Improving Predictive Maintenance Time-to-Value with Real-Time Visual Edge Analytics

Similar documents
AXON PREDICT ANALYTICS FOR VXWORKS

Extending Enterprise to the Edge

Industrial IoT: From Concept to Business Reality. Improving O&G Operations with IoT. Progressing through the 5 Stages of IoT

Why Machine Learning for Enterprise IT Operations

Baseline assessments. The Connected Enterprise Execution Model. Stage 1. Data and reporting. Network infrastructure

Delivering Business Results for Connected Industrial Systems

White Paper: VANTIQ Competitive Landscape

Industrial Connected Product Solutions

Software Platform Design Strategies for Critical Infrastructure

Five Stages of IoT. Five Stages of IoT 2016 Bsquare Corp.

DLT AnalyticsStack. Powering big data, analytics and data science strategies for government agencies

Predix Asset Performance Management. A Digital Mine solution

1 P a g e. IT Tailored to Your Needs

Secure SoC Manufacturing: Foundation for a Connected World

Why an Open Architecture Is Vital to Security Operations

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS

Secure information access is critical & more complex than ever

Control Anything. Gain Insights. Connect Things. Action. 10% of the data on earth will come from IoT by B connected devices by 2020

EXPERIENCE EVERYTHING

Asset Performance Management from GE Digital. Enabling intelligent asset strategies to optimize performance

Turn predictability into productivity.

SUSiEtec The Application Ready IoT Framework. Create your path to digitalization while predictively addressing your business needs

Cognitive IoT unlocking the data challenge

PROACTIVE ADOPTER SERIES: Transforming communication and engagement through mobility

MAPR: THE CONVERGED DATA PLATFORM FOR MANUFACTURING

Intelligent Equipment

Network Optimization Handbook. Your Guide to a Better Network

GE Intelligent Platforms. Proficy Historian HD

INTRODUCTION TO THINGWORX. Petr Holy Head of Sales Eastern Europe. February 2 nd, 2016

The Internet of Things Platform

THE CASE FOR CONNECTED MANUFACTURING

IoT ENABLED INTELLIGENT FLEET MANAGEMENT. Kalman Tiboldi Chief Business Innovation Officer

The Next Level Industrial Revolution. Top 10 Business Opportunities in Manufacturing IoT

Fraud Controls to Tackle the Mobile Revolution

Eliminating Blind Spots in Commercial Trucking with IoT

The Internet of Things: Unlocking New Business Value. Let Oracle energize your business with IoT-enabled applications.

Why Connecting to the Internet of Things Project List

Smart Machines & Equipment. Delivering on the Promise of The Connected Enterprise

Automotive Parts Supplier Launches IoT Initiative in SixWeek Sprints Powered by PTC. IoT Manufacturing Solutions. The Customer CASE STUDY

Asset Avatars. Get a 360-Degree View of Your Assets. By Hitachi Vantara

Acquiring and Processing Data at the Edge of the Energy Grid

Predix Asset Performance Management. Enabling optimal asset reliability, availability, and performance

HID Location Services and Condition Monitoring. Enabled by Bluvision

HID Location Services and Condition Monitoring. Enabled by Bluvision

PROACTIVE ADOPTER SERIES: Embracing foundational benefits of IT security

Siemens. MindSphere. The cloud-based, open IoT operating system.

The cloud-based, open IoT operating system

The Time is Right for Optimum Reliability:

Enterprise Asset Management STREAMLINE FACILITY MAINTENANCE OPERATIONS & REDUCE COSTS

Qlik Sense. Data Sheet. Transform Your Organization with Analytics

Bridging the Gap between Operations and Information Technology

You can plan and execute tests across multiple concurrent projects and people by sharing and scheduling software/hardware resources.

I n d u s t r i a l IoT Platforms Pave t h e W a y f o r t h e S m a r t F a c t o ry

Oracle Management Cloud

You can plan and execute tests across multiple concurrent projects and people by sharing and scheduling software/hardware resources.

Infor Service Management for manufacturing and distribution

Why Connecting to the Internet of Things Project List

THE FIVE BUILDING BLOCKS OF AN EXCEPTIONAL WEB EXPERIENCE. Your guide to winning the personalization race.

BMC MainView: Holistic Systems Management Made Possible

ADVENT ONE. The Dynamic Demands of IoT in a Connected World

Mastering the operational complexity of IoT Applications

Enable Business Transformation In Banking & Financial Services Organizations through Connected Devices. Arvind Radhakrishnen.

Fulfilling CDM Phase II with Identity Governance and Provisioning

Spreading IT resources too thin

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.

