• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • Home
  • Subscribe
  • Your Membership
    • Edit Your Profile
  • Services
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsored posts
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Shop
    • My Account
    • Cart
  • About
    • Contact
    • Privacy
    • Terms of use
  • Events

Robotics & Automation News

Market trends and business perspectives

  • News
  • Features
  • Video
  • Webinars
  • White papers
  • Press releases
  • Featured companies
    • AMD Xilinx
    • BlueBotics
    • Elite Robot
    • RGo Robotics
    • SICK Sensor Intelligence
    • Vicor Power

Archives for November 27, 2018

Flexible collaborative robots boost capacity at Swedish machine shop

November 27, 2018 by Sam Francis

universal robots ft-produktion

FT-Produktion turned to flexible collaborative robots – cobots – to boost productivity without adding personnel. The new technology also elevated job satisfaction by bringing variation to daily routines – a key advantage in an industry battling to attract and retain qualified labour.

No machine shop in its right mind would turn down global leaders like Volvo, Renault and Scania when they come calling with orders – even if it means pushing capacity and productivity to the limit. But in a labour market where recruiting qualified employees is easier said than done, it takes innovation to increase output capacity.

To meet growing market demand, the Swedish machine shop FT-Produktion turned to specialised robot technology designed to meet the automation needs of small and medium-sized manufacturing businesses.  [Read more…] about Flexible collaborative robots boost capacity at Swedish machine shop

Filed Under: Features, Industrial robots Tagged With: easy robotics, edstroms, machine shop, onrobot, Universal Robots

New issue of ‘Robotics and Automation News’ magazine out now

November 27, 2018 by Abdul Montaqim

Robotics-Automation-News-December-2018-1

The new issue of Robotics and Automation News magazine is out now.

Download it here while it’s still free, or read it online here while it’s still available.

 

 

Filed Under: Features Tagged With: magazine

State sponsored industrial espionage: Is your current threat detection enough?

November 27, 2018 by David Edwards

industrial espionage

As the world continues to expand its reliance on computing technology, data has become a commercial form of currency. As with all things of value, modern criminals are using every means necessary to access data and exploit it for various reasons.

Data breaches are increasingly more common, and it almost seems as if we’re only a notification away from the next global industry leader reporting a compromise of their network revealing data of hundreds, thousands, or millions of customers.

While these breaches are generally the result of hacking or computer/network intrusions, there are several other categories that fall under these attacks. These infiltrations can also be caused by accessing the stolen laptop or computer of an employee, negligence or error by personnel that exposes vulnerabilities or sensitive data to the public, or even through accidental exposure through cloud-based storage and services.

It is normally perceived that these attacks are caused by hackers who are looking for secure information of end users to sell with the intent of identity theft or access to banking information. However, data breaches can really be instigated by anyone with enough knowledge and intent to gather their desired information.

Industrial espionage in modern IT

When discussing espionage, thoughts that come to mind are secret agents across the globe struggling to keep their nation’s security intact or attempting to thwart the attacks of a criminal organization. Industrial espionage is a real threat to organizations that are in competition to gain an advantage over their rivals.

In October 2018, federal prosecutors revealed the details of charges accusing Chinese government intelligence officers and their co-conspirators of repeated computer intrusions to steal turbofan engine designs for commercial jetliners. The offenders were attempting to gather designs develop their own comparable engine to be manufactured in China by their government-owned aerospace company.

These designs were developed via partnered effort between unnamed companies and a US-based aerospace organization.

The indictment provides details how those involved used various hacking methods between 2010 and 2015 to gain access to aerospace company networks. One method was to implement and register a doppelganger domain name that closely matches one of the companies involved in the engine design.

While most companies were not mentioned in the 21-page indictment, Capstone Turbines, a Los Angeles gas turbine manufacturer, was listed as a target, so one domain name created was capstonetrubine.com.

By creating a domain that resembled the original company, they were able to use a watering hole attack method where outside organizations mistakenly accessing the false domain become infected with malware making their own network infrastructures vulnerable.

