Accelerating the Industrial Internet of Things
Log In
Number of Case Studies13
Customized Price Plans
Customized Price Plans
Bosch security systems have quite a good number of resellers through which they sell security devices. For all of their security devices they have pre-installed SIMs/CDMA's in them. For each customer to have its own login and competitive prices for each operator was a big challenge. They offer the same services for each customer and therefore every customer spends the same amount of money for each device.
Connection Listing
Connection Listing
Bosch security systems offer solutions with pre-installed connections in it, which is tested once before it’s made available for sale. Now when they have sold the solution they had to made sure its working and there is no loss in connectivity. Bosch security due to its nature of business has to keep track of where the said device is installed so they can troubleshoot in case of any issues. Now to keep track of more than 10,000 devices is a hard thing if you do not have any reference against devices. Bosch needed a solution where they can add information against each connection about its specific location and could see at a single glance if it's working or not.
Schedule Management in the Austrian Energy Market
Schedule Management in the Austrian Energy Market
Due to the growing volume of customers and data, Salzburg AG needed a solution to promptly and correctly manage the processing of energy transactions in multiple markets using schedules. Requirements included: flexible adaptation of interfaces to enable Salzburg AG to respond to market conditions quickly, automatic processing of energy transactions, and integration of different regional rules for the exchange of schedules.
Number of Hardware4
Bosch Rexroth IndraDrive
Bosch Rexroth IndraDrive
BoniRob - Adaptable Multi-purpose Robotic Platform
BoniRob - Adaptable Multi-purpose Robotic Platform
BoniRob is a multi-purpose robotic platform for applications in agriculture. Its four independently steerable drive wheels and the ability to adjust its trackwidth make BoniRob highly maneuverable.
Transport Data Logger - TDL 110
Transport Data Logger - TDL 110
By being attached to the shipment and measuring and recording relevant parameters such as temperature, humidity, tilt, and shock, the TDL makes the delivery process of goods visible and traceable. These measurements are then documented and visualized through a mobile application. Since the limits of each parameter can be individually configured, any transgression of these limits is traceable and clearly assignable to the stations throughout the entire supply chain.
Number of Software10
CycurHSM
CycurHSM
For security at ECU level, pure security solutions in software cannot sufficiently protect the integrity of a secure System. Hardware Security Modules are a necessary prerequisite to harden embedded systems against attacks and to provide protection of the integrity of the software.CycurHSM is a complete software stack adapted to the available BOSCH HSM implementations by different silicon manufacturers. CycurHSM provides the technology for fulfilling requirements regarding a flexible HSM firmware that provides open and standardized interfaces to HSM-enhanced security applications.
CycurKEYS
CycurKEYS
All security solutions and cryptographic mechanisms require cryptographic keys or certificates. CycurKEYS is a security server that offers the management of cryptographic keys and certificates, especially designed and implemented for automotive, industrial embedded and cyber physical system applications.
Deepfield® Connect
Deepfield® Connect
Deepfield® Connect - Asparagus Monitoring measures the ground temperature using a high precision temperature sensor, which is installed inside the mound, see picture 2. This sensor measures the temperature at different height levels: Directly below the cover as well as 5, 20 and 40 cm below it. The system records the temperatures and sends them to a BOSCH operated webserver. This server provides 24/4 access to the data through Smartphone and Tablet apps, enabling you to take the right decisions. Access to the data can also be shared with employees or consultants.
Number of Suppliers14
Rexroth (Bosch)
Rexroth (Bosch)
As a global partner, Bosch Rexroth supports mechanical and plant engineering efforts around the world with its cutting-edge technology and unique industry knowledge. More than 31,100 associates across the globe are developing tailored, safe and resource-friendly solutions. Our innovations deliver multi-dimensional enhancements for machine manufacturers and end users. For example, they help to reduce harmful carbon dioxide emissions while simultaneously raising productivity.
Bosch
Bosch
Bosch is an industry leader in automobile and industrial equipment, as well as consumer goods and building systems. Bosch operates via 440 subsidiaries in 60 countries; its core lines include mobility (auto) systems, from diesel/hybrid drive to steering, starter motors and generators, electronics, and brakes.Year founded: 1886Revenue: $58.7 billion (2014)Portfolio Companies:- Bosch Software Innovations- Rexroth- Deepfield Robotics- Escrypt- ProSyst 
Bosch Software Innovations
Bosch Software Innovations
Bosch Software Innovations, the Bosch Group’s software and systems house, designs, develops, and operates innovative software and system solutions that help our customers around the world both in the Internet of Things (IoT) and in the traditional enterprise environment. We place particular focus on the topics of mobility, energy, manufacturing, and building. The Bosch IoT Suite is Bosch Software Innovations’ comprehensive toolbox in the Cloud. The software package, which is provided as Platform as a Service (PaaS), allows the interaction of devices, users, companies and partners on a centralized platform. This enables the development of innovative and future-oriented solutions for new business models.With some 650 associates worldwide, Bosch Software Innovations has locations in Germany (Berlin, Immenstaad, and Stuttgart), Singapore, China (Shanghai), Japan (Tokyo), and the United States (Chicago).
Number of Use Cases3
Asset Health Management (AHM)
Asset Health Management (AHM)
Asset Health Management refers to the process of analyzing the health of an asset as determined by operational requirements. The health of an asset in itself relates to the asset's utility, its need to be replaced, and its need for maintenance. It can be broken down into three key components:Monitoring: Tracking the current operating status of the asset.Diagnostic Analysis: Comparing real-time data to historical data in order to detect anomalies.Prognostic Analysis: Identifying and prioritizing specific actions to maximize the remaining useful life of the asset based on analysis of real-time and historical data.
Predictive Maintenance (PdM)
Predictive Maintenance (PdM)
The aim of predictive maintenance (PdM) is first to predict when equipment failure might occur, and secondly, to prevent the occurrence of the failure by performing maintenance. Monitoring for future failure allows maintenance to be planned before the failure occurs. Ideally, predictive maintenance allows the maintenance frequency to be as low as possible to prevent unplanned reactive maintenance, without incurring costs associated with doing too much preventive maintenance.Predictive maintenance uses condition-monitoring equipment to evaluate an asset’s performance in real-time. A key element in this process is the Internet of Things (IoT). IoT allows for different assets and systems to connect, work together, and share, analyze and action data.  
Perimeter Security & Access Control
Perimeter Security & Access Control
Perimeter Security and Access Control systems protect the external perimeter of a facility, control access to restricted areas, and detect and monitor anomalies. Access control includes the control of persons, vehicles, and materials through entrances and exists in a controlled area or premises. Perimeter detection, in contrast, is the detection of access to the outer limits of a detection area by means of physical barriers, sensors on physical barriers, or exterior sensors. Finally, intrusion alarm systems signal entry or attempted entry of a person or an object into the area or volume protected by the system. 
Number of Terms2
Application Specific Sensor Nodes (ASSN)
Application Specific Sensor Nodes (ASSN)
Integrating sensors and sensor fusion in a single device, ASSNs have a built-in intelligence to cope with the complexity of applying multiple sensors to a specific problem such as augmented reality, navigation, positioning, and more.
ProSyst
ProSyst
A cloud middleware IoT data exchange platform developed by ProSyst.
13 Case Studies
4 Hardware
10 Software
14 Suppliers
4 Events
3 Use Cases
2 Terms
test test