Cisco Blogs


Cisco Blog > Manufacturing

The 2014 Automation Conference – IoE and Beer

The 2014 Automation Conference (TAC) was held March 20-21, 2014 in sunny Chicago (Yes, sunny Chicago!! I made sure to pack some California sunshine for the Windy City) attracted a diverse group of automation and manufacturing thought leaders and subject matter experts from leading machine builders, system integrators, manufacturing end users, standards bodies and educational institutions. The focus and objective of the conference was to have peer to peer discussions and dialogue around the technologies and next generation automation strategies that are enabling and driving the Internet of Everything (IoE).

“This conference is designed not only to make you think about the application of automation, but also to help you take action” -- David Greenfield, Automation World, editor in chief and TAC event director

The conference achieved this goal and more.  The framework of the sessions encouraged audience collaboration and dialogue around the challenges and practical steps and strategies being designed and deployed to achieve an integrated and scalable IoE architecture that drives value across the entire manufacturing value chain, as depicted in the video below:

I can “wax poetic” around all the great individual sessions held at the conference around Big Data, BYOD (Bring Your Own Device), mobility, virtualization, cloud computing, cyber-physical security, network switching, CPwE (Converged Plantwide Ethernet), safety systems, workforce retention and optimization, but I think its more fun and interesting to summarize the highlights of the conference through the  context of a use case that was shared at the conference.

What better way to meet that objective than to leverage a manufacturing use case around beer!!!!

Automating Brewing Operations from Two Different Perspectives

I attended this session where Highland Brewing, Sierra Nevada and Vicinity Manufacturing gave an interesting perspective around the challenges and strategies in deploying their next generation manufacturing operation.

Highland Brewing is a regional brewer of craft beers based in the Southeast and Sierra Nevada is a larger brewer with more of national brand.  The interesting contrast between the two is that Highland Brewing is designing more automation into their operational facility and Sierra Nevada is scaling their automation and IoE strategies across all their facilities.   Both perspectives and approaches have the same objective.  How do I effectively integrate all the various technologies into an intelligent, flexible and scalable system/architecture to meet the following business outcomes:

  1. Increase Customer Loyalty
  2. Supply Chain Optimization
  3. Operational Excellence
  4. Energy Sustainability
  5. Disruptive Innovation

To paraphase Kevin Wheeler, Director of Operations, Highland Brewing Co,“Our core competency is crafting great beer. We have an opportunity to drive efficiency into our operation by an integrating IoT/IoE platform … the challenge is figuring out the best approach.”

Like Highland Brewing, manufacturers must begin to transform existing business processes and fundamentally rethink how they create, operate, and service smart, connected products in the IoE. For those that get it right, the future represents a huge opportunity to create product and service advantages.

Are you having challenges putting together the “IoE technology puzzle?”  Is security the main barrier to IoE adoption?

Tags: , , , , , , , , , , ,

Getting Started with Cisco CMX 7.6 Analytics

First we rolled out the MSE tech blog series to give our customers an in depth look at the various features of the location-based technology behind Cisco’s Mobility Services Engine (MSE) and Connected Mobile Experiences (CMX) solution. Now, we’re kicking off a CMX Techtorial video series to provide a visual and helpful walkthrough of how to maneuver and get started with CMX and location-based services.

First up, we have the charismatic Darryl Sladden, Technical Marketing Manager for CMX, taking us through CMX 7.6 Analytics. In this quick video, Darryl will cover:

  • What is CMX 7.6 Analytics?
  • What is the analytics dashboard?
  • How do I visualize dwell time, heat maps, device density?
  • What kinds of reports can you get with CMX 7.6 Analytics?

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Empower Your Employees with a #MobileWorkspace

byod

[Webinar] Mobilize Your Employees with Cisco Solutions for a Mobile Workspace

We discussed the considerations behind the Cisco-Citrix Mobile Workspace solution to set the stage for the CVD (design guide available now!) earlier this month, and now we’ve planned a great technical deep-dive for customers and partners interested in finding out more about the Mobile Workspace Solution. It’s going to be at 10am PST Wednesday June 4, 2014 (Click to Register).

 Organizations are moving from just dealing with bring your own device (BYOD) and the influx of mobile devices to proactively developing solutions that use the full power of mobility. Because of the complexities and fluid technology horizon, this is often simpler said than done. Now you can simplify and accelerate your mobility projects by deploying a comprehensive mobility solution that has been tested and validated end to end.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection

The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is more dynamic than ever. A combination of these factors has led to an increase in attack access points and a re-definition of the traditional network perimeter.

Due to these concerns, we have been strong proponents of threat-centric security that lets defenders address the full attack continuum and all attack vectors to respond at any time — before, during, and after attacks.

Read More »

Tags: , , , , , , , , ,

Intelligent Cybersecurity at Cisco Live

We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of traditional security methods that rely exclusively on single-point-in-time detection and blocking. There is a tremendous amount of complexity in our environments and security expertise is in short supply. At the same time, the movement to an Internet of Everything (IoE) is accelerating and creating significant opportunities for businesses and attackers alike as more people, processes, data, and things come online.

This is why Cisco is steadfast in its charge of a threat-centric security model that addresses the full attack continuum – before, during, and after an attack.

Read More »

Tags: , , , , , , , , ,