methodology Next Steps Early Trainings On PSImetals Standard System Upgrades On PSImetals Release Pre-Project Project Maintenance Prime Analysis Checklists Project Schedule <-> Release Plan Proposal Scope of Supply Commercial Figures Timeline Terms & Conditions + Workshops Use Cases Fit-Gap-Analysis Specification Detailed Analysis Basic Configuration Faster ROI Robust System Highly Configurable Reduced Risks Shorter Project Duration Reduced TCO
28 Product-based Project Methodology Come Together Meetings Get to know each other Involve customer security experts Project Methodology Next Steps Early Trainings On PSImetals Standard System Install latest security fixes Upgrades On PSImetals Release Pre-Project Prime Analysis Proposal Checklists Project Schedule <-> Release Plan Scope of Supply Commercial Figures Timeline Terms & Conditions Offer different security options (tradeoffs) + Project Workshops Use Cases Fit-Gap-Analysis Security fit-gap-analysis and mapping to customer security guidelines Specification Detailed Analysis Setup security Basic measures Configuration Maintenance Faster ROI Robust System Highly Configurable Reduced Risks Shorter Project Duration Reduced TCO
29 Takeaways Importance of IT infrastructure is increasing but so are systems complexity and security threats! PMS is a part of critical infrastructure but technologies and security measures already available to ensure secure operation! Assess your risks and choose the right level of security (and availability, comfort, functionality )! Security should not be an afterthought but essential part of project methodology and corporate awareness! PSI - Software Excellence in Metals
30 Suddenly everything s that simple PSI - Software Excellence in Metals
Asset Tracking Solutions. Partial Controls and Features
Partial Controls and Features Cloud Hosting and Data Storage- No servers required - Allows you to focus on running your business. GPS On scan GPS location data captured Audit Data Timestamped to ensure
More informationOSS ENTERPRISE E-PRODUCUREMENT MANANGEMENT SYSTEM (ASP.NET) Version: ASP.NET (3) Updated: 4Q/2007, v:g/1 Reference: Core Application 0103/88
OSS ENTERPRISE E-PRODUCUREMENT MANANGEMENT SYSTEM (ASP.NET) Version: ASP.NET (3) Updated: 4Q/2007, v:g/1 Reference: Core Application 0103/88 1 CONTENT DESCRIPTION 1. INTRODUCTION 1.1 BUSINESS APPLICATIONS
More informationOCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary
OCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary OCTOPUS is a new and innovative Physical Security Information Management system (PSIM), which combines a comprehensive security management software
More informationPrimavera Analytics and Primavera Data Warehouse Security Overview
Analytics and Primavera Data Warehouse Security Guide 15 R2 October 2015 Contents Primavera Analytics and Primavera Data Warehouse Security Overview... 5 Safe Deployment of Primavera Analytics and Primavera
More informationSystem and Server Requirements
System and Server Requirements January 2019 For GreeneStep ERP, CRM, Ecommerce, Customer/Supplier Collaboration, Management Dashboards and Web Access Products Suite ON-PREMISE DEPLOYMENT MODEL & HOSTED
More informationThe Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,
More informationIndustrial IoT Solution Architecture Design From Connectivity to Data
Industrial IoT Solution Architecture Design From Connectivity to Data Cheryl Hsu Program Manager Strategic Engagement & Industrial IoT, Microsoft IoT Enables a Digital Feedback Loop The benefits are profound
More informationACHIEVE INNOVATION WITH CONNECTED CAPABILITIES Connected Product Maturity Model. white paper
ACHIEVE INNOVATION WITH CONNECTED CAPABILITIES Connected Product Maturity Model white paper EXECUTIVE SUMMARY The world is moving to connected products Companies will leverage the data and intelligence
More informationOSS BUSINESS INTELLIGENCE MIDDLEWARE (ASP.NET/3.0) 0501/86 APPLICATION SPECIFICATIONS, FEATURE SPECIFICATIONS & ILLUSTRATIONS
OSS BUSINESS INTELLIGENCE MIDDLEWARE (ASP.NET/3.0) APPLICATION SPECIFICATIONS, FEATURE SPECIFICATIONS & ILLUSTRATIONS VERSION: ASP.NET (2), V0G1 UPDATED: 4Q/2009 REFERENCE: MIDDLEWARE 0501/86 0501/86 WHITE
More informationDYNAMICS 365 live your future now
