Академический Документы
Профессиональный Документы
Культура Документы
alliedelec.com
details
21 for
t
ke
ar e l
-m th rta
to ith Po
e- ng w tion
timeer oma
i
ur gin Aut
yo en d
n ed ate
www.controleng.com
When commercial grade just
won’t cut it...
Industrial Managed
Ethernet Switches
starting at:
$429.00
SE2-SW8M
5
YEAR
Research, price, buy at:
www.automationdirect.com/
ethernet-switches
input #1 at www.controleng.com/information
Connected Machines.
Efficient Communications.
Smarter Operations.
Increased Visibility
LQWRLQGXVWULDOGDWDȃVRHYHU\RQHIURPWKHVKRS
ȵRRUWRWKHWRSȵRRUFDQPDNHVPDUWHUGHFLVLRQV
CUBEFuse.com
The evolution continues. Spring 2018.
input #3 at www.controleng.com/information
APRIL 2018
Vol. 65
Number 4
12
At the article, click the headline again to see more online.
COVER IMAGE: This photo illustrates a network switch. While industrial con-
trol system technology matters, it’s only one aspect of a layered cybersecurity
T
31% hirty-eight percent of respondents 4. Annual spend: Discrete manu-
in the Control Engineering 2017 facturing facilities spent an average of
Programmable Controllers Soft- $141,000 on industrial controller hardware
$50,001 to $10,000 to ware & Hardware survey work and software in the past 12 months. Eighty-
$100,000 $50,000 at a facility primarily involved in discrete two percent of end users in these industries
manufacturing. Below are five key findings expect to buy industrial controller software
Figure 1: End users estimate an as they relate to using programmable con- or hardware again in the next 12 months;
average spend of $96,000 on trollers in these facilities: the average estimated spend is $132,000.
1. Interfacing with control systems: 5. Cybersecurity: For controllers used
servo and/or stepper drive prod- Forty-one percent of controllers used in at discrete manufacturing facilities, 76%
ucts over the past 12 months. discrete manufacturing facilities network of end users report restricted access to
Source: Control Engineering 2017 with other programmable logic controllers the controllers. Forty-seven percent have
Motor Drives Study while 24% stand alone, 14% network with increased password protection procedures
a distributed control system, 13% network ,and 45% have restricted physical access to
with industrial PCs, and 7% network with controllers as cybersecurity measures. ce
46%
programmable automation controllers.
of automation pro- 2. Communications protocols: The View additional findings at
most used communication protocols for www.controleng.com/2017ControllersReport.
fessionals love going to work
controllers in discrete manufacturing facil- Amanda Pelliccione is the research director
every day; 37% are just happy ities are 4 to 10 mA/0 to 10 V dc (73%), at CFE Media, apelliccione@cfemedia.com.
to be employed. Source: Control EtherNet/IP (68%), RS-232/RS-485 (64%),
Engineering 2017 Career & Salary
Survey
and Ethernet (63%).
3. Integrated software, hardware:
Thirty-eight percent of discrete manu-
M More
RESEARCH
facturing facilities usually buy or specify Control Engineering covers several research
63%
controller software that is integrated with topics each year.
of end users purchase controller hardware; 28% purchase them All reports are available at
separately. www.controleng.com/ce-research
their HMI software and/or hard-
ware from their local distributor.
Justifications for new industrial controller software
Source: Control Engineering 2018 and/or hardware in discrete manufacturing facilities
HMI Software & Hardware Study
Automation upgrade 69%
New installation 52%
T
he Digital Manufacturing Design U.S. Department of Defense (DoD). The real-world manufacturing environment.
and Innovation Institute (DMDII) hub will serve as a testbed for the cre- It will develop hands-on cybersecuri-
announced in March the launch ation and adoption of new cybersecuri- ty training programs and create online,
of a “Cyber Hub for Manufacturing” ty technologies to secure manufacturing learning modules to reach manufactur-
with $750,000 in seed funding from the shop floors across the United States ers outside of the region.
and complements DMDII’s public-pri- The launch of the Cyber Hub for
vate partnership as one of the Manufac- Manufacturing was announced at a cel-
turing USA institutes sponsored by the ebration of the Institute’s four-year anni-
DoD to advance the state-of-the-art in versary, where stakeholders from across
digital manufacturing. the country recognized the institute’s
“The launch of the Cyber Hub for role in catalyzing a collaboration of
Manufacturing embodies why DMDII established manufacturing technology
exists,” said DMDII executive direc- companies, universities, small manufac-
tor Thomas McDermott. “We need to turers and startups, and many communi-
think about securing our manufacturing ty and civic groups around the concept
equipment the way we secure our lap- of helping U.S. manufacturers improve.
tops, and the complexity of this issue The Cyber Hub is the result of recom-
means our partners will get there much mendations developed through DMDII
The Digital Manufacturing Design and
faster by working together.” workshops with government, industry,
Innovation Institute (DMDII) launched
a Cyber Hub for Manufacturing with
DMDII will leverage its more than and academic partners since the Insti-
$750,000 in seed funding from the 300 partners across industry, academia, tute’s establishment in 2014.
U.S. Department of Defense (DoD). and government, and its manufacturing - Edited from a DMDII press release
Courtesy: Katie Spain, CFE Media floor to test cybersecurity use cases in a by CFE Media.
© Allied Electronics & Automation, 2018 Get your A&C fill at alliedelec.com 1.800.433.5700
INSIGHTS
NEWS
T
he Industrial Internet Consor- levels for their endpoints.” new endpoints, the concepts can be
tium (IIC) announced the publi- The white paper distills key informa- used with legacy endpoints by employ-
cation of the Endpoint Security tion about endpoint device security ing gateways, network security, and
Best Practices white paper. It is a docu- from industrial guidance and compli- security monitoring.
ment designed as a reference point for ance frameworks. - Edited from an IIC press release by
equipment manufacturers, critical infra- While the white paper is targeted CFE Media. The IIC is a CFE Media con-
structure operators, integrators, and primarily at improving the security of tent partner.
others to implement countermeasures
and controls they need to ensure the
safety, security, and reliability of Inter-
net of Things (IoT) endpoint devices.
Endpoints include edge devices such as
sensors, actuators, pumps, flow meters,
Rugged Precision
controllers, communications infrastruc- The MAQ®20 Industrial
ture and gateways, etc. Data Acquisition & Control System
Unreliable equipment can cause
safety problems, customer dissatisfac-
tion, liability, and reduced profits,” said
Steve Hanna, IIC white paper co-author,
and senior principal, Infineon Technol-
ogies. “The Endpoint Security Best
Practices white paper moves beyond
general guidelines, providing specif-
ic recommendations by security level.
Equipment manufacturers, owners,
operators, and integrators are educat-
ed on how to apply existing best prac-
tices to achieve the needed security
Headlines
online
Top five Control Engineering articles
Mar. 19-25: Most visited articles included
building a machine with motion design soft- Signal Integrity, Compact Design
ware, Big Data analytics, steam trap stations,
2 Software Packages for DAQ or T&M
the 2018 HMI Software and Hardware Study,
and fog computing
• $17 per Channel Possible –
IoT, Industrie 4.0 create M&A hotspots Lowest Cost in Industry
The Internet of Things or Industrie 4.0 tech-
• Up to 384 Channels in 19”
nologies drive a new wave of mergers.
Instrumentation Rack
Number of ICS devices connected
• Application Software from $250
to internet increases, raising security
concerns • ±0.035% Accuracy
Report raises cybersecurity concerns.
• 1500Vrms Channel-to-Bus
Benefits of pick-and-place robots for Isolation
manufacturers
Pick-and-place robots have become a com- • PID Software Control
mon robotic application in today’s facilities. - Up to 32 Loops with ReDAQ® Shape
- Unlimited Loops with IPEmotion
Industrial cybersecurity
standard published • –40°C to +85°C Operating
Device design and lifecycle are addressed. Temperature Instrument Class® Signal Solutions
dataforth.com • 800-444-7644
CONTROL ENGINEERING April 2018 • 9
input #7 at www.controleng.com/information
INSIGHTS
THINK AGAIN
B
reach of an industrial, triple- targeted plant. There is a problem Don’t panic; assess risks
redundant safety controller because cybersecurity best practices were Reconsider cybersecurity processes,
should dispel any thought hack- not followed; more work is needed in col- procedures, and training.
ers might not care about indus- laboration with end users, vendors, and Larry O’Brien, vice president research
trial facilities or that process government to lower the risk for process automation, ARC Advisory
controls are low-risk cyber- of other cybersecurity incidents Group, said the industry shouldn’t panic,
security targets. All facilities, from happening. but it should reconsider best practices
even if already heeding advice regarding processes, procedures, and peo-
from Schneider Electric and Cybersecurity ple. There are ways to execute a response
ARC Advisory Group, need to wake-up call to and defend against a systemic, multi-
have a response plan in place. Multiple cybersecurity laps- phase attack.
The Aug. 4, 2017, cyberattack es allowed a safety controller In this same incident, the attack(s)
on a on a Triconex safety sys- Mark T. Hoske, breach. breached another vendor’s distributed
tem that included the first Content Manager Gary Williams, senior control system (DCS); so while the shut-
instance of process safety sys- director, technology, cyberse- down was initiated as designed, it’s bet-
tem-specific malware, dubbed curity and communications, ter not to suffer a breach and shut down
TRITON, was described in a media Schneider Electric, said this is an indus- a process.
and analyst lunch on Feb. 13. That tri- try call to action. A Triconex controller Other human errors on site, includ-
ple-redundant safety controller brand is model 3008, brought to market in 2001 ing leaving the controller’s keyswitch in
part of the Schneider Electric EcoStrux- and installed as part of a large automa- program mode while it was in opera-
ure Triconex safety instrumented system tion project in 2007, was affected by a tion and leaving the controller cabinets
(SIS). A summary of advice from each security breach. When the controller unlocked, added significant risk for a
expert follows. picked up an anomaly in the malware cybersecurity attack.
the attackers injected into its code, the To lower the risks of such incidents,
Collaborative controller reacted as it was intended: It customers should continue to apply
cybersecurity effort safely brought the plant to a safe state via cybersecurity best practices across
The industry has a problem; hackers a shutdown on Aug. 4, 2017. their operations, as well as always
can reach instrumentation. Upon being notified of the shutdown, implement the instructions vendors
Peter G. Martin, vice president, Schneider Electric worked closely with provide within their systems documen-
innovation, Schneider Electric, said the end user, independent cybersecurity tation. For example, a recommended
a cybersecurity incident that result- organizations and the U.S. Department of practice is to dedicate a laptop for use
ed in attackers injecting malware into a Homeland Security/ICS-CERT and others with the DCS and not let anyone else
safety controller is a call to action for the to investigate the incident. The evidence or anything connect to the laptop.
industry because it heralds a new geopo- they gathered indicates multiple security Schneider Electric’s open and help-
litical climate where malicious actors have lapses allowed the breach to occur. ful response to this incident has been
specialized knowledge, as well as unlimited A remote attacker, through a corpo- applauded and should be a blueprint for
resources, to carry out their cyber attacks. rate system, logged onto a machine and other vendors’ responses because this
These attacks can reach the instru- was playing with code. An individual won’t be the last incident.
ments in a control system, especially if made an error not specific to the con- What’s the attraction for hack-
organizations are not compliant with troller and exposed it to remote access ers? By reprograming the DCS and the
industry standards, best practices, and through Microsoft Windows XP [no lon- safety system, attackers can push the
cybersecurity procedures. That means ger supported] software. Practices out- plant into an unsafe state without those at
industry end users, standards bod- lined in controller documentation, and the plant and the safety system realizing
ies, vendors, and government agen- in the IEC 62443 series of standards on it. That means if an incident occurred,
cies need to come together to combat industrial automation and control sys- the expected result, i.e., the safety system
the threat. The industry shouldn’t tems (IACS) from the ISA99 Industrial shutting down the plant, wouldn’t hap-
think there’s no problem because the Automation and Control Systems Secu- pen. Idaho National Labs demonstrat-
equipment performed as it was sup- rity committee, if followed, would have ed such a DCS spoofing event at least 10
posed to by safely shutting down the prevented the breach. years ago.
transparency. Don’t say or believe any- GO ONLINE All content that appears in our print magazines will
appear as space permits, and we will indicate in print
thing is secure. A lot of people are try- If reading from the digital edition, click if more content from that article is available online.
on the headline for more cybersecurity * Deadlines for feature articles intended for the print
ing to get into these systems. Everyone resources. www.controleng.com/magazine magazines are at least two months in advance of the
needs to respond correctly knowing See related cybersecurity coverage at
publication date. Again, it is best to discuss all feature
articles with the appropriate content manager prior to
what was done before, to know how to www.controleng.com and in articles on the submission.
correct it. next pages of this issue. Learn more at: www.controleng.com/contribute
I
ndustrial control systems (ICS) can achieve 1. Segmentation
lower cybersecurity risk by building a defense- Segmentation is a defense-in-depth strategy
in-depth cybersecurity plan and following the using the principle of dividing up a network to
eight tips highlighted below. limit the amount of damage that could be done if
In the modern age of smart manufacturing, there was a breach. Segmentation creates isolat-
the Internet of Things (IoT) and Industrie 4.0 bring ed, self-contained networks (segments) within the
important competitive advantages—connectivity is the larger network to prevent unwanted access to and
way of the future. Some companies are on the leading limit the vulnerability of the system. Segmenta-
edge to embrace cybersecurity, but others don’t take tion can be created physically by using additional
it seriously until they have a threat or breach. Build- hardware such as cabling and switches, but this is
ing a robust cybersecurity strategy to help prevent a time-consuming and more costly approach than
cyber attacks requires a holistic and layered approach. to do so virtually.
