Manufacturing Operations Management - View All Whitepapers

Manufacturing Operations Management

What is High Performance Computing?
December 04, 2018

What is High Performance Computing?

By Chassis Plans
High-performance computing is used for solving advanced mathematical calculations and performing data processing through the use of computer modeling, simulation and analysis.

The Trillion-Dollar Question for Advanced Industries: How to extract full value from technology
November 20, 2018

The Trillion-Dollar Question for Advanced Industries: How to extract full value from technology

By Venkat Atluri, Satya Rao, and Saloni Sahni, McKinsey
As data, connectivity, and processing power expand, so do opportunities for industrial companies to extract value through innovative products, services, and business models. This McKinsey study delves further into how technology delivers value to today's industry.

Honeywell Industrial USB Threat Report
November 05, 2018

Honeywell Industrial USB Threat Report

Researchers from Honeywell’s Industrial Cyber Security team analyzed USB usage and behavioral data from live production sites globally. This report shares findings from these research activities and presents USB threat trends.

Guide to Saving Time with Intelligent Data Logging
September 20, 2018

Guide to Saving Time with Intelligent Data Logging

By CAS Dataloggers
With advances in technology and computing power, modern data loggers can reduce the amount of time and effort required to extract critical information. These "intelligent" data loggers incorporate several features that allow them to go well beyond the functionality of a traditional data logger to help zero in on what the user is looking for

What do Design Engineers Need to Know about Brushless DC Motor Technologies
September 13, 2018

What do Design Engineers Need to Know about Brushless DC Motor Technologies

By Walter Smith, Sensata Technologies
The advent of rare-earth magnets and advanced brushless DC motor (BLDC) motor design has empowered a new range of motors small enough to fit into confined spaces, powerful enough to do real work, and efficient enough to be used in wireless or remote applications.

What Design Engineers Need to Know About Voice Coil Actuator Technology
August 09, 2018

What Design Engineers Need to Know About Voice Coil Actuator Technology

By James McNamara, Sensata Technologies
Originally developed for audio speakers, voice coil actuation technology is now being used to provide precise and reliable motion control for a wide range of medical, industrial process and space applications.

What's the Use of the IIoT?
July 10, 2018

What's the Use of the IIoT?

By Radley Corporation
The IIoT connects devices with the digital world to provide data visibility. But the real value of the IIoT lies in how that data will be used by industry to realize the potential benefi ts of this connectivity.

Data Logging 101
July 02, 2018

Data Logging 101

By CAS Dataloggers
This brief overview has been designed to help guide users through the basics of data loggers and how they can simplify data collection for an organization.

What do Industrial Engineers Need to Know About Functional Safety?
June 29, 2018

What do Industrial Engineers Need to Know About Functional Safety?

By Scott Orlosky and Jean-Marc Hubsch, Sensata Technologies
Engineers designing systems for industrial and factory applications are adopting functional safety design practices to reduce the risk of system failures that could result in costly damage or injury.

Extending Connectivity to the Bottom of the Ocean
June 12, 2018

Extending Connectivity to the Bottom of the Ocean

Not only did OPC UA meet the basic needs, but the capabilities of OPC UA include what’s called an Information Model, which lends itself to the possibility to pre-define application specific assets, in this case modeling the assets for the subsea tree.

Sharing Industrial Cybersecurity Guidance Across Sectors
May 25, 2018

Sharing Industrial Cybersecurity Guidance Across Sectors

By Eric C. Cosman, ARC Advisory Group
Recently, there have been several efforts to apply and adapt standards developed for one sector or industry to others. ARC Advisory Group expects this trend to continue as industry groups, suppliers, and asset owners strive to optimize their response.

Bridging the IT/OT Divide
May 22, 2018

Bridging the IT/OT Divide

By Weintek
Today’s smarter edge devices can streamline integration efforts while providing secure remote access for end users and machine builders, too

A Guide to Customized PROFINET Validation
May 16, 2018

A Guide to Customized PROFINET Validation

While serial bus systems will continue to play an important role in the future, solutions based on Industrial Ethernet are becoming increasingly common with Industry 4.0 applications. The focus is less on cable measurements, signal levels or signal shapes, but in the case of standards such as PROFINET, utilization and the greatest possible availability of the networks are the focus of interest.

Halting Harmful Harmonics:  Active and passive filtering techniques for harmonic mitigation
April 24, 2018

Halting Harmful Harmonics: Active and passive filtering techniques for harmonic mitigation

By John Mitchell, CP Automation
The rise of non-linear loads in industrial environments over the last two decades has resulted in the growing problem of harmonic currents and utility-level voltage distortion. This technical article explores active and passive filtering.