DYNAMICS 365 live your future now The time when purchasing a business information system was a complex and expensive project is long gone. All applications that are essential for conduct of business are
More informationAzure IoT Suite. Secure device connectivity and management. Data ingestion and command + control. Rich dashboards and visualizations
Azure IoT Suite Secure device connectivity and management Data ingestion and command + control Rich dashboards and visualizations Business workflow integration Move beyond building blocks with pre-configured
More informationCHAPTER 9 Electronic Commerce Software
CHAPTER 9 Electronic Commerce Software 2017 Cengage Learning. May not be scanned, copied or duplicated, or posted to a. publicly accessible website, in whole or in part, except for use as permitted in
More informationFamilies. Content. Ref Family: Areas. 1. What is AuraPortal. 2. Architecture. 10. Own Families
Families Content Ref. 0694 1. What is AuraPortal 9. Family: Areas GOAL Learn the main options in the AuraPortal Families and how to use and configure Permissions. 2. Architecture 3. Users 10. Own Families
More informationBlockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!
SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com Agenda Internet of Things (IoT) IoT Security Requirements IoT Security
More informationThe Business Process Environment
The Business Process Environment Flexible, Sensible Process Empowerment EMCONEX TECHNICAL BRIEF Richer Systems Group, Inc. February 2012 IDE Script Writer Alert System Audit Tracking Content Manager TABLE
More information1 P a g e. IT Tailored to Your Needs
1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,
More informationMaturing IoT solutions with Microsoft Azure
Maturing IoT solutions with Microsoft Azure Event Sponsors Expo Sponsors Expo Light Sponsors steefjan.wiggers@codit.eu +31 653 12 29 57 @SteefJan nl.linkedin.com/in/steefjan The next race Agenda How IoT
More informationLimitless Creativity in the Cloud
Limitless Creativity in the Cloud (Secure and on Schedule) Michael Krulik, Principal Solutions Specialist, Avid Joel Sloss, Sr. Program Manager, Microsoft Dec. 6, 2017 Emerging Threats Specific/sequential
More informationMOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper
MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle
More informationSeven Ways to Create an Unbeatable Enterprise Mobility Strategy
Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies
More informationIntroduction. Case for SAP Cybersecurity Framework
Agenda 3 Introduction Case for SAP Cybersecurity Framework Current state 5 ENTERPRISE SECURITY VULNERABILITY MANAGEMENT CISO NO EFFECTIVE OVERSIGHT SAP SECURITY SEGREGATION OF DUTIES NO VISIBILITY SLIPPED
More informationTMW Systems, Inc. TMW 3GTMS Integration Service Installation Guide
TMW Systems, Inc. TMW 3GTMS Integration Service Installation Guide Contact Information TMW Systems, Inc. 6085 Parkland Boulevard Mayfield Heights, Ohio 44124 U.S.A. www.tmwsystems.com Copyright and Trademarks
More informationJetstream Certification and Testing
PJM Interconnection 02/01/2016 This page is intentionally left blank. PJM 2016 www.pjm.com 2 P age Introduction Document Description PJM maintains and publishes a list of certified devices, software packages
More informationKeeping a Customer Focus in a Digital World
Keeping a Customer Focus in a Digital World Featuring: Kelly Squizzero, Infor Lisa Russell, Infor Chris Weaver, Infor Jenel Stelton-Holtmeier, Modern Distribution Management Sponsored by: November 17,
More informationAutomatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284
Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 David Wolf Snr Dir of Product Management - Oracle Oct 25, 2018 Session : PRO4284 Title: Automatically Find and
More informationExtending Enterprise to the Edge
Extending Enterprise to the Edge EXECUTIVE SUMMARY There is a lot of hype around the Internet of Things (IoT), especially with so many solution providers claiming to have end-to-end solutions. But when
More informationAWS MSP Partner Program Validation Checklist v3.2 Mapping
DATASHEET AWS MSP Partner Program Validation Checklist v3.2 Mapping OVERVIEW The AWS MSP Validation Checklist Mapping is designed to provide CloudCheckr partners with a practical means to validate the
More information2018 WTW General Industry Information Technology Compensation Survey Report - U.S.