Following the key tips below is key for developing a Isolated networks are normally created within
robust ICS cybersecurity plan. the larger system by using virtual local area net-
works (VLAN). Segmentation can be very basic,
Defense-in-depth such as separating the manufacturing network from
cybersecurity plan the business network, or more complex by creating
“Defense-in-depth” is the term used to describe a different segment for each manufacturing cell.
a planning strategy to secure an ICS; it refers to the For example, in the pharmaceutical industry,
ideal state of having many layers of security sys- each manufacturing cell or packaging line can be
tems and access controls. segmented individually from each other. If network
Begin by identifying the segments need to communicate, a firewall can offer
internal, external, physi- additional protection. The firewall is a separate
cal, and virtual threats to device that decides whether the network traffic is
the control system. Assess allowed to pass or is blocked.
how large of a risk each When plants are regional, having each as a seg-
threat poses, and this ment protects the whole system from a potentially
should be a guide for how catastrophic failure. If further separation is desired,
to best allocate the budget segments can be created in each plant for systems
for a successful cybersecu- such as the instrumentation, control, and visualiza-
rity plan. tion networks.
Make a comprehen-
sive plan to mitigate those 2. Demilitarized zone
risks to an “acceptable” A special case of segmentation is a demilita-
level (which will differ rized zone (DMZ) between a company’s industri-
for each entity). Follow al and manufacturing systems, its business and IT
up with a process of how networks, or the internet. Although not universally
On the Cover: This photo illustrates a to address each threat or implemented in ICSs, a DMZ is important for cer-
network switch. While industrial control breach if it does occur. tain situations. A properly designed DMZ does not
system technology matters, it’s only one Plan for system monitor- allow traffic to traverse directly across the DMZ
aspect of a layered cybersecurity archi- ing and alerts to notify from the business network or internet, to the ICS
tecture. All graphics courtesy: Huffman users a breach is in prog- network. Inside the DMZ, servers or devices act as
Engineering Inc. ress or has happened. intermediaries to communicate across the DMZ.
seweurodrive.com / 864-439-7537
input #8 at www.controleng.com/information
ANSWERS
COVER STORY: CYBERSECURITY
3. Regular backups and updates no more. Force users to have unique passwords, and
Ensure systems are backed up regularly. Create never leave the system set to the default password.
images for all hard drives, backup virtual machines, Additionally, users should not write passwords
and store configurations and programs on a storage in public view, in the vicinity of the equipment,
device such as a network attached storage (NAS) or elsewhere. Add in two-factor authentication
device. The backups should be duplicated to anoth- whenever possible by using technology such as a
er off-site device for additional protection. No mat- rolling code, biometrics, etc. Two-factor authenti-
ter how secure a defense may be, it’s never 100%. cation should be mandatory for all devices offering
Backups are key to a quick and painless recovery. remote- access to the internal system.
Keep systems updated with the latest patches and
upgrade any computers that run unsupported operat- 7. Physical access defense
ing systems. On these obsolete platforms, vulnerabili- Proper physical security measures are often
ties are often made public even though patches are no overlooked. For physical access defense, start
longer offered through the manufacturer. by securing the entrance to the facility. Consid-
Get on email distribution lists with the automation er using security guards, access control systems,
equipment manufacturers to receive relevant security fenced perimeters, and locked doors to critical
bulletins. Additionally, sign up for ICS-CERT notifi- infrastructure systems such as servers and super-
cations through the Department of Homeland Secu- visory control and data acquisition (SCADA) con-
rity (DHS). trol rooms. Remove the key on programmable
logic controllers (PLCs) that allows the program
4. Special purpose security appliances to be altered, if available, and lock control cabi-
A few manufacturers make cybersecurity prod- nets to prevent unauthorized people from access-
ucts specifically for ICSs. Firewall security tools have ing them. Also disable or lock the control system’s
hardware and software are tailored for ICSs. These USB ports.
tools allow rules to be defined, governing which Viruses can be transmitted or data can be sto-
devices are allowed to communicate with the sys- len through these USB ports, and employees can
tem, and what ports and protocols they may use. The inadvertently compromise security by charging
firewall locks down communication to the existing cell phones through them as well.
devices to ensure proper traffic flow. The firewall
recognizes if the communication doesn’t look the 8. Maintain a good relationship
way it’s supposed to, and traffic is blocked. Notifica- with a system integrator
tions or alarms can be set up in addition to the traf- Having another set of eyes that knows a com-
fic block. pany’s automation systems inside and out is an
invaluable asset. For example, last year, a series of
5. Develop a strong security culture ransomware attacks were mounted against compa-
Cybersecurity combines common sense and edu- nies globally. A trusted system integrator can assist
cation. Many threats and attacks originate internally in or after a cyber attack and help provide a quick
and accidently, which underscores the recovery if the integrator has intimate knowledge
need to get personnel on board with of the customer’s ICS applications, processes, and
M More
ANSWERS
the process and to be vigilant. Create a
continuing education plan and include
thorough documentation of software programs
including recent backups.
KEYWORD: cybersecurity a training process for future employees. Implementing a defense-in-depth cybersecurity
Implementing a defense-in-depth Train employees about common social strategy doesn’t have to be a costly and time-con-
cybersecurity strategy engineering tactics. Social engineer- suming undertaking.
How to secure and help protect an ing is the art of manipulating people so Implementing a few defenses will greatly
industrial control system (ICS). they give up confidential information— increase the level of security for an ICS. Control
GO ONLINE phishing emails that appear to come system integrators work directly with a customer’s
Additional information can be from a legitimate source, or phone calls IT department to design and install the desired
found at the U.S. Department of to trick people into revealing informa- type of manufacturing cybersecurity technologies
Homeland Security’s website for the tion. Teach them what to look for, what and provide training.
Industrial Control Systems Cyber
Emergency Response Team (ICS-
not to click on, and how to avoid other Integrators work hand-in-hand with customers
CERT) https://ics-cert.us-cert.gov/. common traps. or can act as an advisor if required. ce
Also link to more about Huffman
Engineering in the Global System 6. Employ limited access Keith Mandachit is engineering manager, Sean Creager
Integrator Database. and unique passwords is senior electrical engineer, and Jay Steinman is
CONSIDER THIS Use the strategy of “least-privi- mechanical engineer, Huffman Engineering Inc. Edited
What steps can be added to your leges,” only gives employees access to by Emily Guenther, associate content manager, Control
facility to help protect your ICS? what they need to do their jobs, and Engineering, CFE Media, eguenther@cfemedia.com.
Radwell.com
- Reduce facility downtime
- Reduce operating costs
- Industrial Electronic Repair
- Radwell Certified PreOwned
- Radwell Verified Substitutes
- Brand New
- Asset Recovery / Buy Back
- Engineering
800.332.4336 sales@radwell.com
input #9 at www.controleng.com/information
Disclaimer: Layout, design, and compilations on this site, are Copyright © 2017 Radwell International, Inc.. All rights are reserved. PLCCenter is a Division of Radwell
International, Inc.. Radwell International, Inc.. sells new and surplus products and develops channels to purchase such product. This website is not sanctioned or
approved by any manufacturer or tradename listed. Radwell / Radwell.com is not an authorized distributor, affiliate, or representative for the listed manufacturers
unless explicitly stated otherwise. Designated trademarks, brand names and brands appearing herein are the property of their respective owners.
ANSWERS
COVER STORY: CYBERSECURITY, PROCESS SAFETY
Alexander Horch, HIMA Paul Hildebrandt GmbH
E
very production process comes with inher- Separate layers reduce risks
ent risks. To achieve the greatest degree of The process industry increasingly is becoming
safety and security, it is vital to implement aware of the importance of relevant standards for the
an effective separation of the process con- safety and profitability of systems. Technical standard
trol and safety systems, which is required IEC 61511, Functional safety - Safety instrumented
for functional safety and cybersecurity standards. systems for the process industry sector, defines the
There is a lot at stake, including the employees’ health, best way to reduce the risk of incidents and down-
the company’s assets, and the environment. time. It prescribes separate safety layers for control
Figure 1: IEC For a better understanding of the interaction and monitoring, prevention and containment, as well
61511 prescribes between safety and security, it is helpful to clarify sev- as emergency measures (see Figure 1). Each of these
separate safety eral terms. There are numerous definitions of safety. three layers provides specific functions for risk reduc-
layers for control A general definition of safety is the absence of danger. tion, and collectively they mitigate the hazards arising
and monitoring, This means a condition is safe when there are no pre- from the production process.
prevention and vailing hazards. It often is not possible to eliminate all IEC 61511 also prescribes independence, diversity,
containment, as potential risks; especially in complex systems. and physical separation for each protection level. To
well as emergency A more common definition of safety is the absence fulfill these requirements, the functions of the differ-
measures. Cour- of unacceptable risks. Reducing risks to an acceptable ent layers need to be sufficiently independent of each
tesy: Control Engi- level is functional safety’s task. An application’s safety other. It is not sufficient to use different I/O modules
neering Europe/ depends on the function of a corresponding technical for the different layers because automation systems
HIMA system, such as a safety controller. If this also are dependent on functions in I/O bus systems,
system fulfills its protective function, CPUs and software.
the application is regarded as func- To be regarded as autonomous protection layers in
tionally safe. accordance with IEC 61511, safety systems and pro-
This can be clarified with cess control systems must be based on different plat-
these two examples: oil flow- forms, development foundations, and philosophies.
ing out of a pipeline and In concrete terms, this means the system architecture
endangering people in the must, fundamentally, be designed so no component in
vicinity is a safety issue. A the process control system level or the safety level can
system that cannot prevent be used simultaneously.
icing in a pipeline, even
though that is supposed to Rising risk
be its task, and then a criti- In the last 10 years, the risk of cyber attacks on
cal situation arises, is a func- industrial systems has risen due to increasing digita-
tional safety issue. Functional lization. In addition to endangering information secu-
safety systems protect people, rity, these attacks increasingly pose a direct threat to
facilities, and the environment and system safety. System operators need to be aware of
are intended to prevent accidents these risks and address them. This can be achieved
and avoid downtime of equipment or in a variety of ways. Unlike functional safety systems,
systems. which are intended to protect people, these systems
You don’t want to wait for your order. We have hundreds of videos online for you to ge
We have same-day shipping, and learn about our products. When shopping onl
looking at has video, it will be available right there
it’s even FREE if your order is over $49.*
And for almost-FREE online videos that dive deep
product lines, go to www.interconnnectingauto
AutomationDirect has always maintained a huge inventory, allowing us to ship
and in-depth training libraries.
97.5% of orders complete the same day.
*Order over $49, and get free 2-day (transit) shipping within the U.S. and Puerto Rico. Programming software for a complex product can
(Certain restrictions apply; Canadian orders may take longer based on destination) help you out by offering FREE fully enabled soft
popular products, including the Do-more PLCs, Pr
You want to be confident CLICK PLCs and C-more Micro HMI. No license or u
you’re buying quality products. and our support is free too!
We stand behind our products In addition to software and documentation onlin
drawings for the majority of our product lines.
and guarantee your satisfaction.
www.AutomationDirect.com/suppo
We want you to be pleased with every order. That’s why we offer a
30-day money-back guarantee on almost every stock product we sell, 99.7% of orders ship comp
including our software. (See Terms and Conditions online for exclusions.) See for yourself at www.Autom
nt Center and Warehouses This “.com” is powered
ouses
by “.awesomepeople”!
For over twenty years our sole focus has been customer service.
That takes many forms: great prices, fast delivery, and quality
products. But regardless of our product selection and other
tangibles like pricing, the intangible value of customer service
is something that cannot be faked, automated or glossed over.