Exploring Security by Design
April 06, 2018

Exploring Security by Design

By Siegfried Müller, MB Connect Line
Nowadays it‘s difficult to imagine that a new appliance will be developed without a safety risk analysis, or by using safety elements without corresponding certifications. In fact, standards and norms regulate how security components have to be designed and deployed. Within information technology, such regulations don‘t exist yet.

Pairing OPC UA with a Good IIoT Protocol
March 19, 2018

Pairing OPC UA with a Good IIoT Protocol

By Bob McIlvride, Director, Communications, Skkynet Cloud Systems
In the rapidly-evolving space of Industrial IoT (IIoT), we are seeing some growth in understanding about what makes a good IIoT protocol. For IIoT to work well, the tools you employ must suit the unique requirements.

IIC Endpoint Security Best Practices
March 14, 2018

IIC Endpoint Security Best Practices

This white paper from the Industrial Internet Consortium recommends best practices for endpoint security in industrial applications under the broader scope of industrial internet security. The basis for this document is the detailed analysis in the various industrial guidance and compliance frameworks that already exist

Overcoming Cybersecurity Challenges in Industrial Control Systems
February 23, 2018

Overcoming Cybersecurity Challenges in Industrial Control Systems

By Veracity
Holistic challenges such as ICS cybersecurity can be overwhelming. Security solutions often create more challenging system-wide issues. Attacking comprehensive problems with individual statements helps us to focus on solving analysis and planning issues step by step. This paper identifies two individual problem statements that address the comprehensive issue of ICS security.

OPC Technology Well-positioned for Growth in Tomorrow’s Connected World
February 19, 2018

OPC Technology Well-positioned for Growth in Tomorrow’s Connected World

By Craig Resnick and David Clayton, ARC Advisory Group
This ARC View, based on extensive ARC market research and analysis, at-tempts to quantify the current installed base of automation products with OPC and examines why it has been deployed so widely, the types of applications in which it has been deployed, and what lies ahead for the future.

Calibration Essentials: An ISA and Beamex eBook
February 16, 2018

Calibration Essentials: An ISA and Beamex eBook

The calibration experts at Beamex have teamed with the International Society of Automation (ISA) to provide this in-depth guide to calibration automation, complete with all the information you need to ensure a fully calibrated and reliable facility.

A New Deal for Buildings
February 02, 2018

A New Deal for Buildings

This whitepaper discusses ways to facilitate the adoption of information technologies in order to enable a more productive indoor environment.

Bedrock Automation releases ICS Cyber Security Best Practices white paper
January 18, 2018

Bedrock Automation releases ICS Cyber Security Best Practices white paper

The 20-page document, Securing Industrial Control Systems - Best Practices, covers the threat landscape and presents a holistic approach to defending it, including assessing risk, physical security, network security, workstation and server security, as well as the fundamentals of OSA.

Keeping the Lights On: The basics of machine monitoring
January 03, 2018

Keeping the Lights On: The basics of machine monitoring

By Stew Thompson, CAS DataLoggers
This whitepaper discusses the basics of one of the most common data logger applications, machine monitoring and predictive maintenance, as a cost-effective way for plants and factories to help reduce process downtime.

Secure Configuration and Operation of OPC UA
December 18, 2017

Secure Configuration and Operation of OPC UA

The OPC Foundation published a set of practical guidelines for the secure configuration and use of OPC UA in industry.  This brochure helps readers quickly understand what OPC UA security has to offer and how to best use it. 

VDMA's Industrie 4.0 Communication Guideline Based on OPC UA
December 18, 2017

VDMA's Industrie 4.0 Communication Guideline Based on OPC UA

The VDMA guideline “Industrie 4.0 Communication Guideline Based on OPC UA” should be understood as a practice-oriented tool. It shows action steps that help to implement the industry 4.0 communication in the company. Industrie 4.0 is a development path on the way to the future of production.

How to Get Started Collecting Data
November 27, 2017

How to Get Started Collecting Data

By CAS Dataloggers
Do you need a way to record data, but don’t know how to get started? This whitepaper, from the Application Engineers at CAS DataLoggers, will serve as a brief overview to help guide you through the basics of data loggers

Reexamining the Role of SCADA Systems in Digital Manufacturing Operations
November 03, 2017

Reexamining the Role of SCADA Systems in Digital Manufacturing Operations

By: Alan Cone, Siemens Industry, Inc.
The data revolution is firmly underway within today’s manufacturing industry. Those companies that capture their “big data” and leverage that analyzed data as a framework for making faster, better decisions will lead the industry in productivity and time to market.