Infor CloudSuite Equipment Rental

Sphera is the largest global provider

Automation University Aarau 2017

IoT in Oil & Gas: Don t Get Left Behind

Asset Performance Management with Oracle Utilities Work and Asset Cloud Service

TOP 6 SECURITY USE CASES

EARLY DETECTION OF ADVANCED PERSISTENT THREATS IN THE PAYMENTS SECTOR

HID Global Workplace Optimization. By Bluvision

Close the Productivity Gap with Overall Equipment Effectiveness (OEE)

Four IoT Platform Must-Haves That Can Accelerate Your IoT Deployment

4/26. Analytics Strategy

BUSINESS CASES & OUTCOMES

The business owner s guide for replacing accounting software

VULNERABILITY MANAGEMENT BUYER S GUIDE

Cloudera Data Science and Machine Learning. Robin Harrison, Account Executive David Kemp, Systems Engineer. Cloudera, Inc. All rights reserved.

Infor CloudSuite solutions Flexible, proven solutions designed for your industry. Infor CloudSuite

THINGWORX INDUSTRIAL INNOVATION PLATFORM. Jens Peter Hervil. PTC/User Nyborg

The four steps of Digital Transformation. Andrew Smith General Manager, Sales Strategy & Operations IoT Device Partners, Microsoft

Security intelligence for service providers

Data: The Renewable Resource for Digital Reinvention

Luminant Tests First Nuclear Industry Large-Scale Wireless Monitoring System

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Azure IoT Suite. Secure device connectivity and management. Data ingestion and command + control. Rich dashboards and visualizations

Moving to Mobility: The Data Collection Checklist

Modernize your grid: Simplify smart metering with an intelligent partner.

Transform Application Performance Testing for a More Agile Enterprise

CAT EALTH MINESTAR SYSTEM

VULNERABILITY MANAGEMENT BUYER S GUIDE

Keep It Simple. White Paper

A NEW WORLD OF DATA DEMANDS A NEW APPROACH WELCOME TO THE NEW ERA OF PERVASIVE DATA INTELLIGENCE

OS A superior platform for business. Operate seamlessly, automatically, and intelligently anywhere in the world

IoT Business Brief Industrial Manufacturing Business

Azure PaaS and SaaS Microsoft s two approaches to building IoT solutions

Achieving True Enterprise Mobility:

Spotlight Monitoring System

Transcription:

Improving Predictive Maintenance Time-to-Value with Real-Time Visual Edge Analytics WHEN IT MATTERS, IT RUNS ON WIND RIVER

EXECUTIVE SUMMARY Connected computing solutions are deployed worldwide in many different markets, including industrial automation, networking, healthcare, energy generation, transportation, and more. As more and more machines are managed by networked smart devices, the potential of predictive maintenance expands exponentially. Predictive maintenance has the dual benefit of optimizing equipment uptime and performance while reducing the time and labor associated with inspections and preventive maintenance. This paper compares predictive maintenance with the traditional methods used to maintain deployed assets in the Internet of Things (IoT), exposing the latter as a costly, labor-intensive process that cannot ensure failure won t occur between inspections. TABLE OF CONTENTS Executive Summary... 2 Introduction.... 3 Traditional Approaches to Asset Maintenance... 4 Real-Time, Visual Edge Analytics for Predictive Maintenance... 4 The Predixion and Wind River Solution.... 4 IoT Security with Wind River Helix Device Cloud.... 5 Multiple Layers of Protection and Exhaustive Mitigation Strategies... 5 Combined Solution Architecture... 6 Extending Predixion Analytics to the Cloud.... 7 A Seamlessly Integrated IoT Solution for the Highest Level of Security... 7 Conclusion.... 7 2 White Paper