Our team members here at AutomationDirect.com approach every day
with this one goal in mind - serve the customer. It’s a simple philosophy
that many companies forget or make too complex and fail at. If the
answer to any decision is “Yes, this is good for our customers”,
about 45 minutes north of Atlanta, GA, USA.
our sales and technical support teams, purchasing,
then we do it.
se our huge warehouses and speedy logistics team. It’s common sense.
A quality product line, with FREE #1 rated technical support and quick shipping!
Call 1-800-633-0405 or visit us at: www.AutomationDirect.com
COVER DIAGRAM,
figure 2: IEC 62443
requires separate
zones for the enter-
prise network, control
and measures protect technical information systems room, SIS, and BPCS,
against intentional or unintentional manipulation as each of which must be
well as against attacks intended to disrupt production protected by a firewall
processes or steal industrial secrets. to prevent unauthor-
Safety and security have become more closely ized access. Courtesy:
meshed. Cybersecurity plays a key role, particularly Control Engineering
for safety-oriented systems, because it forms the last Europe/HIMA
line of defense against a potential catastrophe.
Understanding industrial
control systems security basics
It’s critical to implement an in-depth cybersecurity plan to help protect
industrial control systems (ICSs) against a cyber attack. Identify threats,
vulnerabilities, standards, and documents.
A
n industrial control system (ICS) is a The necessity of ICS security is sought after even
general term used for any distributed more now that the number of threats has increased.
control system, programmable logic Regulations are being enforced and companies have
controller, supervisory control and data a legal, moral, and financial obligation to limit the
acquisition or any automation system risk. IEC 61511:2016-Functional Safety-Safety
used in industrial environments that includes criti- instrumented systems for the process industry sector
cal infrastructures. ICS security is designed to protect also demands security assessments on safety instru-
the system from any interference either intentional mented system (SIS) design in control systems.
or unintentional, which may lead to unintended ICS Because of the recent outcry over cyber attacks,
operations. ICS security has received more attention as a necessity
to protect against external hackers. However, cyberse-
Industrial control system security curity is one part of ICS security; threats against mod-
ICS security can be very broadly categorized as ern control systems come in many forms.
cybersecurity. Though the word “cybersecurity”
implies the intention is to look at only the “inter- Identify threats
net” connection, that is not the case when it comes Threats can be external or internal and can be cat-
to ICS environments. egorized as deliberate, intentional and accidental, or
unintentional. Typical external threats are hackers,
rival business competitors, or rival organizations/
states. Typical internal threats are erroneous actions,
inappropriate behavior, disgruntled employees, etc.
To protect against external threats, more needs to
be done than just strengthening the network. Not all
internal threats can be avoided by strengthening the
internal procedures/policies. Optimal ICS security is
achieved by strengthening the network and backed
up correct policies and procedures.
Physical &
activity in the system, control network data is unauthenticated environmental Threat
and inadequate to support critical components and systems. A security
threat can use many pathways to enter into a control network
(See Figure 1).
Firewalls can help disrupt a threat’s pathway into a system.
ICS
Installing a firewall is easy, programming one is difficult, and
programming correctly is very difficult. An improperly con- Policies and Network
figured firewall is equal to not having one. procedures security
An SIS is susceptible to threats if COTS technology is
being used. Especially if they are integrated as part of the con-
trol network and communicate over an insecure, open proto-
col. Compromising an SIS may lead to temporary setback or Threat
Threat
a loss.
System availability is the prime objective since continous
and time-critical operations are performed by ICSs. Human Figure 2: Defense-in-depth can be incorporated
safety is also paramount. In IT environments, confidentialty by strengthening security measures. If the net-
matters and system availability is not a major priority. In ICS work security is broken, it can be countered
environments, companies can’t afford to lose control for even with correct policies and procedures.
a few seconds because response time is critical.
itative assessments, proper definition consequence
Security standards for ICSs parameters are required.
Governments and other industry organizations are devel- In suitable test environments, a scanner can per-
oping security standards to provide guidance and suggesting form a vulnerability assessment. Results from scan-
best practices to strengthen systems against potential threats. ner tools, as Figure 1 shows, are not enough. ICS
Some of the main standards are: security alone does not protect against from cyber
• ISA99 – Industrial Automation and Control Systems attacks but also involves personnel, physical, and
Security /IEC 62443 series of standards environmental security.
• The National Institute for Standards Technology Physical security requirements may include con-
(NIST) SP 800-82 – Guide to Industrial Control Sys- trolling access to restricted areas, CCTV, motion
tems Security standard sensors, thermal video systems, and other areas.
• The North American Electric Reliability Council CIP Environmental protection against dust, tempera-
series of standards. ture, and toxic gases can be achieved with a proper
HVAC system and proper alarm systems for failure
Like a functional safety lifecycle, a cybersecurity’s lifecy- identification.
cle also depends on three fundamental components: analysis, Awareness, policies, and procedures are crucial
implementation, and maintenance. The lifecycle is a continuous for addressing accidental and internal threats. Access
process and feedback is crucial (See Figure 2). and authorization control to access and perform par-
It’s difficult for some companies ticular actions needs to be addressed through poli-
M More
ANSWERS
to maintain a budget to implement
and maintain a cybersafety lifecycle.
Without the commitment of compa-
cies and procedures that are put in place. Logs also
can be used to keep track of access levels.
Security plans also need to be incorporated
KEYWORDS: Industrial control ny leadership, the cybersafety lifecycle while developing software to achieve software secu-
system, safety lifecycle likely will fail. Present a business case rity assurance. Cybersecurity certified components
Determining security standards for to management outlining the potential shall be used in the control system. An in-depth
industrial control systems (ICSs)
threats, consequences, and benefits to defense technique is necessary to secure the ICS
The purpose of implementing
cybersecurity measures for an ICS the business. and minimize the risk.
Threats that leave ICSs vulnerable to A proper risk assessment should Since cyber threats rapidly change, security risk
cyber attacks. occur to suit the organization’s needs. management should be a continuous process. A
The risk assessment may include the periodic review and audit of the cybersafety life-
CONSIDER THIS
plan, the test environment, and met- cycle is necessary to maintain operations. This
What pathways are vulnerable
in your system that needs to be rics and documentation. includes patch management, antivirus updates, and
protected against threats? Various tools are available to eval- being aware of industry trends and risks. ce
uate risk assessments. A qualitative or
GO ONLINE
quantitative approach can be chosen Sunil Doddi is a controls systems engineer at
See related articles on cybersecurity
on www.controleng.com. based on the organization’s require- Hydro-Chem, a division of Linde Engineering North
Read more online about ICS ments to evaluate the impacts of a America. Edited by Emily Guenther, associate con-
security standards and various safety cycle. In a quantitative assess- tent manager, Control Engineering, CFE Media,
cybersecurity tools. ment, previous data is used. In qual- eguenther@cfemedia.com.
Digital Enterprise.
usa.siemens.com/tia-portal-ce
input #11 at www.controleng.com/information
ANSWERS
IT/OT CONVERGENCE
Robert Wakim, Stormshield
O
ne of the biggest challenges facing the The status quo is about to change. Reports about
industrial sector is understanding the a new virus called Industroyer have indicated it has
risk and impact cybersecurity attacks the power to seriously damage or compromise indus-
can have as the transition to Indust- trial control systems (ICSs). This virus can speak four
rie 4.0 and the Industrial Internet of industrial languages and is highly customizable and
Things (IIoT) gains momentum. Companies are can be used in targeted attacks.
starting to realize there is a significant gap between Industrial operational systems, while robust, are
the priorities of operations technology (OT) and not safe from attack, and they aren’t compatible with
information technology (IT) teams and this has a today’s interconnected environment. Now, as OT and
major effect on cybersecurity initiatives. IT systems converge, there is an urgent need to find
For engineers on the OT side, the focus is on a balance between ensuring availability and securing
available services. Production must continue because themselves against cyber attacks.
any interruption could result in a serious setback and
it must be safe because engines, motors, and proces- Changing mindsets
sors carry a physical risk to operators. IT, however, is Engineers speak a different language than IT man-
worried about a computer network security breach. agers. They need to agree upon a common approach
However, many manufacturers either believe and strategy.
their production processes are unconnected to The influence of Industrie 4.0 on automation is
the internet, or they haven’t considered bringing about major changes and greater adoption
M More
ANSWERS
there was even an internet connection
in the factory.
The gap between the factory and the
of cloud and cognitive computing. This creates a need
for massive computer resources to support the flow of
data to and from the cloud via IoT-connected devices.
KEYWORDS: cybersecurity,
Industrie 4.0
internet has become virtually non-exis- Factories are communicating in real-time across net-
Increased connectivity
tent. With the growth of IoT-connected works and they need to be secure.
increases the risk of a potential devices, cybersecurity risks are escalating. Standard firewalls and security software are not
cybersecurity attack against For most engineering firms, however, the enough. Next-generation firewall hardware needs
manufacturers. focus remains on designing sophisticated to be built to adapt to industry prerequisites such as
Operations technology (OT) systems that are robust and safe, and this DIN-rail mounts.
and information technology (IT) is having a detrimental effect on securing OT and IT need to work together to combat
need to work together to combat
cybersecurity risks. networks. the risks regardless of what they are. The threat
to the new generation of manufacturing enter-
GO ONLINE How high is the risk? prises does not have to impact companies if
Read this article online at In many ways, the lack of real concern appropriate consideration is given to safety, avail-
www.controleng.com for more
information about cybersecurity in the industrial sector to date is under- ability, and security. ce
and how OT and IT can work standable. The technology used in man-
together. ufacturing enterprises is rarely standard, Robert Wakim is industrial offer manager at Storm-
CONSIDER THIS highly complex, and often unique. This shield. This originally appeared in a November 6
What else can be done to better would mean a malicious attack on indus- article on the Control Engineering Europe website.
protect OT and IT systems as trial processes would have to be very spe- Edited by Chris Vavra, production editor, Control
they become more connected? cific in order to do harm. Engineering, CFE Media, cvavra@cfemedia.com.
According to the data in the 2018 report, the top uses for
HMI software or hardware by respondents are continuous
manufacturing (27% primary, 18% secondary) and discrete/
continuous manufacturing (20% primary, 20% secondary).
Also according to the study, eight in ten respondents
expect to buy HMI software or hardware in the next
12 months, and the average amount they expect to spend
on these products over this period is $141,906.
Download the new Control Engineering HMI Software & Hardware Research today!
www.controleng.com/2018HMIReport
A
s governments, businesses, and individ- exclusively) and exploitation of the human element.
uals become more connected each day, From the now-infamous Russian hacker group, “Cozy
the risks of cyber attacks are increasing Bear,” to North Korea’s elite hacker group, “Bureau
exponentially and in tandem with this 121,” these attacks are meticulously planned and, in
connectivity. An interesting shift is start- some situations, carried out in multiple stages over
ing in cyber attack activity, intention, and attribution. long periods of time. To illustrate common tactics,
Independent hackers or organizations used to be software, and malware often used by nation-state
at the forefront of cyber attacks; now, nation-state attacks, three examples are highlighted.
sponsored attacks against government institutions,
businesses (especially those in the critical infrastruc- 1. Dragonfly 2.0, critical infrastructure
ture segments) have increased. As a major component of critical infrastruc-
The cyber-weaponization of global nations and the ture, the energy sector has become a prime target
attacks that inevitably follow are not necessarily new, for cyber attacks. One of the most prominent recent
but this territory has recently been forced into the attacks is the Ukrainian power outage that occurred
spotlight, and now is the time for companies to take in December 2016, and it is possible that anoth-
action to guard against the risk of a cyber attack. er group, currently referred to as “Dragonfly 2.0,” is
Fortunately, companies can learn a lot from past currently pursuing the same end goal in Europe and
attacks, even from those outside their industry, to North America.
improve their defensive postures and to take neces- The main strategy of this hacker group appears to
sary cybersecurity measures. be gaining access to the victim’s network and, again,
Looking at what made some of these nation- humans are being exploited as the main access point.
state cyber attacks successful, it is possible to iden- By deploying several strategies, including malicious
tify patterns in attack methods, understand common emails, watering hole attacks (when frequently visited
access paths, and address ways in which businesses websites are infected with malware), software infected
can safeguard their sensitive systems and informa- with trojan viruses and various malware programs, it
tion against malicious activity. Due to the constant is now believed Dragonfly spent 2011 through 2014
evolution of technology and software that gathering information and credentials before resur-
M More
ANSWERS
is used to carry out cyber attacks, there
is no one solution. However, with train-
ing and robust internal processes, orga-
facing in 2017 to potentially launch an attack.