Alarm Enforcement … or Not?
November 03, 2017

Alarm Enforcement … or Not?

By Lieven Dubois and Ian Brown, MAC Solutions
Alarm Enforcement is the process of comparing Process Control System (PCS) alarm attributes with the authorised list of alarm attributes held within a site’s Master Alarm Database (MADb), and restoring those which are found to be at variance to the values held within the MADb.
In this paper, we will discuss the pros and cons of this practice.

The Adaptive Machine: Acheiving batch size one
September 18, 2017

The Adaptive Machine: Acheiving batch size one

By B&R Industrial Automation,
Dedicated machine designs are giving way to base machine modules that are configured to production requirements, reconfigured as needed and support ‘batch of one’ operations. The result is a new category of machinery, the adaptive machine.

Powering Automatic Teller Machines One Board at a TIme
August 01, 2017

Powering Automatic Teller Machines One Board at a TIme

By AAEON
In 2014, China overtook the USA and became the world’s largest ATM market, according to Retail Banking Research (RBR), a financial strategy and data consultancy headquartered in London.

Industrial Cybersecurity for Small- and Medium-Sized Businesses:  A Practical Guide
July 28, 2017

Industrial Cybersecurity for Small- and Medium-Sized Businesses: A Practical Guide

Effective cybersecurity management is essential for all organizations, regardless of size. This ISA document is intended to provide a starting point for small- and medium-businesses (SMBs), particularly those that manage industrial processes and employ some level of automation.

The Impact of Automation on Employment: An NCCI Report
July 25, 2017

The Impact of Automation on Employment: An NCCI Report

During the 20th century, automation largely impacted routine tasks, contributing to significant shifts in agriculture and manufacturing employment. This edition explains why automation in the future has the potential to change labor markets more dramatically than in the past.

Protecting the Connected Barrels:  Cybersecurity for upstream oil and gas
July 05, 2017

Protecting the Connected Barrels: Cybersecurity for upstream oil and gas

By Anshu Mittal, Andrew Slaughter, Paul Zonneveld
This Deloitte report addresses cybersecurity concerns in the oil & gas industry, and discusses how companies can better protect themselves in an increasingly connected world.

Cybersecurity: Going Beyond Protection to Boost Resiliency
June 28, 2017

Cybersecurity: Going Beyond Protection to Boost Resiliency

By Don Dickinson, Phoenix Contact USA
The challenge of protecting sensitive data and cyber-assets becomes even more daunting as tens of billions of devices are connected globally, creating the Internet of Things (IoT). Cyber-threats take on an even greater significance when the target is critical infrastructure.

Diversity and Inclusion: Core values among associations
June 22, 2017

Diversity and Inclusion: Core values among associations

By Dr. David K. Rehr and James Zaniello, Vetted Solutions
This research report focuses on the important role associations play in American life. The research indicates that while leaders recognize the importance of diversity and inclusion, many associations have not yet fully realized the value and benefits of diversity and inclusion.

Turning a Wonderware System Platform into an OPC UA server
June 19, 2017

Turning a Wonderware System Platform into an OPC UA server

This whitepaper discusses how to share your Wonderware System Platform (ArchestrA) or Wonderware InTouch data via OPC UA for situations where you're working with an OPC UA capable client application that needs access to process data in your Wonderware system.

The Race to A Digital Future: Assessing digital intensity in US manufacturing
June 13, 2017

The Race to A Digital Future: Assessing digital intensity in US manufacturing

This Siemens research report evaluates manufacturers’ digital capabilities across several core dimensions, using their relative progress in each to provide an overall score out of 100, determining what progress manufacturers still have to make in order to access the digital future

Why PKI matters for the IIoT
May 23, 2017

Why PKI matters for the IIoT

By Alan Grau and Dave West, Icon Labs
Just as cyber-attacks take many forms and exploit a wide range of vulnerabilities in the target device, so too is cybersecurity multi-faceted. A fundamental, but often ignored, aspect of cybersecurity for IIoT devices is strong authentication.

What is a Cloud  Serialization and  Traceability Solution?
April 05, 2017

What is a Cloud Serialization and Traceability Solution?

The core principles of a Level 4 system make it uniquely positioned to deliver data sharing capability up, down, and across the supply chain.

Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production
March 27, 2017

Industry 4.0 and Cybersecurity: Managing Risk in an Age of Connected Production

This new Deloitte study outlines the strategies that businesses must take to build cybersecurity efforts into their larger business plan and untimely protect their operations and their customers.