“This conference is designed not only to make you think about the application of automation, but also to help you take action” – David Greenfield, Automation World, editor in chief and TAC event director
The conference achieved this goal and more. The framework of the sessions encouraged audience collaboration and dialogue around the challenges and practical steps and strategies being designed and deployed to achieve an integrated and scalable IoE architecture that drives value across the entire manufacturing value chain, as depicted in the video below:
What better way to meet that objective than to leverage a manufacturing use case around beer!!!!
Automating Brewing Operations from Two Different Perspectives
I attended this session where Highland Brewing, Sierra Nevada and Vicinity Manufacturing gave an interesting perspective around the challenges and strategies in deploying their next generation manufacturing operation.
Highland Brewing is a regional brewer of craft beers based in the Southeast and Sierra Nevada is a larger brewer with more of national brand. The interesting contrast between the two is that Highland Brewing is designing more automation into their operational facility and Sierra Nevada is scaling their automation and IoE strategies across all their facilities. Both perspectives and approaches have the same objective. How do I effectively integrate all the various technologies into an intelligent, flexible and scalable system/architecture to meet the following business outcomes:
Increase Customer Loyalty
Supply Chain Optimization
To paraphase Kevin Wheeler, Director of Operations, Highland Brewing Co,“Our core competency is crafting great beer. We have an opportunity to drive efficiency into our operation by an integrating IoT/IoE platform … the challenge is figuring out the best approach.”
Like Highland Brewing, manufacturers must begin to transform existing business processes and fundamentally rethink how they create, operate, and service smart, connected products in the IoE. For those that get it right, the future represents a huge opportunity to create product and service advantages.
Are you having challenges putting together the “IoE technology puzzle?” Is security the main barrier to IoE adoption?
First we rolled out the MSE tech blog series to give our customers an in depth look at the various features of the location-based technology behind Cisco’s Mobility Services Engine (MSE) and Connected Mobile Experiences (CMX) solution. Now, we’re kicking off a CMX Techtorial video series to provide a visual and helpful walkthrough of how to maneuver and get started with CMX and location-based services.
First up, we have the charismatic Darryl Sladden, Technical Marketing Manager for CMX, taking us through CMX 7.6 Analytics. In this quick video, Darryl will cover:
What is CMX 7.6 Analytics?
What is the analytics dashboard?
How do I visualize dwell time, heat maps, device density?
What kinds of reports can you get with CMX 7.6 Analytics?
Organizations are moving from just dealing with bring your own device (BYOD) and the influx of mobile devices to proactively developing solutions that use the full power of mobility. Because of the complexities and fluid technology horizon, this is often simpler said than done. Now you can simplify and accelerate your mobility projects by deploying a comprehensive mobility solution that has been tested and validated end to end. Read More »
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is more dynamic than ever. A combination of these factors has led to an increase in attack access points and a re-definition of the traditional network perimeter.
Due to these concerns, we have been strong proponents of threat-centric security that lets defenders address the full attack continuum and all attack vectors to respond at any time — before, during, and after attacks.
We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of traditional security methods that rely exclusively on single-point-in-time detection and blocking. There is a tremendous amount of complexity in our environments and security expertise is in short supply. At the same time, the movement to an Internet of Everything (IoE) is accelerating and creating significant opportunities for businesses and attackers alike as more people, processes, data, and things come online.
This is why Cisco is steadfast in its charge of a threat-centric security model that addresses the full attack continuum – before, during, and after an attack.