Developing a proactive
cybersecurity strategy
Understanding the unique motivation of nation-
state cyber attacks is essential to developing a strate-
‘ Due to the constant evolution of technology
and software that is used to carry out cyber attacks,
’
gy to safeguard a system against an array of potential there is no one solution.
breaches. Though traditional espionage is rooted in
the desire to learn, nation-state cyber attacks often
seek to sabotage through direct action or interference. Nevertheless, software security remains a valuable
Due to the complexity of these cyber attacks, they part of a cybersecurity solution, and it is important to
are often conducted in stages, beginning with infor- identify, assess, and correct vulnerabilities in software
mation gathering. Fortunately, despite the end goal of applications before the software is integrated into a
these attacks being fairly unique, nation-state spon- system and while it is in use.
sored hackers typically use the same methods–some Fortunately, while working to improve technology,
sophisticated, others fairly off-the-shelf as indepen- the industry has also been working to develop criteria
dent attacks in their plan. necessary to assess the software used to protect sensi-
First, these groups aim to establish a regular pres- tive information and critical infrastructure from cyber
ence in the system by using advanced persistent attacks. Engaging with a third-party for these evalua-
threats (APT) and remote access tools (RAT) to avoid tions can help save time and resources while instilling
detection and bypass security at unprepared facilities. confidence in the software.
From there, data mining would begin as the hackers Cybersecurity programs help minimize risk by
worked to harvest information that ultimately will be helping ensure that all software is secure and remain
used to complete the attack (leak the data, leverage the secure. By deploying consistent testable criteria, com-
data, use the data to control/damage the system/infra- panies can begin to reduce exploitation, address
structure, etc.) or launch subsequent attacks. known malware, enhance security controls, and
Because of these threats, it is tempting for organi- expand security awareness. All of these are essential
zations to want to double down on technology in an steps for conducting business today.
effort to keep pace, but approaching the issue from a With a strong software foundation in place–includ-
strategic standpoint by taking a risk-based approach ing procedures to ensure that the evaluated software
would be more effective overall. remains updated, effective, and secure–staff train-
Secure systems and facilities by improving the ing creates a final, necessary layer of protection and
human side of systems interaction. In nearly every another set of watchful eyes.
cyber attack, humans unwittingly gave access to hack- With every new security development, new mal-
ers by opening and spreading infected emails and ware and access methods are being tested and
clicking on links. To minimize the likelihood of dam- deployed by hackers globally. This is the reality of liv-
age, limit user access to critical systems as necessary as ing with the convenience of a connected world. How-
a starting point. Continuous, regularly updated staff ever, it is possible to remain aware and ready in the
training is the keystone to mitigating cybersecurity face of increasing cyber attacks. ce
threats and developing a solid cybersecurity strategy.
Ken Modeste is cybersecurity lead and global princi-
Cybersecurity tools pal engineer, UL. Edited by Emily Guenther, associate
Tools and technology remain important, but with content manager, CFE Media, Control Engineering,
government-backed hacking groups having access to eguenther@cfemedia.com.
Threat intelligence is
a critical organizational need
Continuous threat intelligence collection, analysis, and optimization
can help organizations improve cybersecurity measures.
C
ybersecurity managers face many chal- techniques, and procedures that evade stand-alone
lenges, with corporate boards demand- security plans. Organizations need an evidence-
ing awareness of cyber risks, faster based, holistic view of the threat landscape with a
processing of complex data, and effi- proactive security posture to defend organizations
ciently managed services for an increas- from a wide array of potential threats.
ing number of intelligent devices. Security teams The goal behind threat intelligence services is
are in a better position to defend their organiza- to provide organizations with the ability to become
tions against threats if they take the proper preven- aware, recognize, act upon attack indicators, and
tive measures. Tools and staff need to be augmented comprise scenarios in a timely manner that bet-
with threat intelligence. ter protect against zero-day threats, advanced per-
Threat intelligence is no longer just for large, sistent threats, and exploits. Security teams across
well-funded organizations. It is now required to the world are challenged to discover, analyze, and
be an overall component of mitigation strategies interpret the vast number of daily events to discover
for all businesses that operate within this evolving attacks. Security consortiums are leading efforts to
technological environment. Small businesses can automatically detect, contextualize, prioritize, per-
access credible threat intelligence sources that can form forensic analysis, automate compliance, and
be based on an organization’s profile and supply respond to incidents go beyond security informa-
chain. Critical data that used to be in a secured data tion management to security threat intelligence.
center now moves across an increasingly complex Facility owners should define what they hope to
ecosystem of networked environments including achieve from threat intelligence; including:
the Industrial Internet of Things (IIoT), Internet
of Things (IoT), cloud servers, virtualized environ- • Types of alerts needed
ments, and mobile devices. • Vendor news
• How intelligence is collected, reported and
Cybersecurity and threat communicated to relevant stakeholders
M More
ANSWERS
intelligence
The rate of change in some enterprise
environments is so rapid many organi-
• Analysis process
• How threat intelligence would be used.
KEYWORDS: Threat intelligence zations struggle to keep pace with the Threat intelligence feed
feeds, cybersecurity evolving nature of cyber threats or have An analysis identifying the organization’s needs
The importance of threat the ability to stay tuned into the threats through an internal assessment of the organiza-
intelligence feeds
that arise. To build an effective cyber- tion’s processes, infrastructure, requirements, ability
Implementing a successful
mitigation strategy against cyber security strategy, an organization needs to manage threat intelligence and security posture
attacks to be aware of specific cyber threats and should be performed. Customers should compare
understand how those threats impact the the data feed and capabilities, alerts and reports,
CONSIDER THIS
organization. relative subscription prices and support offered by
How would implementing a
threat intelligence feed improve Threat intelligence provides con- providers.
your organization’s defense text, indicators, increased awareness, Threat intelligence feeds are becoming a dom-
against a cyber attack? and actionable responses about current inant method as an intelligence gathering process
GO ONLINE or emerging threats. This is designed to for organizations that are developing their threat
See related articles on aid in decision-making at an operational, intelligence capability. These feeds provide a major
cybersecurity at tactical, or strategic level. Cyber adver- benefit of combining intelligence into one source
www.controleng.com saries are using more sophisticated tools, that is easy to digest. The real-time nature of threat
‘
information against internal vulnerability assessments
to allow for better prioritization of security controls. Threat intelligence feeds are becoming a
A threat intelligence platform should prepare a
defense for the organization. Combining threat intelli- dominant method as an intelligence gathering
gence capabilities to an organizations’ software, hard-
ware, and policy defense strategy enhances the staff ’s process for organizations that are developing
ability to search for advanced attacks, profile atypi-
’
cal malware, and detect potential adversaries. Typical their threat intelligence capability.
internal threat intelligence teams have been deployed
and structured in a way that is costly, hands-on, and Through collecting continuous threat intelligence,
misaligned to the organization’s security posture. analysis, and optimization, organizations can increase
Customers should work with their provider to their protective measures and strengthen their security
improve subscription offerings, selected offerings, tools. Significant and beneficial trends for cybersecu-
technical indicator feeds for integration, specific sum- rity in the following areas include:
mary reports on events and emerging cyber threats,
trends within the various business sectors and ensure • Threat awareness over the past 5 years, has risen
that it is aligned to a long-term vision with integrated from 25% to 75%. Companies have realized that
processes, and business requirements. cyber attackers had the advantage of knowing
more about their networks than they did and are
Too few cybersecurity now becoming more proactive.
professionals, tools • The percentage of organizations that have formal-
The industry still has to address the growing short- ized in-house/out sourced teams to address threat
age of skilled cybersecurity professionals, isolated intelligence has risen from 25% to 45% over the
security products, lack of integration with other devic- past two years.
es and management tools, lack of funding, and inad- • The overall level of satisfaction with various
equate correlation of threat data. Companies must be threat intelligence elements that companies use is
mindful implementing programs to avoid the typical approximately 73%. This may be skewed as some
failings such as not integrating threat intelligence into may not understand what they are not receiving
the enterprise platform, consuming but not sharing from other threat intelligence.
data, manual processes becoming a burden, no real-
time data to provide security awareness, and lacking The industry also is making progress as data sci-
contextualized information. ence and machine-learning models are deliver-
In a global environment where cyber attacks are ing entirely new ways of looking at threats; this has
generated at a machine level, customers must ensure the effect of avoiding the dependency of seeing the
the identification, sharing, comprehension, and appli- threat previously to provide security. Data science
cation of threat intelligence is as automated as possi- and machine-learning models can evaluate the traf-
ble. An automated platform allows for easy access to fic based on the collective knowledge of all internal
the intelligence and the ability to contextualize and and external threats previously to ascertain discrep-
prioritize attacks for immediate mitigation strategies. ancies that may become threats. According to recent
Effective intelligence assesses intelligence from various research including reports from Statista and IDC, it’s
sources and source types to create a better threat and estimated that global external threat intelligence ser-
risk image for an organization. vices spending is expected to increase to over $1.6
The value to end customers is not the quantity of billion by the end of 2018. ce
the various intelligence feeds, but the applicability of
those feeds to their entire environment. The ability to Anil Gosine is a global program manager at MG
customize dashboards and filters to continuously illus- Strategy +, a CFE Media content partner. Edited by
trate threats allows security teams to focus on threats Emily Guenther, associate content manager, Control
that impact the organization. The threat intelligence Engineering, CFE Media, eguenther@cfemedia.com.
R
esearchers and entrepreneurs with calling it AI since 1956 (when the father of AI, John
decades of working in artificial intelli- McCarthy, coined the term “artificial intelligence”),
gence (AI) are trying to help people bet- so roughly 62 years. But it’s much more complicated
ter understand its elusive nature. They’re than physics, and physics took a very long time. I
working to reduce some of the confu- think we’re still in the infancy of AI.”
sion and misconceptions around AI and show how Brooks believes much of the AI hype comes from
it’s being used in robotics for industrial applications. recent press covering jaw-dropping demonstrations
“I think the biggest misconception is how far of anthropomorphic and animal-inspired robots, or
along it is,” said Rodney Brooks, chairman and CTO spectator sports pitting AI systems against humans
of Rethink Robotics. “We’ve been working on AI, playing chess, Jeopardy!, ping-pong, and Go. AI is
here, but it is taking baby steps.
Some of the misunderstanding stems from equat-
ing machine performance with competence. When
we see a human perform a certain task, we can
assume a general competence—skills and talent—
the person must possess to perform that task. It’s not
the same with AI.
“An AI system can play chess fantastically, but
it doesn’t even know that it’s playing a game,” said
Brooks. “We mistake the performance of machines
for their competence. When you see how a program
learned something that a human can learn, you make
the mistake of thinking it has the richness of under-
standing that you would have.”
Lack of context
An important distinction between human intelli-
gence and machine intelligence is context. As humans,
we have a greater understanding of the world around
us. AI does not.
“We’ve been working on context in AI for 60 years
and we’re nowhere near there,” said Brooks. “That’s
why I’m not worried that we’re going to have super
intelligent AI. We’ve been successful in some very nar-
row ways and that’s the revolution right now, those
narrow ways. Certainly speech understanding is radi-
cally different from what we had a decade ago. I used overly pessimistic about our role as humans in that Figure 3: A robot
to make the joke that speech understanding systems future. manipulates objects
were set up so that you press or say ‘2’ for frustration. it has never encoun-
That’s no longer true.” AI research in the real world tered before after
He cited Amazon’s Alexa as an example. Google’s Goldberg stresses multiplicity over singularity, not- researchers teach a
Assistant and Apple’s Siri are two more. ing the importance of diverse combinations of people neural network how
“You say something to Alexa and it pretty much and machines working together to solve problems and to recognize objects
understands it, even when music is playing, even innovate. This collaboration is especially important as from millions of 3-D
when other people in the room are talking,” said AI’s applications exit the lab and enter the real world. models and images.
Brooks. “It’s amazing how good it is, and that came Pieter Abbeel, a professor in the department of Courtesy: University
from deep learning. So some of these narrow fields electrical engineering and computer sciences at UC of California, Berke-
have gotten way better. And we will use those nar- Berkeley, who is working to bring AI to the industri- ley/RIA
row pieces to the best advantage we can to make bet- al world as president and chief scientist of Embodied
ter products. Intelligence, also stresses the importance of humans
“When I started Rethink Robotics, we looked at and machines working together.
all the commercial speech understanding systems. “That’s part of the challenge,” said Abbeel. “How
We decided at that point it was ludicrous to have any are humans able to use this technology and take
speech recognition in robots in factories. I think that’s advantage of it to make themselves smarter, rath-
changed now. It may make sense. It didn’t in 2008.” er than just have these machines be something sepa-
Speech recognition compiles the right word rate from us? When the machines are part of our daily
strings. Brooks said accurate word strings are good lives, what we can leverage to make ourselves more
enough to do a lot of things, but it’s not as smart productive, that’s when it gets really exciting.”
as a person. While Abbeel is excited about AI’s prospects, he
“That’s the difference,” he said. “Getting the thinks some caution is warranted.
word strings is a narrow capability. And we’re a “I think there is a lot of progress, and as a con-
long way from it being not so narrow.” sequence, a lot of excitement about AI,” he said.
