IT + OT = IIoT: Cisco Jasper’s formula for the industrial internet

In this exclusive interview, Theresa Bui, IoT product marketing and strategy, Cisco Jasper, lays out the company’s solution for bringing together OT and IT 

In the past couple of years, networking giant Cisco has made a big push into the industrial sector to ride the wave of Industry 4.0 or the industrial internet of things or whatever you want to call the trend of connecting machines that previously operated mostly in isolation.

Computer networking equipment, which is generally to be found within the category of “information technology”, is quickly becoming a critical part of the traditional industrial company, alongside what is increasingly referred to as “operation technology”, referring to the machines and robots and such.

Industrial companies have been attaching tens of millions of sensors to equipment and components in all areas of their operation in order to make the data they collect available to IT.  Continue reading IT + OT = IIoT: Cisco Jasper’s formula for the industrial internet

Rockwell Automation launches infrastructure-as-a-service to simplify setting up industrial networks

Rockwell Automation has launched an infrastructure-as-a-service which the company says simplifies and accelerates networks.

The new service bundles networking products and remote-monitoring support into one contract.

Rockwell says a secure and robust network infrastructure is essential to improving overall competitiveness in a connected enterprise, but designing, deploying and maintaining this infrastructure can be complex and time consuming for many companies, and is often too costly for their capital budgets.  Continue reading Rockwell Automation launches infrastructure-as-a-service to simplify setting up industrial networks

Huawei and Festo link up for smart manufacturing and robotics as a service based on 5G slicing

Huawei has partnered with Festo to jointly explore the 5G network application of manufacturing and to promote the digital transformation of the manufacturing industry with 5G slicing technology.

5G slicing refers to the practice of segmenting a portion of the 5G network for a specific client or requirement – it’s like what cloud computing is to the internet.

The agreement between Huawei and Festo is based on 5G cloud robotics to test the “robot as a service” concept, or RaaS, which is part of the manufacturing digital transformation that supports the shift from mass production to mass customizing and offers value-based services in smart factories.  Continue reading Huawei and Festo link up for smart manufacturing and robotics as a service based on 5G slicing

B+B SmartWorx launches first USB 3.0 Hub to provide ‘isolation and super speed’

B+B SmartWorx has launched its newest USB Hub – the USH304, its first isolated USB 3.0 SuperSpeed Hub offering both isolation and super high speeds, according to the company.

The device adds to B+B SmartWorx’s expanding line of USB products, and the is powered by Advantech, which is one of the leading computing technology suppliers ti industry.

USH304 – an ultra-rugged 4-port isolated USB – offers 2,500 VDC voltage isolation for upstream ports and 4 x downstream USB 3.0 SuperSpeed ports.  Continue reading B+B SmartWorx launches first USB 3.0 Hub to provide ‘isolation and super speed’

New report highlights 5G opportunities for operators

ADL 5G_Rollout_models

New business models are emerging as enterprises and solution providers get ready for the next generation of mobile networks, according to a new report. 

In its latest report, 5G Deployment Models Are Crystallizing, Arthur D. Little examines the opportunities that exist for telecom operators to facilitate new business ecosystems enabled by the next generation of mobile networks.

Promising huge increases in speed and bandwidth, 5G has the potential to deliver a vast array of realistic, interactive experiences to consumers, for example, in the areas of immersive games and sports viewing, autonomous driving and augmented reality infotainment, with use cases currently being built.  Continue reading New report highlights 5G opportunities for operators

5G telecommunications networks being constructed in many places around the world


Fifth generation mobile telecommunication networks – or 5G – are being created in many places around the world, including the US, China and Europe. 

Currently, the majority of mobile device users access either 3G or 4G networks, which both have significantly lower data rates than 5G.

The table below has some basic numbers for how fast each network is – in megabits per second – and dates of when they were operational, or in the case of 5G when it will be.  Continue reading 5G telecommunications networks being constructed in many places around the world

Seven things to pay attention to when choosing a CDN vendor


When your site is a slow one, you’re usually recommended to use a Content Delivery Network as it’s considered to be one of the most effective ways to speed up websites. However, it’s not the only benefit you’ll get when applying for CDN services.

