Edge computing for manufacturers

Issue 9 2020 Industrial (Industry)

In the years since cloud computing has become the norm, another phenomenon has taken over which promises to overcome the drawbacks of off-site data processing: edge computing. This more recent technological trend has become quite the buzzword, boasting faster data analysis, lower latency, and reliable delivery of IT capabilities in extremely close proximity to the operation.

Jonathan Duncan.

This is ideal for manufacturers looking to take advantage of technology innovations such as data analytics, digital twin, artificial intelligence, and autonomous robotics which require new age computing tools. In the quest for achieving a smart manufacturing process, edge computing is key as it offers real-time response, mobility, and high security.

But can edge computing work when the ‘operation’ is not a clean data centre or business environment, but a more chaotic and dynamic manufacturing facility? There are often concerns over reliability, security, and continuity in manufacturing environments, which may hinder the adoption of the new IT systems. Downtime is something no manufacturer can afford, as it impacts productivity, profitability, customer experience, and even a manufacturer’s brand reputation.

In fact, in the era of Industry 4.0, downtime can be considered to become even more expensive as manufacturing processes are increasingly automated and integrated. The more we depend on edge computing in automation processes, the more important it is to prevent failures or shutdowns of the IT systems.

Therefore, in order to prevent downtime, organisations need to make the right investments to ensure their critical processes are ‘always on’. Choosing IT enclosures designed for manufacturing environments and investing in proper power and cooling infrastructure can address the unique challenges of edge IT deployments in manufacturing environments.

IT personnel need to introduce resilient edge computing solutions into manufacturing environments. Resilient solutions take advantage of existing best practices implemented in typical IT environments for the past several decades. These solutions also need to adopt unique best practices for deployment in manufacturing environments. If manufacturers can consider the below five points, they will be on their way to a resilient and reliable edge computing application.

1. Choose IT enclosures designed for manufacturing environments.

2. Use an effective power protection and cooling approach.

3. Implement cybersecurity best practices.

4. Invest in monitoring and management software.

5. Leverage an ecosystem of partners to provide complete edge IT solutions.

If this sounds complicated, fear not. Schneider Electric has put together further helpful details in a white paper. With a strong track record of industrial edge computing applications, we are ready to help you on your smart manufacturing journey.

There can be no doubt that Industry 4.0 is a game changer that will further automate industrial processes. Edge computing is an integral part of the system, enabling reliable delivery of IT capabilities in manufacturing environments. Concerns over downtime should not hold you back from innovation – a solution is available to ensure you remain productive and competitive.

To download the white paper, go to www.securitysa.com/*se1, which redirects to https://download.schneider-electric.com/files?p_File_Name=WP287_V1_EN.pdf&p_Doc_Ref=SPD_WP287_EN&p_enDocType=White%20Paper


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

AI-powered hardhat detection
Hikvision South Africa Industrial (Industry) CCTV, Surveillance & Remote Monitoring
Hardhats save lives, but only if people wear them. Intelligent, AI-powered hardhat cameras are helping to ensure workers in dangerous locations stay safe at all times.

Cybersecurity for operational technology: Part 3
Cyber Security Industrial (Industry)
According to a recent World Economic Report, the Covid-19 pandemic has increased our reliance on the global supply chain, while the Internet has accelerated the digitisation of business processes.

Security for operational technology: Part 2
Editor's Choice Cyber Security Industrial (Industry)
The recent cyber-attack on Transnet is a wake-up call that South African companies are not immune from cyber threats. The incident impacted logistics on a national scale.

How safe are our factories?
Industrial (Industry) Cyber Security
In this, the first part of a series on cybersecurity for operational technology, Bryan Baxter asks how safe our factories are from cyber threats.

Securing industrial control systems
Industrial (Industry)
The increase in connectivity among OT devices and systems helps keep your critical industrial processes up to date and running smoothly, but it also risks exposing all your OT-related devices and facilities.

Gijima and Cattron to deliver intelligent solutions
Gijima Specialised Solutions (GSS) Industrial (Industry) News Integrated Solutions
South African ICT provider, Gijima, has entered into a partnership agreement with Cattron, a provider of high-performance, intelligent control solutions, as part of Gijima’s quest to expand its horizons.

Manufacturer adopts touchless biometrics and temperature screening
Asset Management, EAS, RFID Industrial (Industry)
Leading implantable plastics manufacturer adopts touchless biometrics and temperature screening via IXM TITAN with Enhancement Kit for workforce management and to safeguard employee health.

IoT retrofitting made easy with the Gemalto 4G USB device gateway
IT infrastructure Industrial (Industry) Products
The Gemalto DGL61-W USB device gateway offers a simple and powerful solution for retrofitting existing IoT applications while providing seamless evolution to LTE Cat. 1.

Industrial fire safety
Technoswitch Fire Detection & Suppression Industrial (Industry)
Industrial settings are high-risk environments in general, but the risk of fire in these locations is always a top concern.

Factory honeypot traps malicious attackers
Industrial (Industry)
Results from six-month investigation conducted by Trend Micro Research can help inform protection strategy for industrial environments.