Maybe you’ve seen the recent article in RFID Journal: John Deere Planter Factory Gains Efficiency.
John Deere, working with integration and technology partners Prime Technologies (now Kubica) and AeroScout, used the existing Cisco Wi-Fi networking nodes that it had already installed throughout the facility to avoid the expense of installing RFID readers for a new manufacturing solution.
John Deere MaxEmergeXP
Here’s the story: John Deere’s Seeding Group factory in Moline, Ill. was seeking an automated solution to improve on its manual work in process manufacturing system. It wanted to increase efficiency in the way it replenished welding material as well as improve the way it carried out processes at its assembly stations at the plant. The factory in question assembles John Deere’s row-crop planter machines -- the MaxEmerge XP range - that are used by farmers to deposit a variety of seed in soils and seedbeds.
The new system uses a wireless back-haul to a Cisco infrastructure that enables the SAP, reporting and programmable logic controller (PLC) systems to communicate live. It’s intended to improve material replenishment and reduce delays caused by waiting for materials in its welding areas. It allows the equipment manufacturer’s kitting staff to boost material replenishment speed, and allows assembly workers to prepare for specific equipment as it approaches their assembly stations. The RFID Journal Story goes into excellent detail on the wip process and the process improvement, but I did want to reiterate some of the key business metrics:
“Our goal was to improve Takt time *,” says Shay O’Neal, John Deere Seeding Group’s project manager, who expects the reduction to increase from what he estimates may be about 5 percent improvement in Takt time thus far. He reckons there has been a 40 percent reduction in cycle time because of the improvement in replenishment. He has also seen a decrease in overtime work undertaken by kitting staff at the welding station. “I was pleasantly surprised to see how well the system met our needs,” O’Neal said in the RFID Journal article.
- John Deere has seen a 40 percent increase in efficiency in welding due to improvements in material replenishment and fewer delays caused by waiting for materials in its welding areas.
- On the assembly line, the system provides a view into the work in process (WIP), which thus far has reduced the cycle time (Takt) it takes to assemble a single product by about 5 percent.
- Since existing Cisco Wi-Fi nodes read the RFID tag of each seeder as it passes from one assembly station to another, indicating where it has been and what its next assembly location will be, John Deere avoided the expense of installing RFID readers.
Read More »
Tags: aeroscout, automation, Boeing, Borderless Networks, Cisco, Cisco CleanAir technology, Cisco Unified Wireless Network, Cisco WebEx, clean air, cleanair, cloud, collaboration, context-aware, dreamliner, Enterprise, industrial, innovation, john deere, john deere networking, LAN, management, Manufacturing, mobility, mse, networking, operations excellence, prime technologies, rfid, security, unified communications, wcs, web conferencing, wireless, wireless network
These tips can protect your business and customers from financial loss and identity theft
So far this year, 369 data breaches have been reported to the Open Security Foundation Data Loss Database, affecting 126,749,634 records. A breach in your business data can come from loss, theft, or exposure of information, which opens you and your customers up to such risks as financial loss and identity theft. Most reported breaches involve stealing private information, like customers’ email addresses and credit card numbers.
A small business can suffer data loss through a variety of data breaches, not all of which can be pinned on a malicious hacker. Data can be lost when a mobile device goes missing, gets accidentally deleted from a server or computer, or when an employee inadvertently makes private data public or steals it outright. And sometimes data is lost not by human error or interference but by an unfortunate accident such as a natural disaster or computer failure. In some way and at some time, a data breach can—and eventually will—happen to everyone.
These five steps can help you secure your critical data against breaches and mitigate the risk of losing customers, intellectual property, and regulatory compliance.
Read More »
Tags: data breach, data protection, security, small business
I recently had the opportunity to fly out to HQ and while this was not my first opportunity to do air travel this year (refer to my blog about Alaska) I did make some observations about business travel, and trust me, they relate to Manufacturing. By the way, and I do this totally tongue in cheek, part of the trip was to record some new videos to give you all more reason to see me and make fun of me. So hang on! That’s my plug to come back. Read More »
Tags: Alaska, backpack, Blu-ray, coffee, Denver, full body scanners, gateways, Greece, HDTV, Italy, machine builders, Manufacturing, Milwaukee, Open, plug and play, productivity, Rockwell Automation, safety, san jose, security, spill, standard, travel
Once again it’s time for Cisco’s semi-annual Cisco IOS Software Security Advisory Bundled Publication. Today’s edition of the bundle contains a total of nine IOS-related advisories and one non-IOS advisory for the Cisco Unified Communications Manager (CUCM) family of products. Included in the 10 Security Advisories are a total of 19 Cisco Bug IDs, each one representing an individual vulnerability.
Read More »
Tags: IOS, psirt, security, vulnerability
I was disheartened to read about the 22 September arrest of alleged LulzSec/Anonymous member Cody Kretsinger (known by the handle ‘recursion’) by the FBI as a suspect in the SQL injection attacks on multiple Sony websites. Note that I was not sad to see the good guys bust a cybercriminal, but I was sad to see a nice guy I had met and talked to briefly at BlackHat Las Vegas 2011 turn out to be a suspect wanted by the FBI.
Cody Kretsinger, second from right, at BlackHat 2011
One of the things we at Cisco try to do is reach out to those studying infosec and wanting to make a career in security. At BlackHat Cisco had a contest where the winner got a Pwnie Express PWN Phone, effectively a modified Nokia N900 with some pentesting software loaded. A group of guys, volunteers with the show from an IT school, were fascinated by the PWN Phone – possibly because in their circle a couple of them had Nokia N900s, a device relatively unknown in North America but somewhat popular in certain hacking circles due to the fact that its OS is Linux-based and thus can be made to run things like metasploit (like the PWN Phone does).
Read More »
Tags: Anonymous, cyber crime, FBI, hacking, LulzSec, Proxy, security