Today, we’re going to discuss the main reasons to use a CDN and will give you some tips on how to choose the best CDN vendor.  Continue reading Seven things to pay attention to when choosing a CDN vendor

What type of users require VPN services?

Everyone who wishes to protect own identity, location and personal data should carefully think about addressing reliable VPN provider and make everything possible to ensure online safety at home and in the office.

Safe online environment is a must for users who fit the following categories:

  • often make online payments. Online payments services have a lot of sensible data and may have a leakage due to poorly protected networks. Travellers use such services on daily basis and rely on e-wallets greatly, therefore, may be left without access to their money in a foreign country due to hacker’s activity;
  • visitors of public places who love to use free Wi-Fi. Hackers enjoy attending such places as well – here there are a lot of easy targets – students, travellers. Most of them are using smartphone and providing thieves with credit cards numbers, passwords, access to private chats and correspondence. Any smartphone will automatically connect to public network and allows snoopers to monitor users’ online activity. It is hard to avoid such places with free Wi-Fi – business centres, airports, hotels, restaurants all have available Internet access;
  • cloud users also risking to lose all data stored in there; and
  • torrents also can lead to IP address leakage, as well as infected with malware.

Apart from these obvious benefits, here are other advantages of using VPN protection:

  1. Afraid of missing favourite game or show while traveling? After choosing one of the best VPNs every client is allowed access to popular streaming content as Netflix, Spotify and many more. It is known that numerous countries block such websites as well as social networks. Moreover, online activity can be closely monitored;
  2. Using VPN apps it is much safer to use public Wi-Fi; and
  3. Another benefit for travellers, foreign students or anyone who has friends or relatives abroad – saving money on VOIP calls by changing the country of the call making it domestic.

best vpn 1

Main objective of every VPN service

VPN service is invaluable when working remotely as allows safe access to another network as well as when want to protect personal online environment.

The first thing this software hides is client’s IP address and this feature is crucial as every app we use and website we visit reads user’s IP and gets a lot of information such as approximate location, internet provider, used browser and operating system and many more.

In case user has unencrypted connection any information can be intercepted: personal correspondence, chats, shared files, banking details, corporate documentation and more.

In order to create safe working environment, VPN is tunnelling all clients’ activities and creates encrypted connection between any user’s device and the VPN server. Various types of security protocols are used to ensure highest level of protection and maintaining online privacy.

best vpn 2

Prices for these services are affordable and there is no need to postpone such important decision.


Network Monitoring Software: How Does it Work?

softinventive network monitoring software for windows

When we speak of network monitoring, we mean the use of special tools that help the network administrator keep his or her eye on a corporate network.

In fact, the main task of these tools is to find the components in the network that function slowly or have completely stopped performing and send a notification about it to the person in charge.

Of course, network monitoring can be done manually. However, it’s nearly impossible to do this job properly without special tools called software network monitoring tools.  Continue reading Network Monitoring Software: How Does it Work?

SCADA systems: Security – industry’s second nature


Martyn Williams, Managing Director of industrial software provider Copa-Data UK, discusses the latest developments in industrial cyber security

When hackers hijacked the electrical systems of three major Ukrainian power distributors back in December 2015, over 230,000 people were left without power for several hours.

The uncertainty caused by the attack lasted much longer, especially since employees in both engineering and IT teams alike were initially unclear about how the hackers managed to infiltrate the system.

The scale and severity of this incident illustrated, yet again, how important it is for companies to secure their cyber systems at all levels. Continue reading SCADA systems: Security – industry’s second nature

Command and control rooms: Navigating the internet of things

spock kirk bridge
“Sensor readings, Mr Spock” … “Captain, you must make me believe in luck”

lockWho doesn’t want a control room of their own? If you grew up watching the original Star Trek series, you still might warm to the idea of something similar to the bridge of the Starship Enterprise, which wouldn’t be bad at all. 