FUN AID IT Development Designs, develops, modifies, adapts and implements short- and long-term solutions to information technology (IT) needs through new and existing applications, systems architecture,
More informationIT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.
ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate
More informationDovico Planning & Timesheet v4 BEST PRACTICES
Dovico Planning & Timesheet v4 Dovico Planning & Timesheet v4 Audience and Context This document is intended to help clients plan the configuration and use of Dovico Planning & Timesheet. It is to be used
More informationFrom Things to Value
From Things to Value How companies can benefit from Industry 4.0 April, 2017 Mario Schmuziger Swisscom Enterprise Customers - Industrial Internet of Things / Industry 4.0 Digitisation is nothing new 2
More informatione-commerce Technologies
Unit 16: e-commerce Technologies Unit code: K/601/1975 QCF Level 4: BTEC Higher National Credit value: 15 Aim The aim of this unit is to give learners an understanding of the functionality and technology
More informationDigital Twin & Augmented Reality. Usage of digital product models for product development, production and. service
Digital Twin & Augmented Reality Hannover, 26th April 2017 Usage of digital product models for product development, production and service Marco Liesegang, EY Advisory Service IoT / I4.0 Team Lead GSA
More informationThe Data Opportunity: Using data for economic and social benefit reaping the
The Data Opportunity: Using data for economic and social benefit reaping the benefits while addressing the challenges. Joseph Alhadeff/Vice President Global Public Policy, Chief Privacy
More informationWhat s new on Azure? Jan Willem Groenenberg
What s new on Azure? Jan Willem Groenenberg Why the cloud? Rapidly setup environments to drive business priorities Scale to meet peak demands Increase daily activities, efficiency and reduced cost. Why
More informationBelieve in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP
Believe in a higher level of IT Security SECUDE Business White Paper How to Improve Business Results through Secure Single Sign-on to SAP Executive Summary CIOs and IT managers face tremendous demands
More informationOracle s Hyperion System 9 Strategic Finance
Oracle s Hyperion System 9 Strategic Finance June 2007 Light Use... 3 Heavy Use... 3 Client Machine... 3 Server Machine... 3 Client Machine... 3 Server Machine... 3 Data Integration... 3 The Hyperion System
More informationPresented by: Purdianta, ST.,MT
Presented by: Purdianta, ST.,MT Introduction Modern organizations are considered highly complex networks of business units Each business unit realizes a part of the organization s business process Complexity
More informationFGFOA 2017 Focus on the Future
IT Modernization: Bringing Government from Obsolete to Cutting Edge FGFOA 2017 Focus on the Future Christine Horrocks, CPA/CFF, CGMA Brent Pruim, CPA Topics Covered State of the industry with respect to
More informationOpenText RightFax. OpenText RightFax OnDemand. Product Brochure. Benefits
OpenText RightFax OnDemand Benefits Reduced IT Load Managed by fax experts Disaster recovery service Redundancy options Complete Control Centralized fax management You own your data Bring and keep your
More informationBusiness IT Solutions, Security and Support
Business IT Solutions, Security and Support Who are we? The KJL Group were formed twenty years ago (1997) with a clear goal: to provide professional IT Management and digital services for SMB, SME and
More informationWHY COMMERCIAL REAL ESTATE FIRMS ARE EMBRACING OFFICE 365. Find out how out-of-the-box Cloud services in Office 365 can help you grow your practice
WHY COMMERCIAL REAL ESTATE FIRMS ARE EMBRACING OFFICE 365 Find out how out-of-the-box Cloud services in Office 365 can help you grow your practice INTRODUCTION COMMERCIAL REAL ESTATE FIRMS ARE JOINING
More informationHOW INTEGRATION WORKS...