The more frequent an outside company accesses the original domain, the higher the probability of accessing the incorrect domain and spread malware. Using a combination of spear phishing, watering hole tactics, malware, and domain hijackings, the attacks remained undetected until US law enforcement was able to uncover the infection and notify businesses to take action.

The importance of robust threat detection

This example is evidence why organizations must place a critical focus towards threat detection and prepare themselves on how to respond to these attacks to minimize damage incurred by using security methods such as micro-segmentation.

It’s best to focus on the discovery of threats as soon as an attempted or successful intrusion has taken place. Employing protection through dynamic deception, reputation analysis, and policy-based detection helps to detect live breaches and allows for immediate containment to investigate the actions and determine if they’re malicious.

Early threat detection is a vital tool for network infrastructures to prevent prolonged access to sensitive data while providing organizations with the ability to act quickly and minimize the spread of any virus or malware effects.

Based on the example of the stolen engine design, early detection would’ve immediately identified the attack to protect the files and prompted an immediate investigation of the attack source and involved culprits.

During the investigation, data collected from the incident is reviewed to navigate the footprint left behind by the attack, determine user credentials and the methods chosen for the intrusion, and then identify the attack trends and characteristics.

The information gathered allows administrators and security teams to evaluate the situation to determine if the intrusion was a new or unrecognized user with real business needs or if a true attack has been initiated and security response protocols should be enacted.

The response tactics taken by organizations after a threat has been detected are also important to limit the landing site, or damage area, of a malicious invasion.

With an advanced micro-segmentation foundation in place, the entire network architecture is monitored and has incident response policies ready to take quick, immediate quarantine actions.

Options like exporting IOC (inversion of control) to specific security gateways, single click updating of segmentation policies in to limit traffic access to their attack points mitigating the east-west movement to systems accessible with the intruder’s credentials, and even suspend, stop, or disconnect VM actions to limit the damage caused by the attack.

Rapid detection of threats minimizes losses

Taking precautions towards keeping a network infrastructure hidden from hackers has been a primary security practice for quite some time. However, with how often attackers are probing networks worldwide, it’s imperative to prepare for the likelihood of an intrusion.

If left unmitigated, breaches will lead to financial losses in the immediate term while negative brand recognition can affect future opportunities. With the frequency and success rates of cyber-attacks today, it’s imperative to have an action plan to address what happens when an intrusion occurs.

Promoted

Filed Under: Promoted Tagged With: industrial espionage, threat detection

Brain Corp and SoftBank Robotics enter Japan’s commercial cleaning market

November 27, 2018 by Anna

brain corp floor scrubber

Brain Corp, an AI company specialising in the development of self-driving technology for robots, has entered the Japanese robotics market in partnership with SoftBank Robotics Corp.

Together, the two companies will address gaps in Japan’s commercial cleaning workforce with SoftBank Robotics’ robotic floor scrubber, powered by BrainOS.

The first SoftBank Robotics’ product integrated with Brain’s autonomous navigation technology will be the ICE RS26 floor scrubber.

[Read more…] about Brain Corp and SoftBank Robotics enter Japan’s commercial cleaning market

Filed Under: News Tagged With: brain corp, cleaning robots, japan, softbank

ABB to introduce cable protection with smart devices

November 27, 2018 by Anna

The new Cable Protection System smart sensor technology, currently under development in ABB’s Research & Development facility in Switzerland, will be designed to sense such problems as condensation or rising temperatures in the conduit that protects critical electrical cables.

Using the analytical power and secure cloud-based communication of the ABB Ability platform, the system will remotely report and analyse data, allowing facility managers and engineers to keep tabs on their electrical cable protection through smart phones, laptops or other remote devices.

ABB is already producing smart sensors for motors, pumps and mounted bearings, which effectively converts them into smart, wirelessly connected devices.

[Read more…] about ABB to introduce cable protection with smart devices

Filed Under: Industry, News Tagged With: abb, abb ability, cable protection

Denso takes a stake in Infineon Technologies to advance automated driving

November 27, 2018 by Anna

denso image

Automotive supplier Denso Corporation has taken an unspecified stake in Infineon Technologies AG, one of the top manufacturers of in-vehicle semiconductor products, to accelerate the development of technology to achieve next-generation vehicle systems such as automated driving.