INTRODUCTION Connected devices and machines are an integral part of operations in just about every industry today. Whether in a factory, mine, fleet, hospital, or home, these devices are producing a massive amount of data, which is projected to reach 1,600 exabytes by the year 2020 (ABI Research, Competitive Edge from Edge Intelligence IoT Analytics Today and 2020, May 1, 2015). Many organizations are scrambling to securely capture and harness the power of IoT information so they can apply real-time operational insights regarding the health of the devices and their environment and get ahead of unplanned downtime. Organizations are looking for faster ways to realize the value of sensor information and transform it into predictive maintenance insights that users can act upon instantly. According to ABI Research, only 10% of today s IoT-generated data is ever put to use, and even less makes it to the cloud for deeper analysis. Unfortunately, the common approach is to amass all this sensor data to the cloud and treat it as a Big Data or data lake problem. But this approach misses how Moore s Law has altered the landscape of devices and gateways. The processing power of devices and gateways at the edge now rivals that of small computers just a few years ago yet the volume and velocity of IoT data require that real-time analytics move closer to the edge, not closer to the cloud. The result of this edge paradox is that informed decisions are never made, because insight comes too late in the data chain to use in making timely decisions that impact business outcomes. Cloud-Based Analytics Advances in edge computing and IoT data analytics have created an opportunity to transform the way maintenance is performed in a variety of environments, across all industries from factories to fleets. By implementing a next-generation edge architecture for real-time advanced analytics at the edge, organizations can realize significant cost savings by reducing unplanned machine downtime and optimizing procurement for parts and service. Edge analytics helps customers make informed decisions sooner rather than later. To eliminate the guesswork and truly evolve into a predictive enterprise, organizations apply modern, edge-based architectures designed to capitalize on streaming machine sensor data to instantly deliver actionable insights in time to predict and avoid any any unplanned maintenance and downtime. To solve the problems posed by the edge paradox, Predixion and Wind River have created a joint IoT edge analytics solution that provides predictive maintenance capabilities by easily connecting customers devices to a secure, scalable platform for real-time, visual, streaming analytics through a high-performance Wind River powered gateway packed with advanced analytic processing power. Predixion s visual edge analytics software, Predixion RIOT One (for gateways), Predixion RIOT Nano (for devices), and Predixion RIOT Enterprise (for the cloud), along with Wind River Helix Device Cloud, a cloud-based platform for connecting and managing IoT devices, together provide the necessary infrastructure to rapidly and securely deliver high-value predictive insights that dramatically reduce maintenance costs and avoid expensive equipment failures and downtime. Edge-Based Analytics GATEWAY GATEWAY GATEWAY Insight Insight Insight USERS USERS Figure 1. Cloud-based vs. edge-based analytics 3 White Paper

TRADITIONAL APPROACHES TO ASSET MAINTENANCE Historically, companies have sent field technicians out to perform routine diagnostic inspections and preventive maintenance according to fixed schedules. This is a costly, labor-intensive process with little assurance that failure won t occur between inspections. Despite the traditional preventive measures put in place to avoid downtime, asset maintenance is often rife with unexpected failure, requiring unplanned maintenance. Traditional checklists or quality control procedures provide insight, but only after the devices and assets have begun to show signs of failure, or have even already failed. Preventive maintenance is required by most organizations, but with schedules that have been predetermined by the device manufacturers, these schedules often lead to replacement of parts well before they re required. Unnecessary part replacement and unrequired servicing creates tremendous expenses, especially considering that the maintenance may not be based on any operational data or preventive analysis. When unforeseen device failures occur, organizations typically move to a reactive maintenance model, which is prohibitively expensive and substantially inefficient. Due to a lack of information, service technicians are left scrambling to limit operational losses and bring equipment back online. Predictive maintenance using edge analytics catches the issues early and at the source to identify and address potential machine issues and failures before they happen. It also optimizes the end-to-end service operations and results in an overall improvement in asset reliability and performance. REAL-TIME, VISUAL EDGE ANALYTICS FOR PREDICTIVE MAINTENANCE The value of implementing an IoT strategy for predictive maintenance using Intel gateways, Wind River Helix Device Cloud, and Predixion RIOT for edge analytics is that maintenance becomes real-time, dependable, secure, and truly predictive. By using realtime analytics to perform timely maintenance on assets, an organization can move away from reactive maintenance. Predictive maintenance maximizes the lifespan of a connected device and ensures optimized production using actionable, advanced visual analytics to keep a watchful, predictive eye on operations. In industries such as oil and gas, even one unanticipated oil rig component breakdown could have catastrophic effects on the overall system, and potentially even become dangerous. Additionally, the resulting unplanned downtime could be hours, days, or even weeks, depending on the severity of the problem and the complexity in returning to normal operations. This example illustrates the tremendous value in harnessing the device data as part of an overall IoT strategy, so problems can be seen well before they get to the point of severity. Visual insight and predictive analytics not only help avoid unanticipated failures, but also optimize overall operations while significantly reducing overall resource and repair costs. THE PREDIXION AND WIND RIVER SOLUTION To deliver this data-driven predictive maintenance solution, Intel gateways with Device Cloud provide the infrastructure and device management to securely connect and manage gateways and devices at the edge, at scale. Predixion s RIOT edge analytics solutions provide instant-on actionable insight by delivering realtime advanced visual analytics surfaced in any modern browser. Together, this seamless end-to-end solution provides: Rapid deployment: Organizations can dynamically deploy advanced analytics on-device, on-gateway, or in the cloud using Device Cloud and Predixion RIOT. Deep security: Multiple layers of security protect against everevolving security threats and device intrusion attempts. Continuous actions: Advanced analytics at the edge support both connected and partially connected environments, so decisions can be made in real time or connection-time. Action-oriented visual analytics: Device Cloud and Predixion RIOT Edge Analytics allow organizations to conduct predictive maintenance and predictive operations management, with workflows triggered by the output of the analytics. The secure connection provided by Device Cloud on Intel gateways allows for device management at the edge, including software and model updates for Predixion RIOT edge analytics in real time. With these real-time, actionable insights, customers can make data-driven decisions based on real-time analytics across their entire field deployment, rather than the more subjective methods previously used. 4 White Paper