But, sadly, things have moved on.

Star Trek may have been decades ahead of its time – demonstrating such technologies as tablet computers, flip-top mobile communicators, and of course a truly space-age command and control room – but reality has now almost caught up with the visions of the sci-fi show’s creators.

Today’s command and control rooms may still have some of the basic elements of what we saw on the Enterprise bridge, but they’re a lot more complex and sophisticated, although that’s not for an absolute certainty since we don’t have warp speed to deal with yet.  Continue reading Command and control rooms: Navigating the internet of things

New RF connector system for small cells to debut at Electronica 2016

Library photo of Huber+Suhner connectors

Huber+Suhner, in partnership with Radiall and Rosenberger, is developing a new RF connector system for small cell applications, which will make its debut at Electronica 2016. 

As the telecommunications industry moves towards smaller equipment and small cell approach, the radios and antennas also become more compact demanding high-performing coaxial RF connectors in a small size.

By joining the expertise of three leading RF connector manufacturers in the telecommunications industry, the target has been to develop a small coaxial connector system which will meet existing and future demands of small cell networks for 4G and upcoming 5G networks.  Continue reading New RF connector system for small cells to debut at Electronica 2016

Boulting claims to be one of the ‘guardians of industrial networks galaxy’


Boulting Technology has launched what it says is a comprehensive and dedicated industrial network service, which includes consultancy, feasibility testing, network design, implementation, commissioning and ongoing maintenance.

Boulting Technology specialises in performance-driven, secure, customised industrial network solutions in the operation technology space that facilitate migration from legacy systems and seamless integration into the IT space.

Boulting claims to be one of the guardians of industrial networks galaxy, adding that it has a strong portfolio of industrial network solutions projects in the utilities, transport and manufacturing sectors, which has delivered innovative, customer-led, business enabling solutions for over 10 years.  Continue reading Boulting claims to be one of the ‘guardians of industrial networks galaxy’

Protecting connected manufacturing: Three steps to industrial internet security

copa-data Automotive_Bodyshop

Martyn Williams, managing director of industrial automation software supplier, Copa-Data UK, discusses three steps manufacturers should take to stay safe in the cloud

You wouldn’t allow an intruder to spend 229 days in your house undetected, so why would you do that with your manufacturing facility?

As incredible as that sounds, the average time between a cyber security breach and its detection is 229 days. Manufacturing facilities are leading the list of potential targets for cyber espionage, denial of service (DoS) and web-application attacks.

As the manufacturing sector moves towards industrial automation, the Internet of Things (IoT) and the cloud, the number and nature of cyber threats is also growing. A decade ago, user security was the IT department’s responsibility.  Continue reading Protecting connected manufacturing: Three steps to industrial internet security

Be part of our new publication: Industrial Internet


Contribute articles and advertise in our new digital publication

Robotics and Automation News is planning a new ebook with the working title Industrial Internet.

The digital publication will be distributed through Apple and Amazon stores. Moreover, advertisers and commercial partners will have their content featured on the website and Sensor Data, the accompanying newsletter.

The publication is planned to contain features about the following subjects:

  • Industrial Internet of Things
  • Machine-to-Machine Networks
  • Industrial Networks
  • Wireless Networks
  • Industrial Computers
  • Human Machine Interface
  • Control Systems
  • Supervisory Control and Data Acquisition
  • Ethernet
  • Programmable Logic Controllers
  • Artificial Intelligence
  • Deep Learning
  • Machine Learning
  • Manufacturing
  • Smart Factories
  • Transportation
  • Logistics
  • Cyber Security
  • Data Management

These are the subjects which are planned. However, it partly depends on you. If you are interested in other subjects we have not listed, contact us and let us know.

If you would like to be featured within any of the features listed or any new ones we develop in co-operation with you, we can agree a structure for a commercial partnership.

An example of a typical partnership would be: Article and Advertising package – from $500.

For more information, contact us: sales[at]