These narrow capabilities have become the “In terms of fear, I think it’s good to keep in mind
basis for many optimistic AI predictions that are that the most prominent progress like speech
Figure 4: A collaborative robot with integrated artificial intelligence smarter and smarter machines, our capabilities as
(AI) tends a computer numerical control (CNC) lathe at a custom humans will be augmented.
injection molder, automating the process of improved product qual- “What makes me very excited about what we’re
ity and production efficiency, and saving operators from repetitive doing right now at Embodied Intelligence is that the
tasks. Courtesy: Rethink Robotics/RIA recent events in artificial intelligence have given AI the
ability to understand what they are seeing in pictures,”
recognition, machine translation, and recognizing said Abbeel.
what’s in an image are examples of what’s called super-
vised learning.” Deep learning for robot grasping
Abbeel said it’s important to understand the differ- Goldberg’s Autolab has been focused on AI for
ent types of AI being built. In machine learning, there over a decade and has been applying it to projects in
are three main types of learning: supervised learning, cloud robotics, deep reinforcement learning, learning
unsupervised learning, and reinforcement learning. from demonstrations, and robust robot grasping and
“Supervised learning is just pattern recognition,” manipulation for warehouse logistics, home robotics,
said Abbeel. “It’s a very difficult pattern to recognize and surgical robotics.
when going from speech to text, or from one language The lab’s Dexterity Network (Dex-Net) project
to another language, but that AI doesn’t really have has shown AI can help robots learn to grasp objects
any goal or any purpose. Give it something in English, of different size and shape by feeding millions of 3-D
and it will tell you what it is in Chinese. Give it a spo- object models, images, and the metrics of how to
ken sentence, and it will transcribe it into a sequence grasp them to a deep-learning neural network. Pre-
of letters. It’s just pattern matching. You feed it data— viously, robots learned how to grasp and manipulate
images and labels—and it’s supposed to learn the pat- objects by practicing with different objects over and
tern of how you go from an image to a label. over, which is a time-consuming process. By using
“Unsupervised learning is when you feed it just the synthetic point clouds instead of physical objects to
images, no labels,” said Abbeel. “You hope that from train the neural network to recognize robust grasps,
just seeing a lot of images that it starts to understand the latest iterations of Dex-Net are much more effi-
what the world tends to look like, and then by build- cient, achieving a 99% precision grasping rate.
ing up that understanding, maybe in the future it can In the long term, Goldberg hopes to develop
learn something else more quickly. Unsupervised highly reliable robot grasping across a wide variety
learning doesn’t have a task. Just feed it a lot of data. of rigid objects such as tools, household items, pack-
“Then there’s reinforcement learning, which is aged goods, and industrial parts.
very different and more interesting, but much hard-
er. (Reinforcement learning is credited for advance- Deep-learning collaborative robots
ments in self-driving car technology.) It’s when you Rethink Robotics’ Intera 5 software is designed to
give your system a goal. The goal could be a high score make Baxter and Sawyer collaborative robots smarter.
in a video game, or win a game of chess, or assemble Brooks said there’s a lot of AI in the robots’ vision and
two parts. That’s where some of that fear can be justi- training capabilities.
fied. If AI has the wrong goal, what can happen? What “Traditional industrial robots don’t have much
should the goals be?” intelligence,” said Brooks. “But going forward, that’s
It’s important humans and artificial intelligence what we’re doing. We’re putting deep learning into
don’t evolve in a vacuum from each other. As we build the robots. We’re trying to deal with variation because
C
ustomers want goods made to order bined with cognitive analysis, it gives programs the
and delivered as soon as possible in a ability to act like humans by making business deci-
way that suits their flexible lifestyles. sions on the fly.”
This is a byproduct of the mobile, app- Bala added, “When you combine the transaction-
driven, on-demand age. For many al processing of purely repeatable tasks with business
organizations and their warehousing and logistics processes—and also root-based decision-support sys-
experts, those customer wants can shine a harsh tems—that’s truly a game-changer.”
spotlight on legacy business models.
Smart warehousing is making rapid technology 2. Predictive maintenance
advancements the norm, which is forcing those com- A mix of different technologies is impacting the
panies to change how they manage their storage and traditional idea of maintenance. Until the advent of
logistics to compete with next-day delivery cycles. the Internet of Things (IoT) and supporting technolo-
Broad-spectrum automation is happening on the gies, maintenance had been a passive, reactive process.
back of advances in industrial robotics. Related tech- Today a mix of technologies, including enterprise
nologies, such as drones, are becoming faster and asset management, digital twins—exploded 3-D rep-
safer around human beings in complex settings such resentations of objects and their components such as
as warehouses. sensors—radio frequency identification (RFID) tags,
Internet of Business asked four smart supply chains, and AI are allowing organiza-
M More
ANSWERS
experts for predictions about how ware-
housing will develop in 2018 and the
five trends that will be the driving force
tions to gain unprecedented insight into the lifecycle
of products, components, and even materials.
Using these and other technologies, objects can
KEYWORDS: robotics,
warehousing behind these changes. not only tell organizations when they need fixing,
Technology developments are maintenance, or upgrade, but also predict when
changing warehouses’ role in the 1. Robotics and cognitive they’re likely to fail, enabling end-to-end lifecy-
supply chain and making them computing cle management. Warehouses around the world are
more active overall.
Taking a cue from Amazon, Alibaba, increasingly adopting proactive maintenance pro-
Robotic process automation
(RPA) and cognitive computing and others, process automation will move cesses so that costly and time-consuming equipment
are expected to combine in center stage—not only via the use of physi- failures are less likely to happen. And the same pro-
warehouse operations to provide cal robots that replicate manual tasks, but cesses can be used to protect perishable stock.
smarter information in real-time also through robotic software applications Eberhard Klotz, the head of the Industrie 4.0 divi-
for manufacturers.
and cognitive computing services, such sion at Festo, said, “There will be comprehensive con-
Three-dimensional printing and
collaborative robots will provide
as artificial intelligence (AI) and machine dition monitoring, which helps to avoid or reduce
more flexibility for warehouses in learning. downtime and optimizes maintenance procedures and
their operations. Thiagu Bala, a senior manager at mobile maintenance.”
GO ONLINE Deloitte Consulting, said, “In 2018, two Essentially, the faster an issue can be brought to
Read this article at
technologies will combine: robotic pro- awareness and analyzed, the faster a repair can be
www.controleng.com for links to cess automation (RPA)—involving small, implemented before a minor issue becomes a major
additional stories about the IIoT. repeatable software programs or bots— problem.
CONSIDER THIS and cognitive computing. This will make
What other changes and
a huge difference when it comes to data, 3. Warehousing on-demand
developments will have a positive by enabling labor to focus on truly mis- Most people are familiar with how sharing-econ-
effect on smart warehouses? sion-critical activities. When RPA is com- omy platforms and apps, such as Uber, Airbnb, and
Laundrapp, have disrupted centuries-old sectors, smartphone model by becoming programmable plat-
such as personal transport, accommodation, and forms for a range of process- or industry-specific apps.
cleaning. What few people realize is the model now Printing in 3-D will be another ingredient in the
is being applied to industrial warehousing. mix. Most organizations are familiar with the concept
Startups in the U.S. and the UK have created apps of using this emergent technology for small, special-
and cloud platforms that transform both the buy ized projects. However, some Industrie 4.0 analysts
and sell sides of the market. They’re allowing ware- believe 3-D printing will become an increasingly
house owners to lease out spare capacity, and clients important tool on a larger scale.
to rent it on-demand over timescales ranging from Andrew Hughes, a principal analyst at LNS
days to months. Research, sees a prominent role for 3-D printing in
The idea might seem simple enough, but the impli- rapid fulfillment: “3-D printing brings design, manu-
cations could be transformative. facturing, and service flexibility to many industries,”
For example, organizations no longer need to think he says. “As speed, quality, and materials improve,
‘
those that exploit the new possibilities will be the win-
In the future, the distinctions between factory ners. What you make today is a limiting factor for
most manufacturers, but we are already seeing manu-
floor and warehouse may begin to disappear once facturing hubs, where a facility can produce items to
order for an enormous variety of customers and deliv-
some factories move away from the monolithic, er in a short timescale.”
’
Hughes added, “Manufacturing really is becom-
mass-production and distribution cycles. ing a critical part of the supply chain and logistics.
Print-to-order manufacturing flexibility means hav-
of warehousing in terms of massive regional hubs that ing the right printers, materials, and designs ready for
require long-distance road haulage. Instead, they can any customer order. It brings us back to the fact that
now manage it as a national or international grid of Industrie 4.0 is, in fact, all about data.”
smaller facilities that can be expanded or contracted
on demand. 5. IoT standards and regulations
On the sell side of the equation, organizations no Today’s smart warehouses are increasingly rolling
longer need to carry vast amounts of unused capac- out transformation strategies that deploy sensors con-
ity that cost money, especially when the economy is nected to the IoT—so robots, workers, managers, and
unpredictable. With these new on-demand platforms, even smart vehicles know the location of every item
unused space becomes a commercial asset. and can track them on their journeys.
In turn, the model could help regenerate brown- Kristi Montgomery, vice president of innovation at
field sites and unused buildings, in the same way Kenco Innovation Labs, pointed out that no standards
Airbnb has pushed people to invest in and renovate yet define how IoT devices should communicate with
private accommodations. each other, or store and process information.
“If you have it on a flexible model, you can just She thinks that will change, and soon: “The prom-
dial down your warehousing in line with your busi- ise of IoT is disrupting all industries, and it seems like
ness needs and reduce your liability,” said Stowga CEO the future is bright. The emergence of IoT is an amaz-
Charlie Pool. “From our customers’ perspective, in ing thing for supply chain executives. And it’s espe-
good times it allows them to be agile, move quickly, cially exciting as the enabling technology is becoming
open a new market—or close a new market, which is less expensive and more readily available, meaning
equally important. They can test it, and if it doesn’t that large-scale deployments are now possible.
work out they can try it somewhere else.” “However, despite all the excitement and possi-
bilities, some real roadblocks remain, namely, IoT
4. 3-D printing and collaborative technology is like the Wild West: there are no exist-
robots (cobots) ing standards,” she added. “These will define how IoT
In the future, the distinctions between factory floor devices will communicate and how data will be col-
and warehouse may begin to disappear once some fac- lected, processed, handled, stored, and summarized.
tories move away from monolithic, mass-production Those concerns extend from 2018 into the future, as
and distribution cycles. For example, some warehous- companies work to establish a regulatory standard,
es may become smaller, smarter, and more closely though nothing has emerged yet.” ce
integrated with manufacturing, even as others follow
the Alibaba model by becoming larger and more Chris Middleton is the editor of Internet of Business
automated. (IoB), a CFE Media content partner. This article orig-
Technologies such as programmable cobots, which inally appeared on the Internet of Business’ website.
are designed to work alongside human beings, will be Edited by Chris Vavra, production editor, CFE Media,
increasingly important in these cases, following the cvavra@cfemedia.com.
M
obile technologies have become piv- on and off-site. They see mobile software as a means
otal to the way companies operate. to reduce time-consuming manual operator rounds,
Employees—millennials in partic- which can require physical equipment checks in dan-
ular—value mobile tools that help gerous or remote locations.
them stay informed and produc- By integrating mobility into automation work-
tive. By implementing built-for-purpose mobile auto- flows, these workers are provided with the flexibility
mation solutions, organizations can redefine the way they have grown to expect. Secure mobile access to
plant staff operates, creating a draw for the best and data can increase productivity and safety by reducing
brightest people, while simultaneously delivering or eliminating the need for manual rounds.
improvements to operations and production.
3. Deliver a positive user experience
Mobile technology benefits Providing tools to help users increase safety and
As responsibilities around the plant increase, per- efficiency can have a significant impact on an orga-
sonnel have an increasing need for secure, on-demand nization’s ability to attract and retain talent. However,
access to critical information to enhance operational providing mobility plant personnel will appreciate—
safety, productivity, and efficiency. Mobile technolo- and more importantly, use—is about more than pro-
gies are a core component of solving this challenge by viding continuous visibility to the DCS. Modern
providing these seven benefits: mobility solutions need to be designed for a simple,
secure user experience.
