舉報

會員
Architecting the Industrial Internet
Shyam Nath Robert Stackowiak Carla Romano 著
更新時間:2021-07-03 00:00:05
開會員,本書免費讀 >
最新章節:
Chapter 11
ArchitectswhoareinterestedinlearninghowtodefinesolutionsfortheIndustrialInternetwillbenefitimmenselyfromthisbook.Relevantarchitectrolesincludeenterprisearchitects,businessarchitects,informationarchitects,cloudsolutionarchitects,softwarearchitects,andothers.Thecontentisalsorelevantfortechnicallyinclinedlineofbusinessleadersinvestinginthesesolutions.
- Chapter 11 更新時間:2021-07-03 00:00:05
- Chapter 10
- Chapter 9
- Chapter 8
- Chapter 7
- Chapter 6
- Chapter 5
- Chapter 4
- Chapter 3
- Chapter 2
- Chapter 1
- Sources
- Summary
- The Industrial Internet's impact on society
- Quantum computing
- Improved security through blockchain technology
- The impact on robotics and mobile devices
- Cognitive and mixed reality HMIs and deep learning
- The evolution of networking
- Evolving edge devices
- Maturing IIoT frameworks and applications
- A Vision of the Future
- Summary
- Environmental impact and abatement
- Chemical industry automated tracking and replenishment
- Tracking tools in manufacturing and construction
- Expanded baggage-handling services
- Baggage and cargo handling
- Asset tracking and handling
- Preventive maintenance as a business
- Airline proactive and preventive maintenance
- Airline industry background
- Predictive maintenance
- Omnichannel initiatives
- Factory operation visibility and intelligence
- A manufacturing test bed
- Manufacturing IIoT architectures and examples
- Use cases in utility companies
- Use cases in pharmaceuticals medical equipment and healthcare
- Use cases in oil and gas
- Use cases in manufacturing and CPGs
- Use cases in logistics and transportation
- Use cases in construction
- Use cases in alternative energy and environmental control
- Use cases in agribusiness
- Use cases within industry vertical
- Use cases versus case studies
- Industrial Internet Use Cases in Various Industries
- Summary
- GRC in the supply chain optimization example
- Which guidelines apply
- Industry compliance certifications
- U.S. government standards
- Non-U.S. government standards and certifications
- Government and public institution compliance
- International consortia and emerging standards
- International compliance certifications
- Assessing risk and trustworthiness
- Data governance
- Assessing governance risk and compliance
- Governance and Assuring Compliance
- Summary
- Planning for security in the supply chain example
- Risk assessments and best security practices
- Data warehouse security
- Securing other NoSQL databases
- Data lake security
- Securing the backend
- Device to gateway connections
- Device considerations
- Securing devices and the edge to the cloud gateway
- IIoT security guidelines
- NIST cybersecurity frameworks
- IIoT security core building blocks
- Examples of cybersecurity attacks
- Securing the Industrial Internet
- Summary
- Management and support infrastructure
- Edge connectivity
- Topology
- Network layer consideration
- Connectivity transport layer
- Networking considerations
- Design for the edge tier
- Key constraints in analytics architecture design
- Analytics considerations
- Analytics capacity considerations
- Consumption models
- On-premises versus cloud
- Incremental upgrades
- IIoT constraints
- Deployment considerations
- Converged infrastructure and engineered systems
- Big data analytics and data science
- Management considerations for data lakes
- Data lakes
- Hadoop file systems
- Big data
- Management considerations for data warehouse
- Data warehouse and decision support
- Data warehousing and big data
- Human Resource Management Systems
- Customer Relationship Management (CRM)
- Considerations for SaaS cloud versus on-premises
- Enterprise Resource Planning (ERP)
- Billing
- Hybrid cloud
- Private cloud
- Public cloud
- Cloud computing
- Multi-tenancy
- Single-tenant hosting
- Hosted services
- Hosted systems and the cloud
- Current state of deployment architectures for IT systems
- Defining a Deployment Architecture
- Summary
- Supply chain optimization in the batch layer
- Data warehouses data marts and relational databases
- Graph database
- Data lakes and Hadoop
- The batch layer
- The speed layer and field gateways
- Early Industrial Internet applications and historians
- Other analyst tools
- Machine learning tools
- A process for advanced analytics creation
- Analytics machine learning and analyst tools
- The Lambda architecture and IIoT
- Advanced analytics
- Mapping analytics architecture to reference architecture
- Analytics functionality
- Creating business value
- Rights management
- Data framework
- Description and presence
- Integration
- Storage persistence and retrieval
- Query
- Publish and subscribe
- Data reduction and analytics
- Data and analytics requirements and capabilities
- Defining the Data and Analytics Architecture
- Summary
- Field Service Management (FSM) application
- Brilliant Manufacturing
- Fit gap analysis
- Prescriptive analytics
- Predictive analytics
- Diagnostic analytics
- Descriptive analytics
- Assessing the analytics applications
- Asset Performance Management (APM)
- Build versus buy decisions
- Architecture patterns for the Industrial Internet
- Assessing Industrial Internet Applications
- Summary