Contents INTRODUCTION... 1 How to Use This Guide... 1 Software Editions Supported... 2 HOW INTEGRATION WORKS... 3 INTEGRATION RULES... 4 SYNC SETTINGS... 7 General Settings... 7 Send Settings... 8 Get
More informationCompiere ERP Starter Kit. Prepared by Tenth Planet
Compiere ERP Starter Kit Prepared by Tenth Planet info@tenthplanet.in www.tenthplanet.in 1. Compiere ERP - an Overview...3 1. Core ERP Modules... 4 2. Available on Amazon Cloud... 4 3. Multi-server Support...
More informationCloud as the enabler for new value chains
Cloud as the enabler for new value chains Dr. Christian Schlögel CTO KUKA AG Page: 1 Agenda Digitalization Enablers 2 Dimensions Value Stream Transformation of Value Chain Cloud Architecture What we can
More informationSIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.
Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE www.bglcorp.com Prepared by BGL Corporate Solutions Pty Ltd March 2018 CONTENTS 1.0 Overview of BGL s Web Applications 2.0 Data Sources and
More informationPresentation Title. Presenter. What research in SPLE is not solving in configuration. Arnaud Hubaux
Presentation Title What research in SPLE is not solving in configuration Presenter Arnaud Hubaux (contact@ahubaux.com) What research in SPLE is not solving in Configuration end-to-end ArnaudHubaux Closed
More informationCOURSE SLO ASSESSMENT 4-YEAR TIMELINE REPORT (ECC)
COURSE SLO ASSESSMENT 4-YEAR TIMELINE REPORT (ECC) BUSINESS DIVISION - COMPUTER INFORMATION SYSTEMS ECC: CIS Help Desk Operations SLO # Dealing with Customers Identify the communication strategies to build
More informationCASE STUDIES PREPARED BY:
CASE STUDIES PREPARED BY: Client: Electric Utility Client Location: North-India Project Type: Implementation of Enterprise Wide GIS System. PROBLEM STATEMENT One of a major utilities in North-India wanted
More informationDelivering high-integrity accounting with Xero
Delivering high-integrity accounting with Xero Contents Untouched data feeds directly into Xero 4 A multi-layered approach to data integrity 5 Access controls 6 Monitoring and alerts 7 Controls and reporting
More informationExternal Supplier Control Obligations. Information Security
External Supplier Control Obligations Information Security Version 8.0 March 2018 Control Area / Title Control Description Why this is important 1. Roles and Responsibilities The Supplier must define and
More informationA digitális átalakulás és az SAP infrastruktúra. Hargitai Zsolt üzletfejlesztési igazgató
A digitális átalakulás és az SAP infrastruktúra Hargitai Zsolt üzletfejlesztési igazgató zsolt.hargitai@suse.com Digital technologies and customer demands drive new operating models Available Accessible
More informationAtlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for
Corrective and Preventive Action System (CAPA) Product & Services Bundle for Atlant s atwatch CAPA TM Atlant Systems, Inc. (781)325-8157 team@atlantsystems.com Effectively Manage CAPAs Globally According
More informationAUGMENTED REALITY COLLABORATION SOLUTION FOR ENTERPRISE FIELD SERVICES
AUGMENTED REALITY COLLABORATION SOLUTION FOR ENTERPRISE FIELD SERVICES Use 8mm ratchet to open pressure module Don t close inlets Driving Value from Field Services Digitalization Digital transformation
More informationLAYOUTS CRYOGENIC-GASES TERMINAL AUTOMATION SYSTEM SYSTEM ACHITECTURE SYSTEM DESCRIPTION
LAYOUTS CRYOGENIC-GASES TERMINAL AUTOMATION SYSTEM SYSTEM DESCRIPTION CRYO.TAS was specially designed to fulfill all requirements for automated filling of cryogenic air gases, CO2 and gaseous H2. A tailor-made
More information20332B: Advanced Solutions of Microsoft SharePoint Server 2013
20332B: Advanced Solutions of Microsoft SharePoint Server 2013 Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment. Special areas of focus
More informationThe call to action for digital transformation. Uwe Kueppers Senior Business Consultant Rockwell Automation Chairman MESA EMEA
The call to action for digital transformation Uwe Kueppers Senior Business Consultant Rockwell Automation Chairman MESA EMEA What If... Teams are dynamic getting together and solve things! People are transforming
More informationSage 100. Sage Payroll Services Getting Started Guide
Sage 100 Sage Payroll Services Getting Started Guide This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service