1. Freedom to multitask Many millennial engineers entering plants have
Mobile automation tools can provide the same come to expect mobile technology. Mobile devices
real-time data available from the operator console to have likely played a central role in their social lives and
mobile phones and tablets without being tethered to previous work experience. These users thrive with
the control room or remotely connect to a PC. Any mobile devices and applications that are intuitive and
parameter or alarm that has been configured in the are easy to integrate into their workflows.
distributed control system (DCS) can be delivered to Plant management should focus on implement-
mobile devices easily and securely, giving users confi- ing mobile solutions that provide easy, secure access
dence they will always have the most up-to-date infor- and require minimal configuration.
mation about their operations.
4. Meeting user expectations
To speed up time to success in the field, these
mobility solutions provide out-of-the-box filtering and
targeted notifications to ensure that critical alerts are
There are many ways to provide
mobility, but it is essential to provide
M More
ANSWERS
only sent to the right people and not buried under a secure access that helps users operate KEYWORDS: Mobile automation
flood of nuisance alarms. Users will only see needed more efficiently. Just as today’s most suc- software, mobility benefits
events and not have to sift through irrelevant data. cessful mobile apps don’t require com- Benefits to mobility software
Secure mobile access to data means freedom and plicated, time-consuming configuration How mobility software can
optimize operations.
flexibility to move around the plant (or the world) and to function, mobile solutions for auto-
GO ONLINE
multitask, allowing staff to more efficiently perform mation systems must also be ready to
Learn more about mobile
tasks and collaborate across the organization. work out-of-the-box. technology at www.controleng.
Layered mobile solutions that are com/info-management/mobility.
2. Stability and safety complicated to configure and integrate CONSIDER THIS
Next-generation workers value the ability to col- with a DCS or historian are no lon- Which applications should be
lect and have data at their fingertips from anywhere ger necessary. Organizations should look mobile but are not?
Designed for Apple iOS and Android, DeltaV Mobile pro- their location, which builds a network of subject matter experts
vides users with intuitive, easy, and secure mobile software, that drive efficiency and success.
with out-of-the-box functionality and native DCS integration. In many organizations, data is difficult to transfer because
Image courtesy: Emerson it is siloed in individual departments or databases. Collect-
ing data from various sources in the plant or throughout the
beyond layered solutions and instead provide personnel with organization can be a cumbersome process and lead to seri-
modern, secure mobile solutions that are natively integrated ous consequences.
with the DCS, designed to operate with Android and Apple Mobility solutions can break down organizational barriers
iOS devices ensuring no additional DCS configuration is by integrating data from multiple sources into mobile views,
required. Users receive the same real-time information and delivering new opportunities for faster decision making. They
alarms that are available on the operator console, with rele- also can be designed for collaboration across the enterprise.
vant process data and rich content that layered solutions can- Users can drill down on alerts to view recommended
not readily provide. actions and relevant contextual process data, helping workers
make faster and better decisions.
5. Secure mobile data access
As mobile technologies have evolved, so too have user 7. Workforce support
expectations of secure mobile access to data. Employees value organizations that provide them with
Mobile software for process automation also can offer inte- the tools and technologies they need to perform their jobs
grated security features that are nearly invisible to the user. as safely and efficiently as possible. Employer investment in
Designed with read-only access, these applications prevent tools, guidance, and opportunities helps millennial workers
users from inadvertently affecting operations. In addition, perform and prepares them to be successful throughout their
mobile access to process and diagnostic data is typically pro- careers.
vided through dedicated secondary servers located above the The millennial workforce has grown up with mobility
automation control network, giving the user an extra layer of as an important and inherent aspect of their lives, and they
security. expect similar user experiences with mobile software in the
The best solutions will provide these features out-of-the- plant: secure and easy access to data, out-of-the-box function-
box with little to no administrator configuration and no end- ality with minimal configuration, and intuitive user interfaces.
user configuration. Leveraging user-friendly technologies Bringing these mobile solutions into the workplace
simplifies plant workflow is a key role in retaining millennial provides plant personnel with the tools to enhance safety,
talent. efficiency, and collaboration to ultimately improve the oper-
ations of an organization. The mobile workforce has arrived.
6. Improve departmental communications The organizations that harness it will gain the competitive
Organizations that provide fast, easy access to critical data— advantage for years. ce
coupled with the ability to easily share that information across
the enterprise—creates a significant competitive advantage. Mariana Dionisio, DeltaV product manager at Emerson.
Collaboration tools enable fast dissemination of data across the Edited by Emily Guenther, associate content manager, Control
organization and enable key personnel to stay informed despite Engineering, CFE Media, eguenther@cfemedia.com.
www.festo.us/stars
input #13 at www.controleng.com/information
Digital Reports
HMI
IIoT: Machines, Equipment & Asset Management
Machine Vision
PLC
www.controleng.com/DigitalReports
How to transition
from traditional to digital
plant-floor technologies
Improving plant efficiencies starts with bridging the gap between workforce
generations. Generation X can help connect traditional industrial applications
with digital manufacturing. See three benefits of mobility on the plant floor
and implementation advice.
B
y leveraging Generation X’s interperson- mobile offers many benefits and it can be imple-
al skills, the understanding of processes mented while keeping cost and security in mind.
before and after technological advance-
ments, and the patience acquired dur- Three benefits of going mobile
ing times of transition, manufacturers Going mobile offers many potential advantages.
can use Gen Xers to facilitate mentoring programs While the individual benefits vary depending on the
between older and younger workers to keep every- application and the client’s needs, see three common
one engaged with new technologies—mobile indus- benefits below.
trial technologies specifically.
Millennials are getting a lot of attention in part 1. Plant-floor mobility saves time.
because of the gap between them and the aging baby Most industrial controls systems rely on opera-
boomer generation. It’s understandable, millennials tor interface screens to monitor and control a system
now make up the largest share of the American work- or process. Typically, these interfaces run on a PC or
force, and baby boomers are continuing to work well industrial computer installed in a fixed location such
into their 60s and 70s. Gen X is the demographic of as inside a control room or mounted to the front of an
people following the baby boomers and precede mil- industrial enclosure. Having to monitor and control
lennials, and they can help bridge the gap between the system from a fixed location can have an adverse
the two to help improve a plant’s overall efficiency impact on productivity and troubleshooting. The user
by understanding traditional analog technology and may have to stop what they are doing, walk over to
adopting mobile technologies. the operator interface, and take readings or make set-
M More
ANSWERS
Gen X wasn’t born with technolo-
gy; technology grew with Gen X. They
remember a time before cell phones and
point changes before returning to the production area.
While troubleshooting an issue, maintenance per-
sonnel often walk back and forth between the oper-
KEYWORDS: Generation X,
baby boomers, millennials desktop computers. They should be the ator interface and the system they are working on to
How Generation X can help generation that connects traditional analog compare the physical system with the information dis-
improve efficiencies within a plant ways and the digital information age. played on the operator interface.
How mobile solutions can For example, imagine the baby boom Mobile technology allows plant personnel to mon-
optimize plant operations generation is a plant running traditional itor and control the system freely from any location
Implementing a mobile system. analog technologies and the millennials on the plant floor. They can inspect or operate the
GO ONLINE are the mobile computers and connected physical process while viewing the operator interface
Read more online about mobile devices in the age of digital manufacturing. simultaneously.
solutions at www.controleng.com With a lot of conflict and contrast between
CONSIDER THIS the two, there’s a need for compromise and 2. Remote monitoring and notifications
How can your plant facility bridge the arc. Gen X can be the bridge decrease travel.
improve efficiencies with mobile between analog and digital by connecting With remote access, managers can receive alarm
solutions? the plant floor to mobile devices. Going notifications and real-time status updates on their
M
ost recent advances in artificial- Bush Professor of Electrical Engineering and Com-
intelligence systems such as speech- puter Science, describe the new chip in a paper that
or face-recognition programs have Biswas presented at the International Solid State Cir-
come courtesy of neural networks, cuits Conference in February.
densely interconnected meshes of
simple information processors that learn to perform Back to analog
tasks by analyzing huge sets of training data. Neural networks typically are arranged into lay-
MIT researchers have developed a special-pur- ers. One processing node in one layer of the network
pose chip that increases the speed of neural-net- generally will receive data from several nodes in the
work computations by three to seven times over its layer below and pass data to several nodes in the layer
predecessors, while reducing power consumption above. Each connection between nodes has its own
94 to 95%. That could make it practical “weight,” which indicates how large a role the output
M More
ANSWERS
to run neural networks locally on smart-
phones or even to embed them in house-
hold appliances.
of one node will play in the computation performed
by the next. Training the network is a matter of setting
those weights.
KEYWORDS: Energy
efficiency, neural network A node receiving data from multiple nodes in the
Research on a chip with Learning efficiency layer below will multiply each input by the weight of
faster speed and less energy. “The general processor model is that there the corresponding connection and sum the results.
CONSIDER THIS is a memory in some part of the chip, and That operation—the summation of multiplications—
Where could a 95% power there is a processor in another part of the chip, is the definition of a dot product. If the dot product
reduction help? and you move the data back and forth between exceeds some threshold value, the node will transmit
them when you do these computations,” said it to nodes in the next layer, over connections with
GO ONLINE
Avishek Biswas, an MIT graduate student in their own weights.
Search the headline for more
Control Engineering energy electrical engineering and computer science, The neurons’ firing rates and the electrochemical
and power stories. who led the new chip’s development. “Since signals that cross the synapse correspond to the data
www.mit.edu these machine-learning algorithms need so values and weights. The MIT researchers’ new chip
many computations, this trans- improves efficiency by replicating the brain more
ferring back and forth of data faithfully.
is the dominant portion of the In the chip, a node’s input values are converted
energy consumption. But the into electrical voltages and then multiplied by the
computation these algorithms appropriate weights. Only the combined voltages
do can be simplified to one spe- are converted back into a digital representation and
cific operation, called the dot stored for further processing.
product. Our approach was, can The chip can thus calculate dot products for
we implement this dot-product multiple nodes in one step, instead of shuttling
functionality inside the memory between a processor and memory for every com-
so that you don’t need to trans- putation. ce
MIT researchers have developed a fer this data back and forth?”
special-purpose chip that increases the Biswas and his thesis advi- Larry Hardesty is with the MIT News Office, Mas-
speed of neural-network computations sor, Anantha Chandrakasan, sachusetts Institute of Technology; edited by Chris
while reducing power consumption up dean of MIT’s School of Engi- Vavra, production editor, Control Engineering, CFE
to 95%. Courtesy: Chelsea Turner, MIT neering and the Vannevar Media, cvavra@cfemedia.com.
A
s corporations push digital transforma- Turn data into intelligence
tion efforts to capture higher efficiencies One of the biggest challenges OEMs and end users
and larger market shares, manufacturers face is what to do with the overwhelming flow of data.
and machine builders face more digita- Data collected and analyzed in the right way over
lization demands than ever before. The time is what predictive models are built upon and is
Industrial Internet of Things (IIoT) can meet those what will allow end users the ability to reduce costly
demands by providing companies with enhanced unplanned downtime.
capabilities, increased speed, and more flexible pro- While there are many solutions on the market
duction. However, the challenge original equipment designed to collect data from a machine and send it to
manufacturers (OEMs) and design engineers must the cloud, OEMs are often left with the responsibility
overcome is integrating new technologies in a way that of programming an interface to read the technology
allows them to compete in today’s evolving and inter- stream and display information that is useful.
connected world. The OEM needs to work with the automation
solution supplier to interpret the meaning of this
Transitioning to connected, data so the end users can get the meaningful infor-
flexible machines mation they need to make intelligent decisions about
Automation components or machines that can be the machine’s operation.
rearranged without manual configuration or new pro-
gramming are one of the foundational elements of a
digital transformation. It is also a crucial prerequisite
When machine builders work with auto-
mation solution suppliers to standardize
and streamline data collection, analysis, and
M More
ANSWERS
for exploiting the IIoT’s benefits. The more flexible the reporting no prior knowledge of information KEYWORDS: IIoT, Integration
equipment, the more agile the manufacturer. technology (IT) or Big Data is required. Integrating the Industrial
Incorporating advanced modular components and Data from a machine is transferred via Internet of Things (IIoT) can help
companies integrate and provide
subsystems can boost reusability and overall equip- encrypted channels to high security data cen- enhanced capabilities, increased
ment efficiency. It also relieves high-value engineers of ters and is available preconfigured to OEMs. speed, and more flexible
time-consuming rote programming and maintenance Machine builders specify the desired data production.
tasks. Embedded connectivity compounds these effi- points in the required application to carry OEM partnerships between
ciencies for OEMs and end users alike. out remote diagnosis and maintenance, or automation suppliers and service
Modularization and standardization of inter- to begin exploring the possibility of offering providers are a key factor to
successfully implementing the
faces, dynamic reuse of complete machine mod- predictive services. IIoT.
ules, and networked connectivity are the first steps The result is a system that enables the end Machine builders that embrace
toward true “plug and produce” systems where pro- user to operate the machine at top efficien- innovations such as flexible
duction can be started following a quick reconfigu- cy, giving them an edge over the competition. machine concepts and leverage
ration performed remotely. It is clear that strong and cooperative data will see their business grow.
Flexible, decentralized solutions and advanced dig- partnerships will be an important element GO ONLINE
ital engineering tool chains require project teams with of working faster and smarter. ce Read this article online at
the knowledge to install this kind of production archi- www.controleng.com for links to
tecture. OEM partnerships between automation solu- Daniel Repp, industry manager, automa- additional stories about the IIoT.
tion suppliers and service providers experienced in tion, Lenze. Edited by Chris Vavra, pro- CONSIDER THIS
modular, connected solutions are a key factor to suc- duction editor, Control Engineering, CFE What else would benefit from
cessfully implementing the IIoT. Media, cvavra@cfemedia.com. IIoT integration?
I
n the industrial world, it’s called the Indus- 3. Equipment maintenance
trial Internet of Things (IIoT)—a huge Condition-based maintenance alerts can be
buzzword in manufacturing and the topic easily implemented using the IIoT. The IIoT is a
seems to be everywhere. Like the Internet of key enabler for reliability-centered maintenance
Things (IoT), the IIoT connects devices and and for machine-learning paradigms used to sup-
people and collects and shares large amounts of port predictive maintenance. This adds up to
data. The IIoT enables more intelligent machines, increased throughput, reduced downtime, lower
more autonomous machines, and enables those maintenance costs, high machine reliability, and a
machines to talk to each other. greater return on invested capital in the form of
Unfortunately, many people haven’t heard better machine use and output.
much else when it comes to the IIoT. Beyond
smart devices, and collecting and sharing data, 4. Item identification and
most people haven’t heard what the IIoT can do. communication
Nine additional IIoT benefits are highlighted Barcodes are mostly on everything and radio-
below. frequency identification (RFID) is increasingly
being used in the place of barcodes because of its
1. Monitor production greater flexibility. Coupled with GPS, RFID pro-
With the IIoT connecting smart machines and vides enhanced capabilities, but collecting and
collecting and sharing large amounts of data, it is sharing the data can still be an issue. The IIoT
now possible to monitor production in real-time. can connect barcode systems and RFID systems
This allows for immediate responses to production and eliminate many inherent communications
upsets, helps eliminate wasted time, and reduce in- problems by allowing these systems to collect and
process inventory. Planned production can be com- share large amounts of data on products, materi-
pared in real-time to actual production; machine als, work-in-process, locations, and movements for
and line speeds can be changed in real-time, and improved real-time management.
in-process inventory adjustments can be made, as
well. The IIoT enables production to finish on time 5. Continuous improvement
and in sync with the in-process and raw with data analysis
materials inventories. Lean manufacturing and six sigma and other
C
ontrol Engineering (CE) asked Michael • Analytics: More data can now be used to pro-
Risse, vice president of Seeq, for advice vide much more insight by implementing new
on how controls, automation, and approaches. Software platforms makes this
instrumentation help with integra- possible by using technologies such as Big
tion using Industrial Internet of Things Data, machine learning, open source, etc.
(IIoT) technologies. Integrating operations and • Business models: remote monitoring of assets
information technology (IT) systems can be made by vendors, selling thrust versus engines, dis-
easier with the following considerations. tributing risks.
CE: When those in automation and operations CE: How can controls, automation, and
consider integrating IIoT concepts, what tech- instrumentation help with integration and use of
nologies are they most often talking about? Also, IIoT technologies?
what technologies should be considered but may
be overlooked? Risse: Stick to a business case, start small
and create value. Just don’t overthink this as top
Risse: The basic components and systems of the down—IIoT projects often take too long and cost
IIoT have been a fact of life in industrial automa- too much. Try to find a greenfield in a brownfield
tion and operations for decades: sensor, data col- scenario—something new in something existing
lection, application, storage, and analytics. What’s (use case should depend on what matters most—
needed are insights to improve outcomes in terms ingredient quality, energy use, emission compli-
of quality, yield, margins, safety, etc. ance, etc.) For example:
Most of the promises of digitization transforma-
tion, IoT, etc., are about bringing that opportunity • Skunkworks: Raspberry Pi to track sensor
for insight to things that didn’t have it (connected data on wireless to inform/contextualize a
cars, smart refrigerators, brilliant parking lots, etc.) sensor.
to solve the same types of problems seen in indus- • Midsize: cloud IIoT platform for discon-
trial plants and facilities by providing predictive ana- nected data sets (remote assets) that expand
lytics, operational insight, and visibility to things not visible range for operators, or optimization
in front of them via remote access. The next step context for engineers.
is to extend the visible range of results to partners, • High level: remote monitoring center to cen-
upstream (supply chain) and downstream (customer tralize operations.
use)—and across organizations (x-plants).
The IIoT is not the same old stuff in industrial CE: What value is being created and how,
applications because there are very significant inno- with integration of operations and information
vations driving opportunities and lower cost such as: technology (IT) systems?
• Cloud: connectivity, data collection, sharing, Risse: Value doesn’t have to be in dollars. It
simplicity could be safety or any other priority for the orga-
• Sensors: more, cheaper, wireless, edge pro- nization such as regulatory compliance. The value
cessing, OPC unified architecture (UA) is in the time to insight to improvement. Or, to
and message queuing telemetry transport put it another way: sooner means value, and the
(MQQT) protocol support insight means value, and the sooner the insight
is the square of value (or multiplier) because it’s cost of achieving the insight went down (cheap-
sooner (like area under the curve). How it’s cre- er data storage, collection, new analytics, faster
ated is insight. insights). The IIoT is a point in progression in terms
Many vendors love to talk about sensors, wire- of lower costs for most of the components in these
less, and other technologies, but the point of all this types of systems.
is improved outcomes through quicker insights and
delivering the profit impact of doing something CE: How can data analytics help make sense
better, sooner. Also, the value could be the same of existing data and the additional information
insight an organization has been wanting to achieve created when previously disparate systems are
for years. Now it’s profitable to do so because the connected?
Risse: Data analytics is a huge help So for existing data, there is untapped project. Now this can be done by any
because one of the keys for successful potential in data already collected no SME. With new data sources, this will
IIoT implementations is tapping the inno- matter where it resides. Data analyt- become even more of an issue. Perhaps
vation in analytics technologies so subject ics can enable a bridge across data silos an answer is data lakes or data roll ups
matter experts (SMEs) can find insights to simplify contextualization by putting for multi-plant scenarios, but data col-
faster. This allows them to answer the data in its frame of reference. Previous- lected in one place without analytics
questions they have wanted to analyze but ly this was done mostly by hand, mostly is just a bigger headache than when it’s
were just too hard/too long to do with tra- by an SME in Microsoft Excel or as part spread out.
ditional tools such as spreadsheets. of a massive information technology (IT)
CE: What other advice or tips would
YRG
you offer on IIoT integration relevant
for Control Engineering subscribers?
™
Risse: Beware of all systems requir-
ing new data storage. Typically, it’s not
the data that needs help; it’s the analy-
ROBOTICS sis of the data to produce insights. Start-
ing small and soon should not require
undertaking some Big Data transforma-
Making
tion/cloud movement effort.
There has to be a midpoint between
hopelessly global (IT top down takes
Easy
nonstandard tools or approaches). This
midpoint can be implemented by getting
started now on existing problems. Even if
• Single axis and SCARA robots one tosses out a local project due to lack
with extraordinary lifespan of success, it can inform what you need
to know and how you can make better
• Application Engineering decisions, and at very quickly and with
low implementation costs. If there are no
Specialists ready to help
local initiatives, competitors will outper-
form laggards; so it’s best to get started
• Seamless integration using
sooner rather than later. ce
custom Yamaha AOIs
Michael Risse is vice president at Seeq
• YSD High Speed Servo Corp. Edited by Emily Guenther, associate
Dispensing Systems content manager, Control Engineering,
CFE Media, eguenther@cfemedia.com.
• Plus get one-on-one
technical support
with YRG!
M More
ANSWERS
KEYWORDS: Industrial Internet of Things
(IIoT), Big Data
Exploring IIoT integration best practices
How to use data analytics for a successful
for technical IIoT integration
support, visit: The value behind integrating systems and
operations.
www.yrginc.com
YRG
GO ONLINE
™
See the Control Engineering IIoT page, upper
left, at www.controleng.com.
Now driving the world’s #1 brand of motors. And yours. M100 M200 M300 M400
CFE Media’s
New Products for Engineers Database
Looking for new products?
Look no further!
www.controleng.com/NP4E
A
n “embedded system” is an engi- Cell level: Within and between various work cells,
neering-related term that can vary individual machines and connecting motion controls
in meaning by application, who’s each can be called embedded systems. In process set-
using the term, and in what context. tings, embedded systems may be considered the con-
Examples of embedded systems are trols for the cracker, the fermenter, reactor, etc.
described below. At any of these levels, an embed- Machine level: Within a machine, an embedded
ded system is likely to contain elements of hard- system could operate as stand-alone controller, such
ware, software, and communications, integrated as an industrial PC, programmable automation con-
cybersecurity, and may include one or more control troller, or programmable logic controller outside the
loops (sense-decide-actuate). Embedded systems machine.
often run in closed-loop (automated) or in open- Device level: Within a device, an embedded sys-
loop mode (with human approval or acknowledge- tem can be the board or the silicon chip providing the
ment at one or more step). logic, the network, power, or sensors when each may
Embedded systems also can link to or communi- have their own logic, software, and communications.
cate with local or cloud-based connected components, Board level: Board-level systems can include
devices, systems, and networks. sensors, logic elements, and actuators, along with
communications. (Unless otherwise specified, most
Embedded system examples embedded systems, for control engineering, are usu-
Value chain or supply chain: Most broadly, ally at this level.)
embedded systems can operate in and connect var- Chip level: Once only logic devices, microme-
ious plants and sources within a supply chain (or chanical systems have brought the embedded sys-
value chain, as some say), as connected systems of tems discussion to the silicon level. Logic is involved
software. with many processors now operating on one chip,
Plant or facility: At the plant level, various and communication systems are involved. Chips
departments can have embedded systems. also can have gears, actuators, valves, and embed-
M More
ANSWERS
Traditionally, engineering design and pro-
curement may have been in separate silos;
interconnection and integration of such
ded microsystems. Within embedded memory and
instructions, logic can be permanent.
A related semantic challenge: Is the term system
KEYWORDS: Embedded
systems, system integrator systems are increasing. integration (singular) or systems integration (plural)?
Embedded systems exist on Plant floor: Maintenance, controls and Are we integrating devices within a system or multi-
many levels. automation, logistics, engineering sys- ple systems in a connected system of embedded sys-
Board-level systems often are tems each are embedded on the plant floor, tems? Again, it depends.
embedded systems for control along with the computers, databases, and Going from bottom to top, one can envision
engineers.
communications for each. Power systems how a chip-level embedded system could be part
GO ONLINE also may be considered embedded. of a board-level embedded system, which could be
If reading from the digital Automation and controls: Embed- part of a device level system (in a controller or smart
edition, click on the headline ded systems within automation and con- valve), and on up the line. System integration and
for more resources. Control
Engineering has an embedded trols includes various control systems and interoperability gain importance with the need to
systems page under Control controls, across the plant, in the building, exchange data for analysis and smarter decisions
Systems menu at fire and life safety, lighting, HVAC, air han- from embedded system to embedded system among
www.controleng.com. dling, power, and other systems. These can peers or up the line. ce
CONSIDER THIS be discrete control (things) process control
Do engineers you work with (continuous flow), batch control (in tanks Mark T. Hoske is content manager, Control Engineer-
define their terms? or vats), or hybrid control. ing, CFE Media, mhoske@cfemedia.com.
