舉報

會員
Architecting the Industrial Internet
最新章節:
Chapter 11
ArchitectswhoareinterestedinlearninghowtodefinesolutionsfortheIndustrialInternetwillbenefitimmenselyfromthisbook.Relevantarchitectrolesincludeenterprisearchitects,businessarchitects,informationarchitects,cloudsolutionarchitects,softwarearchitects,andothers.Thecontentisalsorelevantfortechnicallyinclinedlineofbusinessleadersinvestinginthesesolutions.
目錄(262章)
倒序
- cover
- Title Page
- Copyright
- Architecting the Industrial Internet
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- The Industrial Internet Revolution
- How today's Industrial Internet came about
- Earlier generations of the Industrial Revolution
- Why is it time for the Industrial Internet?
- Challenges to IIoT
- The architect's roles and skills
- Architectural approaches for success
- Reference architectures for the Industrial Internet
- The multi-tier IIoT architecture
- A security framework for the Industrial Internet
- A connectivity framework for the Industrial Internet
- The industrial data analytics framework
- Cloud and user experience considerations
- Business strategy framework for the Industrial Internet
- Summary
- Architectural Approaches for Success
- Architectural framework
- Architectural viewpoints
- Business viewpoint
- Security considerations for the business viewpoint
- Usage viewpoint
- Security considerations for the usage viewpoint
- Functional viewpoint
- Control domain
- Operations domain
- Information domain
- Application domain
- Business domain
- Cross-cutting functions and system characteristics
- Computational deployment patterns
- Security considerations for the functional viewpoint
- Implementation viewpoint
- Security considerations for the implementation viewpoint
- Data and analytics
- Data management
- Analytics and advanced data processing
- Integrability interoperability and composability
- Connectivity
- Intelligent and resilient control
- Dynamic composition and automated interoperability
- Using PoCs to evaluate design
- Scope definition
- Business case considerations
- Solution definition
- Building the PoC
- Prototype scale
- Evaluate/modify
- Production scale
- Architecture
- Components
- Continuing engineering
- Summary
- Gathering Business Requirements
- Initial business discovery
- Getting ready for business discovery
- Gathering CSFs
- Gathering KPIs
- From data sources to KPI delivery
- Prioritizing the building of solutions
- Building the business case
- Components of backend infrastructure cost models
- Smart device and networking costs
- Estimating implementation costs
- Documenting future benefits
- Financial justification of our supply chain project
- Selling the project
- Summary
- Mapping Requirements to a Functional Viewpoint
- The control domain
- Basic edge device capabilities
- Smarter edge device configurations
- Selecting sensors and edge devices
- The supply chain optimization control domain
- The operations domain
- The information domain
- Solving information domain functional requirements
- A supply chain optimization information domain
- The application domain
- Assessing business analysts and user skills
- The supply chain optimization application domain
- The business domain
- DevOps and the agile movement
- Agile approaches
- Using microservices and containers to speed DevOps
- Summary
- Assessing Industrial Internet Applications
- Architecture patterns for the Industrial Internet
- Build versus buy decisions
- Asset Performance Management (APM)
- Assessing the analytics applications
- Descriptive analytics
- Diagnostic analytics
- Predictive analytics
- Prescriptive analytics
- Fit gap analysis
- Brilliant Manufacturing
- Field Service Management (FSM) application
- Summary
- Defining the Data and Analytics Architecture
- Data and analytics requirements and capabilities
- Data reduction and analytics
- Publish and subscribe
- Query
- Storage persistence and retrieval
- Integration
- Description and presence
- Data framework
- Rights management
- Creating business value
- Analytics functionality
- Mapping analytics architecture to reference architecture
- Advanced analytics
- The Lambda architecture and IIoT
- Analytics machine learning and analyst tools
- A process for advanced analytics creation
- Machine learning tools
- Other analyst tools
- Early Industrial Internet applications and historians
- The speed layer and field gateways