- Using microservices and containers to speed DevOps
- Agile approaches
- DevOps and the agile movement
- The business domain
- The supply chain optimization application domain
- Assessing business analysts and user skills
- The application domain
- A supply chain optimization information domain
- Solving information domain functional requirements
- The information domain
- The operations domain
- The supply chain optimization control domain
- Selecting sensors and edge devices
- Smarter edge device configurations
- Basic edge device capabilities
- The control domain
- Mapping Requirements to a Functional Viewpoint
- Summary
- Selling the project
- Financial justification of our supply chain project
- Documenting future benefits
- Estimating implementation costs
- Smart device and networking costs
- Components of backend infrastructure cost models
- Building the business case
- Prioritizing the building of solutions
- From data sources to KPI delivery
- Gathering KPIs
- Gathering CSFs
- Getting ready for business discovery
- Initial business discovery
- Gathering Business Requirements
- Summary
- Continuing engineering
- Components
- Architecture
- Production scale
- Evaluate/modify
- Prototype scale
- Building the PoC
- Solution definition
- Business case considerations
- Scope definition
- Using PoCs to evaluate design
- Dynamic composition and automated interoperability
- Intelligent and resilient control
- Connectivity
- Integrability interoperability and composability
- Analytics and advanced data processing
- Data management
- Data and analytics
- Security considerations for the implementation viewpoint
- Implementation viewpoint
- Security considerations for the functional viewpoint
- Computational deployment patterns
- Cross-cutting functions and system characteristics
- Business domain
- Application domain
- Information domain
- Operations domain
- Control domain
- Functional viewpoint
- Security considerations for the usage viewpoint
- Usage viewpoint
- Security considerations for the business viewpoint
- Business viewpoint
- Architectural viewpoints
- Architectural framework
- Architectural Approaches for Success
- Summary
- Business strategy framework for the Industrial Internet
- Cloud and user experience considerations
- The industrial data analytics framework
- A connectivity framework for the Industrial Internet
- A security framework for the Industrial Internet
- The multi-tier IIoT architecture
- Reference architectures for the Industrial Internet
- Architectural approaches for success
- The architect's roles and skills
- Challenges to IIoT
- Why is it time for the Industrial Internet?
- Earlier generations of the Industrial Revolution
- How today's Industrial Internet came about
- The Industrial Internet Revolution
- Questions
- Piracy
- Errata
- Downloading the color images of this book
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Customer Feedback
- Why subscribe?
- www.PacktPub.com
- About the Reviewers
- About the Authors
- Credits
- Architecting the Industrial Internet
- Copyright
- Title Page
- cover
- cover
- Title Page
- Copyright
- Architecting the Industrial Internet
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- The Industrial Internet Revolution
- How today's Industrial Internet came about
- Earlier generations of the Industrial Revolution
- Why is it time for the Industrial Internet?
- Challenges to IIoT
- The architect's roles and skills
- Architectural approaches for success
- Reference architectures for the Industrial Internet
- The multi-tier IIoT architecture
- A security framework for the Industrial Internet
- A connectivity framework for the Industrial Internet
- The industrial data analytics framework
- Cloud and user experience considerations
- Business strategy framework for the Industrial Internet
- Summary
- Architectural Approaches for Success
- Architectural framework
- Architectural viewpoints
- Business viewpoint
- Security considerations for the business viewpoint
- Usage viewpoint
- Security considerations for the usage viewpoint
- Functional viewpoint
- Control domain
- Operations domain
- Information domain
- Application domain
- Business domain
- Cross-cutting functions and system characteristics
- Computational deployment patterns
- Security considerations for the functional viewpoint
- Implementation viewpoint
- Security considerations for the implementation viewpoint
- Data and analytics
- Data management
- Analytics and advanced data processing
- Integrability interoperability and composability
- Connectivity
- Intelligent and resilient control
- Dynamic composition and automated interoperability
- Using PoCs to evaluate design
- Scope definition
- Business case considerations
- Solution definition
- Building the PoC
- Prototype scale
- Evaluate/modify
- Production scale
- Architecture
- Components
- Continuing engineering
- Summary
- Gathering Business Requirements
- Initial business discovery
- Getting ready for business discovery
- Gathering CSFs
- Gathering KPIs
- From data sources to KPI delivery
- Prioritizing the building of solutions
- Building the business case
- Components of backend infrastructure cost models
- Smart device and networking costs
- Estimating implementation costs
- Documenting future benefits
- Financial justification of our supply chain project
- Selling the project
- Summary
- Mapping Requirements to a Functional Viewpoint
- The control domain
- Basic edge device capabilities
- Smarter edge device configurations
- Selecting sensors and edge devices
- The supply chain optimization control domain
- The operations domain
- The information domain
- Solving information domain functional requirements
- A supply chain optimization information domain
- The application domain
- Assessing business analysts and user skills
- The supply chain optimization application domain
- The business domain
- DevOps and the agile movement
- Agile approaches
- Using microservices and containers to speed DevOps
- Summary
- Assessing Industrial Internet Applications
- Architecture patterns for the Industrial Internet
- Build versus buy decisions
- Asset Performance Management (APM)
- Assessing the analytics applications
- Descriptive analytics
- Diagnostic analytics
- Predictive analytics
- Prescriptive analytics
- Fit gap analysis
- Brilliant Manufacturing
- Field Service Management (FSM) application
- Summary
- Defining the Data and Analytics Architecture
- Data and analytics requirements and capabilities
- Data reduction and analytics
- Publish and subscribe
- Query
- Storage persistence and retrieval
- Integration
- Description and presence
- Data framework
- Rights management
- Creating business value
- Analytics functionality
- Mapping analytics architecture to reference architecture
- Advanced analytics
- The Lambda architecture and IIoT
- Analytics machine learning and analyst tools
- A process for advanced analytics creation
- Machine learning tools
- Other analyst tools
- Early Industrial Internet applications and historians
- The speed layer and field gateways
- The batch layer
- Data lakes and Hadoop
- Graph database
- Data warehouses data marts and relational databases
- Supply chain optimization in the batch layer
- Summary
- Defining a Deployment Architecture
- Current state of deployment architectures for IT systems
- Hosted systems and the cloud
- Hosted services
- Single-tenant hosting
- Multi-tenancy
- Cloud computing
- Public cloud
- Private cloud
- Hybrid cloud
- Billing
- Enterprise Resource Planning (ERP)
- Considerations for SaaS cloud versus on-premises
- Customer Relationship Management (CRM)
- Human Resource Management Systems
- Data warehousing and big data
- Data warehouse and decision support
- Management considerations for data warehouse
- Big data
- Hadoop file systems
- Data lakes
- Management considerations for data lakes
- Big data analytics and data science
- Converged infrastructure and engineered systems
- Deployment considerations
- IIoT constraints
- Incremental upgrades
- On-premises versus cloud
- Consumption models
- Analytics capacity considerations
- Analytics considerations
- Key constraints in analytics architecture design
- Design for the edge tier
- Networking considerations
- Connectivity transport layer
- Network layer consideration
- Topology
- Edge connectivity
- Management and support infrastructure
- Summary
- Securing the Industrial Internet
- Examples of cybersecurity attacks
- IIoT security core building blocks
- NIST cybersecurity frameworks
- IIoT security guidelines
- Securing devices and the edge to the cloud gateway
- Device considerations
- Device to gateway connections
- Securing the backend
- Data lake security
- Securing other NoSQL databases
- Data warehouse security
- Risk assessments and best security practices
- Planning for security in the supply chain example
- Summary
- Governance and Assuring Compliance
- Assessing governance risk and compliance
- Data governance
- Assessing risk and trustworthiness
- International compliance certifications
- International consortia and emerging standards
- Government and public institution compliance
- Non-U.S. government standards and certifications
- U.S. government standards
- Industry compliance certifications
- Which guidelines apply
- GRC in the supply chain optimization example
- Summary
- Industrial Internet Use Cases in Various Industries
- Use cases versus case studies
- Use cases within industry vertical
- Use cases in agribusiness
- Use cases in alternative energy and environmental control
- Use cases in construction
- Use cases in logistics and transportation
- Use cases in manufacturing and CPGs
- Use cases in oil and gas
- Use cases in pharmaceuticals medical equipment and healthcare
- Use cases in utility companies
- Manufacturing IIoT architectures and examples
- A manufacturing test bed
- Factory operation visibility and intelligence
- Omnichannel initiatives
- Predictive maintenance
- Airline industry background
- Airline proactive and preventive maintenance
- Preventive maintenance as a business
- Asset tracking and handling
- Baggage and cargo handling
- Expanded baggage-handling services
- Tracking tools in manufacturing and construction
- Chemical industry automated tracking and replenishment
- Environmental impact and abatement
- Summary
- A Vision of the Future
- Maturing IIoT frameworks and applications
- Evolving edge devices
- The evolution of networking
- Cognitive and mixed reality HMIs and deep learning
- The impact on robotics and mobile devices
- Improved security through blockchain technology
- Quantum computing
- The Industrial Internet's impact on society
- Summary
- Sources
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11 更新時間:2021-07-03 00:00:05