More informationUpgrading to Maximo 7.6. Presenter: Jeff Yasinski
Upgrading to Maximo 7.6 Presenter: Jeff Yasinski About the Presenter: Jeff Yasinski Jeff is a Principal Consultant at Ontracks Canadian practice in the Edmonton office. He is an IBM Certified Deployment
More informationTOP 9 TECH CHALLENGES FOR NONPROFITS + SMALL BUSINESSES
TOP 9 TECH CHALLENGES FOR NONPROFITS + SMALL BUSINESSES Introduction Dealing with tech challenges may be the last thing on your to do list when it comes to running your organization. While IT may not be
More informationJD Edwards Component Global Price List December 21, 2017 Software Investment Guide
JD Edwards Global Price List December 21, 2017 Software Investment Guide only. Subject to change without notice. 1 of 12 J.D. Edwards Global Price List EnterpriseOne Customer Relationship Management Advanced
More informationManaging intelligent electronic devices
White Paper WP913001EN Managing intelligent electronic devices COOPER POWER SERIES As part of their Smart Grid initiatives, utilities have been deploying large numbers of Intelligent Electronic Devices
More informationLesson 3 Cloud Platform as a Service usages for accelerated Design and Deployment of IoTs
Lesson 3 Cloud Platform as a Service usages for accelerated Design and Deployment of IoTs 1 Large and Big Data platform Oracle IOT PaaS For delivering, integrating, securing and retrieving For analysing
More informationSession Number: 5 Proactive Remote Service Support
Abstract Session Number: 5 Proactive Remote Service Support S.R. Subramani ABB Australia Pty Limited The purpose is to explain how high equipment availability can be achieved by the pro-active, remote
More information5 STEPS TO AUTOMATE YOUR PRODUCT LIFE CYCLE A guide produced by Sweet Systems
5 STEPS TO AUTOMATE YOUR PRODUCT LIFE CYCLE A guide produced by Sweet Systems The foundation of the Internet of Things The foundation of the Internet of Things - IoT - is about device-to-device communication.
More informationOSS TENDER PORTAL MANAGEMENT SYSTEM (ASP.NET)
OSS TENDER PORTAL MANAGEMENT SYSTEM (ASP.NET) APPLICATION SPECIFICATIONS, FEATURES DESCRIPTIONS SCREEN SHOT ILLUSTRATION Version: ASP.NET (2) Updated: 3Q/2007, v-2 Reference: Middleware 0445/86 1. TECHNICAL
More informationPlantConnect SFactory
An ISO 9001:2008 company PlantConnect SFactory Smart Factory Solution www.plantconnect.net What is Smart Manufacturing PlantConnect SFactory About AIPL Smart Manufacturing What? A manufacturing system
More informationFujitsu Value Proposition for Manufacturing Industry. Enabling Digital with Connected Enterprise
Fujitsu Value Proposition for Manufacturing Industry Enabling Digital with Connected Enterprise Digital is different things to different people Business-model transformation Transforming customer & user
More informationSAP Monitoring: Performance Management Your Business Can Count On
E-PAPER SAP Monitoring: Performance Management Your Business Can Count On Using the right tools and techniques, you can identify, understand, and predict performance issues and bottlenecks before users
More informationWHITE PAPER. CalAmp Connect An Enterprise M2M Application Enablement Platform
WHITE PAPER CalAmp Connect An Enterprise M2M Application Enablement Platform EXECUTIVE SUMMARY In today s complex, competitive landscape, it is no longer enough to have a basic M2M solution in place. Increased
More informationAn introduction to MediaSales Traffic
An introduction to MediaSales Traffic Today's radio market is changing. Radio stations are consolidated into larger groups, and advertisers set higher standards for speed and flexibility. As competition
More informationBlockchain Unleashed TM Forum 1
Blockchain Unleashed 2018 TM Forum 1 Contents Introduction Catalyst team Blockchain for CSPs Criteria for use case section Use case scenarios Use cases for blockchain in CSPs Use case 1: Elimination of
More informationSupplier Security Directives
Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia
More informationDesign of Manufacturing Information System using Advanced PLC and Server Controls
Design of Manufacturing Information System using Advanced PLC and Server Controls Ann Jessy Jose 1, V Bagyaveereswaran 2, Md Ashik 3, PG Student [CA], SELECT, VIT University, Vellore, Tamil Nadu, India
More informationWhere s the value in IIoT?