IOT SECURITY WITH WIND RIVER HELIX DEVICE CLOUD While the case for implementing an IoT strategy and transforming to a predictive maintenance model is clear, this approach also requires that organizations inherently support security and protect IoT systems from all threats. Device Cloud delivers highly advanced and effective security, developed to address the fact that piecemeal approaches simply do not work. It is imperative that the IoT strategy start at the design stage and extend throughout the application lifecycle. Most security threats fall into six categories, and an end-to-end mitigation strategy must provide security and protection from all of them, from the most common threat to the most sophisticated. MULTIPLE LAYERS OF PROTECTION AND EXHAUSTIVE MITIGATION STRATEGIES The strategies deployed to secure IoT implementations can be organized by the types of threats organizations are vulnerable to, classifying attacks that come from a variety of sources into a few distinct categories. One insidious and common method of attack is known as social engineering, which refers to the ability of hackers to obtain security credentials from legitimate users through various means, such as phishing or even blackmail. With its security protocol, Wind River designs in fundamental safeguards, including strong passwords, frequent password updates, role-based permission and access, and software updates that instruct users when common vulnerabilities and exposures (CVEs) have been encountered. But these measures are not enough to address attacks, especially those on hosted components, so Wind River also requires API authentication tokens along with role-based access that whitelists applications to protect against impersonation at the cloud level. Hackers trying to gain access to software at the device level in order to disrupt or take control of the system are met with an impenetrable wall, effectively blocking the successful execution of varied hacking techniques, including denial of service, malware installation, false identities, elevation of privilege, jail breaking, and others. Authenticity and integrity is maintained with secure boot, upto-date software, and an ever-growing library of potential CVEs, addressing them with strategy contained in secure package management (SPM), authentic updates, and signature keys. Users are alerted well before new CVEs are widely known, effectively mitigating the risk. Built into the architecture, integrity measurement verifies the authenticity of running code. Compartmentalizing software into separate containers provides isolation so that a potential breach does not reach the rest of the system, effectively corralling and trapping the hacker attempting to gain access through a software component before they can execute an elevation of privilege in an effort to gain access to the system as a whole. Should a device be stolen and replicated or reverse-engineered in an attempt to steal credentials or other sensitive data, several systems guard devices and data. File system encryption ensures that stolen data cannot be read or copied, and trusted platform modules (TPMs) store encryption keys used to authenticate the hardware on which the host system is running. The integrity of all the different parts of an IoT system throughout its lifecycle can be remotely checked through a management console, allowing the devices to query at any time to confirm identities and verify that no tampering has occurred. Real-time machine data analyzed by Predixion RIOT on Device Cloud provides data-, device-, and analytic-level security to protect networked assets that may be vulnerable to network compromises or man-in-the-middle attacks. In these attacks, hackers attempt to hijack a session to enter a network to disrupt, block, or alter communication between devices and Device Cloud a type of attack of particular concern to an IoT system. By deploying highly varied sets of encryption methods to protect data in transition by streaming data and rendering it unreadable to hackers in the event of a breach, Device Cloud addresses these types of security threats. Lastly, and sometimes at the hand of a well-meaning developer, security misconfiguration can leave an IoT application vulnerable to system-wide attacks intended to find and exploit weaknesses. This threat can also be the result of home-grown or incomplete solutions that are not intended to be a component in an overall IoT strategy or solution. When standalone solutions are knitted together to build an IoT strategy that is ad hoc, they can leave several blind spots and lack executive oversight often providing a false sense of security. 5 White Paper