EPSI
TRO
N®
A
dditive manufacturing (AM) is not tending 3-D printing machines (which are also
only transforming the way we make robotic), automating AM post-processing, and
things; it’s changing how engineers allowing architects to envision new ways to build.
and part designers think. They have
to forget limitations imposed by con- Layer by layer
ventional manufacturing methods and open their At Midwest Engineered Systems Inc. (MWES)
eyes to new design possibilities. These possibili- in Waukesha, Wis., they are using laser AM to cre-
ties are expected to catapult the AM industry to ate complicated metal parts that would otherwise
$17 billion by 2020. There are several types of be extremely difficult, if not impossible, to manu-
AM processes, including selective laser sintering facture. A six-axis articulated robot drives the pro-
(SLS), stereolithography (SLA), and fused deposi- cess, combining hot wire deposition and a laser to
tion modeling (FDM). build metal parts layer by layer on an existing sub-
All are digital manufacturing methods where strate. Exotic metals are deposited with precision
computer-aided design (CAD) data is used to fab- and speed to build prototypes and small batches of
ricate a 3-D object by adding layer upon layer of high-value complex parts.
material, whether it’s liquid, powder or sheet, or MWES, with 25-plus years of expertise in com-
some other type of material. Even human tissue can plex systems integration, developed this process,
be used. AM is used to create myriad structures, which was unveiled at the International Manu-
from dental appliances, to advanced aircraft com- facturing Technology Show 2016. In a show floor
ponents, an entire bridge, and even works of art. demo, a propeller took shape during the layer-by-
Robots help make it possible. Robots are not layer process.
only enabling additive manufacturing, they’re MWES named their system ADDere, which was
derived from the Latin word meaning to add. The
process is similar to wire and laser additive manu-
facturing (WLAM), where a metal wire is fed into a
melt pool generated by the laser beam on the sub-
strate. The wire and substrate consequently form a
metallurgical bond. The difference is that MWES
uses a hot wire process.
“We heat the wire to the point that it’s molten at
the tip,” said Scott Woida, president and founder of
MWES. “Since the wire is already molten, we then
use the right amount of laser power to melt the sub-
strate underneath to form a strong bond. You’re
able to use less laser power when you’re not trying
to melt the wire as well as the substrate. The hot
wire allows you to get higher deposition and put
less heat into the part.”
Figure 1: Additive manufacturing process uses a robot equipped The process always starts with a substrate. In
with a laser head and hot wire deposition to build a metal part layer the show floor demo with the propeller, it was a
by layer. Courtesy: Midwest Engineered Systems Inc./RIA cylinder.
82 mm
www.beckhoff.us/C6015
With the ultra-compact C6015 Industrial PC, Beckhoff has again expanded the application
possibilities of PC-based control. Wherever space or cost limitations previously prevented the
use of a PC-based control solution, this new IPC generation offers an excellent price-to-per-
formance ratio in an extremely compact housing. With up to 4 CPU cores, low weight and
unprecedented installation flexibility, the C6015 is universally applicable in automation,
visualization and communication tasks. It is also ideal for use as an IoT gateway.
Processor: Intel® Atom™, 1, 2 or 4 cores
Interfaces: 2 Ethernet, 1 DisplayPort, 2 USB
Main memory: up to 4 GB DDR3L RAM
Housing: Die-cast aluminum-zinc alloy
Dimensions (W x H x D): 82 x 82 x 40 mm
input #18 at www.controleng.com/information
2018
Flexible installation via rear or side panel mounting, or on DIN rail. HONORABLE
MENTION
Connecting Global Competence
ANSWERS
INSIDE MACHINES
“We can either use the substrate as part of the final part, or
we can cut the substrate away and just have the part made of
weld bead,” said Woida. “But we have to start with something.
It can be as simple as an eighth of an inch thick piece of steel.”
• Prototypes
• Small batch production runs
• Replacement parts
• Rebuilt surfaces
• Cladding.
NEMA 4X • Non-conductive
Vent Kit
• UV resistant
• Custom modifications
• Premium accessories
• 3D model library for
ULTRAPLUG ®
easy download
Hole Plugs
input #21 at www.controleng.com/information
Scan to learn more about
Allied Moulded and the latest in
nonmetallic enclosures & accessories.
Cybersecurity Guidebook
for Process Control
Do you ever find it challenging in determining how you will bring communication and power
to your tooling fixtures on a rotary index table application? Do you find it difficult to determine
the appropriate slip ring for your application? Did you know it is possible to provide high
voltage 3 phase power and communication such as Ethernet, Device Net, Profinet, etc. all
through one device? Rotary Index tables with more than two stations and or being used in a single direction
need provisions in place to allow for access to air, electric power, communications or a combination of the three.
Motion Index Drives offers many standard or custom designed rotary slip ring packages with a variety of options for
communication, power and air requirements for rotary index table applications. We can take standard flying lead slip
rings and assemble any connectors you made need to plug into your power and communication ports without the
need to hardwire at assembly.
Find out what options may be best or more cost effective for your application
and how to apply them. Register to download the white paper now:
https://motionindexdrives.com/slip-rings/ www.motionindexdrives.com • info@mid.us.com
ce201804_whitePprHlf_motionInd.indd 1
input #25 at www.controleng.com/information 3/15/2018 3:02:09 PM
To subscribe, visit
www.controleng.com/subscribe
Download “Merging
Legacy Equipment
2 IN 1
PLUG / RECEPTACLE
The Unlimited Platform for & DISCONNECT SWITCH
SCADA and So Much More
with the Industrial
Internet of Things” Line of Sight
Disconnect Switch
• Unlimited licensing to explore strategies • Meets NEC
• SCADA, IIoT & MES together for integrating legacy requirements
• Instant web deployment machine data and • Up to 200A
600V, 75hp
• Totally cross-platform choosing the best
• Built on open IT standards approach for your IoT
OFF
• Installs in minutes goals. Button
FREE SAMPLES
Discover more at:
inductiveautomation.com/ignition meltric.com
800.433.7642
MULTI-CONTACT FIBER
connectors OPTIC
SOLUTIONS
With Silver-Nickel Butt-Style Contacts
for Maximum Performance & Durability
Factory Automation:
RS232/422/485/Profibus/Modbus/Bacnet/Tnet
Industrial Ethernet (LAN): 10/100/1000 Mbps
SCADA: Modem/Multiplexers/Point to
Point/Multidrop
Video/Audio/Data: CCTV Systems/Robotics
Optical Hubs & Repeaters
USB Modems
Extended Temp. Range & Ruggedized Products
FEATURES AVAILABLE
Input #105 at controlengineering.hotims.com
7 to 37 contacts
4mA to 150A per contact
Easy-to-wire contact terminals
meltric.com
800.433.7642
O&GEng-CE 2017-06_TRGuide_MediaShowcase2x4_MII.indd5/17/2017
1 2:23:54 PM
INNOVATIONS See more New Products for Engineers.
www.controleng.com/NP4E PE
NEW PRODUCTS FOR ENGINEERS
www.controleng.com/webcast
AR, IL, IN, IA, KS, KY, LA, MN, MO, Allied Electronics . . . . . . . . . . . . . .C1, 7 . . . . . . . 5. . . . . . . .www.alliedelec.com
MS, NE, ND, OK, OH, SD, TX, WI, AutomationDirect . . . . . . . . . . . . . .C2, 16A-16D . . 1. . . . . . . .www.automationdirect.com
Central Canada
B & R Industrial Automation . . . . .19 . . . . . . . . 10 . . . . . . .www.br-automation.com/ACOPOSmotor
Bailey Rice
(630) 571-4070 x2206 Battery Ventures . . . . . . . . . . . . . . .56 . . . . . . . . 22 . . . . . . .www.battery.com/private-equity
BRice@CFEMedia.com CFE Media’s New Products
for Engineers Database . . . . . . . . .47 . . . . . . . . . . . . . . . . . .www.controleng.com/NP4E
AK, AZ, CA, CO, HI, ID, MT,
NV, NM, OR, UT, WA, WY, Control Engineering
Western Canada Digital Reports. . . . . . . . . . . . . . . . .37 . . . . . . . . . . . . . . . . . .www.controleng.com/DigitalReports
Iris Seibert Control Engineering
(858) 270-3753 Software & Hardware Study . . . . .23 . . . . . . . . . . . . . . . . . .www.controleng.com/2018HMIReport
ISeibert@CFEMedia.com
Control Engineering
CT, DE, MD, ME, MA, NC, Webcasts . . . . . . . . . . . . . . . . . . . . .62 . . . . . . . . . . . . . . . . . .www.controleng.com/webcast
NH, NY, NJ, PA, RI, SC, VA, Dataforth Corp . . . . . . . . . . . . . . . .9 . . . . . . . . . . 7. . . . . . . .www.dataforth.com
VT, WV, DC, Eastern Canada
Eaton’s Bussmann Business . . . . .2 . . . . . . . . . . 3. . . . . . . .www.CUBEFuse.com
Julie Timbol
(978) 929-9495 Emerson Automation Solutions . .57 . . . . . . . . 23 . . . . . . .www.emerson.com
JTimbol@CFEMedia.com Festo Corporation . . . . . . . . . . . . . .37 . . . . . . . . 13 . . . . . . .www.festo.com
C
ollaborative robots have been a disrup- very well to collaborative robot technology. Wherever
tive technology in not only the manu- a task is performed repeatedly, there is the potential
facturing industry, but they have also for robotic automation.
opened the door for automation in other
industries as well. Industries that have 2. What are the operating hours?
never been interested in robotics are suddenly find- When it comes to considering robotics, one
ing that with collaborative technology they too can must consider not only the feasibility of the appli-
reap the benefits that come from automation. Why cation but also the return on investment (ROI) to
can companies outside of manufacturing now look to determine if the application makes sense from a
robotics when it hasn’t been an option before? business perspective. Oftentimes, this component
First, collaborative robots are capable of operating gets overlooked until many hours have been spent
around people without the need for external guard- on the engineering side. ROI is variable and has
ing or safety devices (pending a risk assessment of to take not only the application into account but
the total application). This has been a gateway to new the hours of operation and the burden rate of an
industries for robotics. Without the need for a large employee. With minimum wage on the rise, many
safety enclosure, robots can now be used in places that companies are starting to realize faster ROI periods
wouldn’t have been feasible in the past. for adding collaborative automation.
Second, collaborative robots are typically much
easier to program than traditional industrial robots. 3. Is the task dirty, dull, dangerous?
Companies no longer need a staff of robotics engi- Dirty jobs are generally the tasks that employ-
neers to program simple applications. When deciding ees do not want to perform. They could be smelly,
if collaborative robots are a good grimy, or even involve the employee needing to
M More
INNOVATIONS
fit, companies should ask these
three questions:
take regular breaks to get cleaned up. These can
be a morale killer and impact productivity by
employees feeling negative about the task they are
KEYWORDS: Collaborative robots
Collaborative robots are designed
1. Is the task repetitive? being asked to perform. Some of these tasks even
to work without a safety fence, which
This is possibly the most impor- start falling into the dangerous category. Chemical
allows them to be used in non-traditional tant question for a quick installa- cleaners, working around hot objects, or working
applications. tion. Robots, whether collaborative in tightly confined spaces can become dangerous
Companies considering collaborative or traditional, are programmed very quickly.
robots need to ask what are the to carry out a task over and over In some robotic applications, the main goal isn’t
operating hours for the task and whether again. While there are some meth- just to increase throughput or reduce costs, but to alle-
the task is repetitive, dangerous, or dirty.
ods to allow robots to have flex- viate the need for the operator to carry out dangerous
GO ONLINE ibility, the simplest and easiest of tasks. However, the two are not mutually exclusive and
Read this story online at installations require the robot to all of these factors can be considered when evaluating
www.controleng.com for links to carry out the same task over and the potential of robotic integration. ce
additional stories about collaborative
robots and their potential for over. For example, placing ham-
manufacturers and non-manufacturers burger patties onto a grill and flip- Josh Westmoreland is a robotics specialist at Cross
alike. ping them after a predetermined Company. This article originally appeared on Cross
CONSIDER THIS amount of time before removing Company’s blog. Cross Company is a CFE Media
What other considerations should them from the grill and placing content partner. Edited by Chris Vavra, produc-
companies have when deciding whether into another location. These types tion editor, CFE Media, Control Engineering,
to use a collaborative robot? of repetitive tasks lend themselves cvavra@cfemedia.com.
ACTIVE
COMPONENT
SYSTEM
Input Fuses LC Filter Active Standard
Rectifier Drive
12/18-PULSE
SYSTEM
12/18-Pulse Input Standard
Transformer Fuses Drive
U1000 INDUSTRIAL
MATRIX DRIVE SYSTEM
3 Wires In 3 Wires Out
U1000
Yaskawa America, Inc. Drives & Motion Division 1-800-YASKAWA yaskawa.com For more info: http://go.yaskawa-america.com/yai1145
seweurodrive.com | 864-439-7537
input #27 at www.controleng.com/information