1 Innovate Design Develop Create Value Where s the value in IIoT? 22 nd September 2017 David Griffin 42 Technology Ltd www.42technology.com 2 What I plan to cover Introduction 10 ways the technology and
More informationSuper Schlumberger Scheduler
Software Requirements Specification for Super Schlumberger Scheduler Page 1 Software Requirements Specification for Super Schlumberger Scheduler Version 0.2 Prepared by Design Team A Rice University COMP410/539
More informationElisa IoT. From idea to a product in weeks
Elisa IoT From idea to a product in weeks Industry 4.0 Next step in productivity through digitalization of products and services Smart connected products Online services based on real time data and analytics
More informationMaximo Webcast Series
IBM Software Group Maximo Webcast Series Maximo Integration Basics Frank Vanderham, PhD Ontracks Consulting April 30, 2008 Trouble seeing or hearing us? Call 780-293-6307 2007 IBM Corporation Outline The
More informationMANUFACTURING EXECUTION SYSTEM
MANUFACTURING EXECUTION SYSTEM Critical Manufacturing MES, a comprehensive, proven and innovative software suite, empowers operations to move into future visions such as Industry 4.0. Compete better today
More informationSAP Product Road Map SAP Identity Management
SAP Product Road Map SAP Identity Management Road Map Revision: 2016.09.15 Customer Template Revision: 20160104 v4.1 Legal disclaimer The information in this presentation is confidential and proprietary
More informationProvide Your SAP Applications the Best Response Time, Tightest Security and Highest Availability with Radware s Certified Solution
Provide Your SAP Applications the Best Response Time, Tightest Security and Highest Availability with Radware s Certified Solution The Challenge SAP applications serve as the missioncritical infrastructure
More informationIBM Business Automation Content Services on Cloud
Service Description IBM Business Automation Content Services on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized
More informationMaturing IoT solutions with Microsoft Azure. Glenn Colpaert Azure/IoT Domain
Maturing IoT solutions with Microsoft Azure Glenn Colpaert Azure/IoT Domain Lead @GlennColpaert Who we are 2000 Belgium 2004 France 2013 Portugal 2016 Switzerland 2016 UK 2016 The Netherlands 2017 Malta
More informationStat Production Services for Oracle E-Business Suite (Onsite and Remote)
Stat Production Services for Oracle E-Business Suite (Onsite and Remote) Description The Stat Production Services for Oracle E-Business Suite is designed to assist the customer with the implementation
More informationpower up your business DIGITISE YOUR BUSINESS PROCESSES Entry Level
DIGITISE YOUR BUSINESS PROCESSES Entry Level TABLE OF CONTENTS 1 Understanding back office systems 2 Packaged, online subscription and hybrid models 3 Data Storage and security 4 Types of back office system
More informationAccelerating Industrial Performance. Copyright 2014 Rockwell Automation, Inc. All Rights Reserved.