COMBINED SOLUTION ARCHITECTURE Devices will connect to the gateway or edge device running Wind River Linux, Device Cloud, and Predixion RIOT, and begin to stream IoT data through the device and gateway in real time. Prior to Predixion RIOT edge analytics, IoT data would largely go to waste, as it would be transported to another location and stored for later processing, missing the opportunity to act in real time. Predixion RIOT takes advantage of Intel s edge device location and relationship to the connected machines by processing IoT data at the edge and instantly delivering visual insights. This capability limits the need for transporting and storing the high volume of IoT data and allows analytical insights to be delivered while they are still relevant. Once devices have passed the Device Cloud security protocol and established a connection with the gateway, live IoT data can then begin streaming to the preinstalled Predixion RIOT. The streaming data is ingested by Predixion RIOT with mainstream protocols such as MQTT or REST. As the secure, real-time data is streaming and passing through the gateways, Predixion RIOT applies advanced analytics, immediately pushing the results to a highspeed, cloud-based sensor hub for enterprise analytic orchestration. This high-speed hub serves as an orchestration mechanism for enterprise-wide, real-time, visual analytics, and is also the mechanism by which Predixion applies advanced and predictive server-based deep analytics. With the sheer volume of data flowing through gateways now, traditional database dump and query methods simply will not suffice. Edge analytics grow in value as more devices connect and more data flows, requiring solutions that are scalable and highly performant end to end. Historical AN INTEL COMPANY Real Time Real -Time Insight & Analytics Predictive Insight REST MQTT AMQP REST MQTT AMQP REST MQTT AMQP ANALYTICS PATTERNS PREDICTIONS ANALYTICS PATTERNS PREDICTIONS ANALYTICS PATTERNS PREDICTIONS DEVICE DEVICE DEVICE DEVICE DEVICE DEVICE DEVICE DEVICE DEVICE Figure 2. Predixion RIOT applies advanced analytics to real-time data 6 White Paper

EXTENDING PREDIXION ANALYTICS TO THE CLOUD An advanced IoT strategy with Predixion RIOT Enterprise creates greater value and insight for cross-device, enterprise-wide analytics. This solution includes powerful cloud-based micro-services and reacts to both user and device asynchronous events at scale. A sophisticated analytics-based partitioning architecture between edge and cloud micro-services is orchestrated by a powerful set of analytics engines; the net result is a highly visual and interactive browser-based analytical IoT dashboard that puts deep operational and tactical analysis in the user s hands. IoT analytics therefore moves into the realm of predictive maintenance, creating a highly reactive and actionable predictive maintenance solution. A SEAMLESSLY INTEGRATED IOT SOLUTION FOR THE HIGHEST LEVEL OF SECURITY When developers attempt to build a complete IoT solution using a myriad of IoT products, they commonly hit complexity and security road blocks immediately. Trying to assemble disparate products into an end-to-end IoT solution quickly becomes unwieldy and unmanageable. Solutions are often à la carte and not particularly well articulated or compatible with most customers current technologies. CONCLUSION Companies have historically sent field technicians out on fixed schedules to perform routine diagnostic inspections and preventive maintenance on deployed equipment. But this costly, laborintensive process does little to ensure that failure won t happen between inspections. Predictive maintenance, on the other hand, maximizes the device lifespan and ensures optimized productivity. By harnessing device data, problems can be anticipated well ahead of failure. With the Predixion and Wind River solution for predictive maintenance, companies can rapidly deploy advanced analytics tools, rely on deep security protection from edge to cloud, gain the ability to make decisions in real time, and conduct predictive maintenance and operations management with workflows triggered by the output of the analytics. With these real-time, actionable insights, customers are now able to make predictive maintenance a reality based on real-time analytics across their entire field deployment. Because the IoT market is still new and evolving, many customers are turning to their gateway and device management providers as trusted advisors, looking for expertise that will enable them to execute on a strategy without requiring specialized internal expertise or dedicated teams. Partnered with Predixion, original equipment manufacturers (OEMs) can offer a seamless solution that is easy to deploy, easy to use, and simply works. Embedded Predixion RIOT One is preconfigured to make deployment almost effortless, automating the process of connecting IoT data for immediate results. Having established the baseline for an IoT strategy with a combined, secure architecture, Predixion and Wind River are aligned for advancing an organization to a mature IoT strategy. The baseline solution Intel gateways running Predixion RIOT and Device Cloud supplies the necessary elements for device managers to do away with assumption- or hunch-based decisions, and act on insights delivered with analytics at the edge. Wind River is a global leader in delivering software for the Internet of Things. The company s technology is found in more than 2 billion devices, backed by world-class professional services and customer support. Wind River delivers the software and expertise that enable the innovation and deployment of safe, secure, and reliable intelligent systems. 2016 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems,Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev. 05/2016