- The batch layer
- Data lakes and Hadoop
- Graph database
- Data warehouses data marts and relational databases
- Supply chain optimization in the batch layer
- Summary
- Defining a Deployment Architecture
- Current state of deployment architectures for IT systems
- Hosted systems and the cloud
- Hosted services
- Single-tenant hosting
- Multi-tenancy
- Cloud computing
- Public cloud
- Private cloud
- Hybrid cloud
- Billing
- Enterprise Resource Planning (ERP)
- Considerations for SaaS cloud versus on-premises
- Customer Relationship Management (CRM)
- Human Resource Management Systems
- Data warehousing and big data
- Data warehouse and decision support
- Management considerations for data warehouse
- Big data
- Hadoop file systems
- Data lakes
- Management considerations for data lakes
- Big data analytics and data science
- Converged infrastructure and engineered systems
- Deployment considerations
- IIoT constraints
- Incremental upgrades
- On-premises versus cloud
- Consumption models
- Analytics capacity considerations
- Analytics considerations
- Key constraints in analytics architecture design
- Design for the edge tier
- Networking considerations
- Connectivity transport layer
- Network layer consideration
- Topology
- Edge connectivity
- Management and support infrastructure
- Summary
- Securing the Industrial Internet
- Examples of cybersecurity attacks
- IIoT security core building blocks
- NIST cybersecurity frameworks
- IIoT security guidelines
- Securing devices and the edge to the cloud gateway
- Device considerations
- Device to gateway connections
- Securing the backend
- Data lake security
- Securing other NoSQL databases
- Data warehouse security
- Risk assessments and best security practices
- Planning for security in the supply chain example
- Summary
- Governance and Assuring Compliance
- Assessing governance risk and compliance
- Data governance
- Assessing risk and trustworthiness
- International compliance certifications
- International consortia and emerging standards
- Government and public institution compliance
- Non-U.S. government standards and certifications
- U.S. government standards
- Industry compliance certifications
- Which guidelines apply
- GRC in the supply chain optimization example
- Summary
- Industrial Internet Use Cases in Various Industries
- Use cases versus case studies
- Use cases within industry vertical
- Use cases in agribusiness
- Use cases in alternative energy and environmental control
- Use cases in construction
- Use cases in logistics and transportation
- Use cases in manufacturing and CPGs
- Use cases in oil and gas
- Use cases in pharmaceuticals medical equipment and healthcare
- Use cases in utility companies
- Manufacturing IIoT architectures and examples
- A manufacturing test bed
- Factory operation visibility and intelligence
- Omnichannel initiatives
- Predictive maintenance
- Airline industry background
- Airline proactive and preventive maintenance
- Preventive maintenance as a business
- Asset tracking and handling
- Baggage and cargo handling
- Expanded baggage-handling services
- Tracking tools in manufacturing and construction
- Chemical industry automated tracking and replenishment
- Environmental impact and abatement
- Summary
- A Vision of the Future
- Maturing IIoT frameworks and applications
- Evolving edge devices
- The evolution of networking
- Cognitive and mixed reality HMIs and deep learning
- The impact on robotics and mobile devices
- Improved security through blockchain technology
- Quantum computing
- The Industrial Internet's impact on society
- Summary
- Sources
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11 更新時間:2021-07-03 00:00:05
推薦閱讀
- 計算思維與算法入門
- 自然語言處理實戰:預訓練模型應用及其產品化
- 自制編譯器
- C#編程入門指南(上下冊)
- Mastering Spring MVC 4
- Mastering Python Scripting for System Administrators
- SEO智慧
- Amazon S3 Cookbook
- Mastering Unity 2D Game Development(Second Edition)
- Python深度學習:模型、方法與實現
- 基于ARM Cortex-M4F內核的MSP432 MCU開發實踐
- Xcode 6 Essentials
- Java程序設計與項目案例教程
- 深入淺出Python數據分析
- Hadoop Blueprints
- MATLAB從入門到精通
- Mastering Responsive Web Design
- A/B 測試:創新始于試驗
- Image Processing with ImageJ(Second Edition)
- Go語言從入門到進階實戰(視頻教學版)
- 計算機邏輯設計
- R語言數據處理及可視化分析
- C#典型模塊與項目實戰大全
- PHP 程序員面試筆試真題庫
- Robotic Process Automation Projects
- Vue.js 3.x+Element Plus從入門到精通(視頻教學版)
- MySQL 8 for Big Data
- C++程序設計與案例分析
- Python黑帽子:黑客與滲透測試編程之道(第2版)
- JavaScript at Scale