Accelerating Industrial Performance By 2020 1 billion new middle class consumers will add $8T to consumer spending Increased Demand on Industrial Production GLOBAL POPULATION TRENDS INCREASE DEMAND FOR
More informationOur Services. Staff Augmentation Provision of quality resources Long term, medium term and short term engagements
May 2015 Executive Summary is a key partner of Oracle, specialized in implementation of the Oracle solutions and has strong domain knowledge and a team of skilled and certified Oracle consultants. We have
More informationT13 - The Future of Manufacturing in a Connected World
T13 - The Future of Manufacturing in a Connected World PUBLIC Today s Discussion Why we build Connected Enterprises How to achieve a Connected Enterprise today with multi-capability industrial architectures
More informationFujitsu Value Proposition for Manufacturing Industry. Enabling Digital with Connected Enterprise
Fujitsu Value Proposition for Manufacturing Industry Enabling Digital with Connected Enterprise Digital is different things to different people Business-model transformation Transforming customer & user
More informationDigitalization to enable the Future of Manufacturing
Siemens Ltd Taiwan / Tino Hildebrand Digitalization to enable the Future of Manufacturing Unrestricted / Siemens AG. All Rights Reserved. Digitalization to enable the Future of Manufacturing Realizing
More informationT²Enterprise. Mapping Communication Translation Management. T 2 Tran. EDI solution Translation/transport Monitoring/tracking.
Systrends T²Enterprise Mapping Communication Translation Management T 2 Mapper T 2 Com T 2 Tran T 2 App Mapping solution Data transformation Data conversion EDI solution Translation/transport Monitoring/tracking
More informationWORKFLOW AUTOMATION AND PROJECT MANAGEMENT FEATURES
Last modified: October 2005 INTRODUCTION Beetext Flow is a complete workflow management solution for translation environments. Designed for maximum flexibility, this Web-based application optimizes productivity
More informationVaribill Implementation Plan On-Premise
Varibill Implementation Plan On-Premise Last Modified: 2017/02/09 6:12 AM Version: 27.0 Page 1 of 12 Table of Contents 1. Introduction... 3 1.1. Purpose... 3 1.2. System Overview... 3 1.2.1. Assumptions
More informationOperational Level Agreement: SQL Server Database Incidents and Requests
Operational Level Agreement: SQL Server Database Incidents and Requests Version 0.4 02/19/2015 Contents Document Approvals Operational Level Agreement Overview Description of Services Services Included
More informationPosition Description. Job Summary: Campus Job Scope:
Position Description Requisition # 03020430 Position Number: 02019533 Dept: ENT APPS & INFRASTRUCTURE SVCS - 061419 Position: WINDOWS SYSTEM APPLICATION ADMINISTRATOR Approved Payroll Title 0520 Code:
More informationJaap Burgerhout Marcel Riemen Erwin Jaikaran Harold Beers. Heidelberg (Germany) May 2000
Jaap Burgerhout Marcel Riemen Erwin Jaikaran Harold Beers Heidelberg (Germany) May 2000 OSS Gateway Framework Business Process Management Module Web Server Oracle Database XML Engine Integration Engine
More informationHardware. This white paper will discuss the realities of IIoT and review the 7 key success factors for software monetization, including:
7 Steps to Grow Profits in Industrial Automation Create New Revenue Streams with Software Monetization Processes Software Data The Industrial Internet of Things (IIoT) is changing the way goods are planned,
More informationAutomating Your Hyperion EPM and BI Environments. Tom Tortolani, VP Products January 2010
Automating Your Hyperion EPM and BI Environments Tom Tortolani, VP Products January 2010 About Star Analytics Star Analytics is the leader in Finance Application Process Automation software, offering a
More informationVISUAL Business Objects David Giusto, Technical Services Specialist, Synergy Resources
VISUAL Business Objects David Giusto, Technical Services Specialist, Synergy Resources 1 Session Background Updating the VISUAL database with external data must be done in a manner that preserves the integrity
More informationInfor Cloverleaf Integration Suite
Healthcare Infor Cloverleaf Integration Suite With the Infor Cloverleaf Integration Suite, you ll have an end-to-end integration platform that addresses the fundamental obstacles to healthcare integration,
More information