With the investment, Infineon Technologies’ advanced semiconductor technologies will be combined with Denso’s in-vehicle technologies and expertise to accelerate the development of new and emerging mobility solutions.

Due to increased functionality of vehicles and advanced electronic control, the demand for semiconductor products is growing exponentially.

[Read more…] about Denso takes a stake in Infineon Technologies to advance automated driving

Filed Under: News, Transportation Tagged With: automotive, denso, infineon, infineon technologies

Primary Sidebar

Latest articles

  • 5 Benefits of Using 3D Interior Design Models
  • How Packing Machines are Making Their Way into Garden Shops
  • Plastic Injection Molding Machines: Types and Benefits
  • 6 Safety Tips for Riding an Electric Bike
  • Essential Types of Contact Center Automations
  • Acieta unveils new collaborative robotic system for welding
  • Amazon to acquire iRobot for $1.7 billion
  • Will Automated Pre Roll Machines Boost Your Revenue?
  • Telexistence to install AI re-stocking robots in 300 convenience stores across Japan
  • Volvo Group to establish battery production plant in Sweden

Most Read

  • Top 20 electric vehicle charging station companies
    Top 20 electric vehicle charging station companies
  • Stäubli Robotics and Quantum Surgical partner to develop robotic platform for cancer surgery
    Stäubli Robotics and Quantum Surgical partner to develop robotic platform for cancer surgery
  • Difference Between Three-Phase and Single-Phase Power
    Difference Between Three-Phase and Single-Phase Power
  • Beyond Imagination receives order for 1,000 humanoid robots
    Beyond Imagination receives order for 1,000 humanoid robots
  • Kuka receives ‘record orders’ in first six months of year
    Kuka receives ‘record orders’ in first six months of year
  • Track your lost Android
    Track your lost Android
  • Top 20 programmable logic controller manufacturers
    Top 20 programmable logic controller manufacturers
  • Denso and Honeywell to develop electric engine for Lilium Jet
    Denso and Honeywell to develop electric engine for Lilium Jet
  • Top 25 vertical farming companies
    Top 25 vertical farming companies
  • The Best Mechanical Engineering Design Software in 2022
    The Best Mechanical Engineering Design Software in 2022

Overused words

abb ai applications automated automation automotive autonomous business china companies company control customers data design development digital electric global industrial industry logistics machine manufacturing market mobile platform process production robot robotic robotics robots safety software solution solutions system systems technologies technology time vehicle vehicles warehouse

Secondary Sidebar

Latest news

  • 5 Benefits of Using 3D Interior Design Models
  • How Packing Machines are Making Their Way into Garden Shops
  • Plastic Injection Molding Machines: Types and Benefits
  • 6 Safety Tips for Riding an Electric Bike
  • Essential Types of Contact Center Automations
  • Acieta unveils new collaborative robotic system for welding
  • Amazon to acquire iRobot for $1.7 billion
  • Will Automated Pre Roll Machines Boost Your Revenue?
  • Telexistence to install AI re-stocking robots in 300 convenience stores across Japan
  • Volvo Group to establish battery production plant in Sweden

Footer

We are…

Robotics and Automation News was established in May, 2015, and is now one of the most widely-read websites in its category.

Please consider supporting us by becoming a paying subscriber, or through advertising and sponsorships, or by purchasing products and services through our shop – or a combination of all of the above.

Thank you.

Independent

Archivists

November 2018
M T W T F S S
 1234
567891011
12131415161718
19202122232425
2627282930  
« Oct   Dec »

Complex

Old-skool

This website and its associated magazine, and weekly newsletter, are all produced by a small team of experienced journalists and media professionals.

If you have any suggestions or comments, feel free to contact us at any of the email addresses on our contact page.

We’d be happy to hear from you, and will always reply as soon as possible.

Future-facing

Free, fair and legal

We support the principles of net neutrality and equal opportunities.

Member of The Internet Defense League

Copyright © 2022 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT