Accelerating the Industrial Internet of Things
Log In
Use Cases
    ANDOR
  • (39)
  • (36)
  • (24)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (20)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (15)
  • (15)
  • (15)
  • (14)
  • (14)
  • (11)
  • (7)
  • (7)
  • (6)
  • (2)
  • (1)
  • View all 28 Industries
    ANDOR
  • (40)
  • (32)
  • (27)
  • (22)
  • (19)
  • (13)
  • (10)
  • (9)
  • (7)
  • (5)
  • (4)
  • (3)
  • (2)
  • (1)
  • View all 14 Functional Areas
    ANDOR
  • (26)
  • (21)
  • (19)
  • (16)
  • (16)
  • (16)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (10)
  • View all 14 Enabled Capabilities
71 use cases
Use Case missing? Just let us know via Add New Use Case.
Sort by:
INFINITE Platform for Virtual Domains
INFINITE (INternational Future INdustrial Internet Testbed) is an Industrial Internet innovation platform built specifically for the development of Industrial Internet products and solutions, and it can be used across a wide and diverse range of industries and sectors.It provides completely virtual domains that are able to be connected via mobile networks, which allows multiple such domains to securely run via one physical network.Smart Data can enhance and improve the service provided by emergency service vehicles such as ambulances. Consider the scenario where an emergency service vehicle is dispatched to an incident. The response time is critical. What if the real-time GPS data generated by the emergency service vehicle can be combined with other real-time data from diverse sources such as: current traffic levels for all routes to the incident, location of roadwork, diversions and road closures. By combining and analyzing these diverse raw datasets in real-time in order to provide valuable and intelligent route planning and insights for the emergency service vehicle, response times will improve, leading to better life enhancing outcomes. Member Participants: EMC Corporation, Cork Institute of Technology
Download PDF
Intelligent Urban Water Supply
Intelligent Urban Water Supply Management refers to a cloud service that provides a fully integrated multi-function, multi-service, multi-role and multi-tenant solution.Water, after air, is the second most critical natural resource our lives depend upon. Maintaining adequate clean and safe water supply to urban residents has become ever-challenging. This is especially so under the pressure from the rapid urbanization of the populations in developing countries and increasingly severe constraints of available water resources in many parts of the world. The situation is exacerbated by the inadequate and aging equipment deployed in the water supply infrastructure and the ineffectiveness in the management of the operations of the equipment. The consequence of these conditions impacts to the health and quality of lives of millions of urban residents. 
Download PDF
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) are devices or software applications that monitor network or system activities for malicious activities or policy violations and send reports to a management station.ID systems are being developed in response to the increasing number of attacks on major sites and networks, including those of the Pentagon, the White House, NATO, and the U.S. Defense Department. The safeguarding of security is becoming increasingly difficult, because the possible technologies of attack are becoming ever more sophisticated; at the same time, less technical ability is required for the novice attacker, because proven past methods are easily accessed through the Web.
Download PDF
Inventory Quality Control
Quality control is a vital aspect of stock control - especially as it may affect the safety of customers or the quality of the finished product. Efficient stock control incorporates stock tracking and batch tracking. This means being able to trace a particular item backwards or forwards from source to finished product, and identifying the other items in the batch.
Download PDF
Location Tracking
Location tracking is having a wide impact across a variety of industries and emerging as a disruptive trend moving forward.The ability to track people and inventory in real time through solutions like RFID tags and advanced barcodes positions organizations to gather more detailed information about assets.
Download PDF
Machine Condition Monitoring
Early predictions on equipment malfunctions and service maintenance can be automatically scheduled ahead of an actual part failure by installing sensors inside equipment to monitor and send reports.Machine condition monitoring is used to determine the condition of a machine with the intent to forecast mechanical wear and failure. The predicted data provides health information of the machine and helps to predict machinery failure. The monitoring equipment tracks changes in temperature, vibration, and output of machines in order to detect imbalance, corrosion, wear, misalignment, sediment build-up, or poorly lubricated parts. Condition monitoring has gained importance in line with increased company focus on productivity and asset utilization. The need for eliminating unnecessary maintenance costs and catastrophic breakdowns in production processes is expected to continue to drive the adoption of condition monitoring solutions. The global machine condition monitoring market can be divided on the basis of products, applications, and components. On the basis of products, the global machine conditioning monitoring market can be segmented, into thermography equipment, vibration monitoring equipment, corrosion monitoring equipment, ultrasound emission equipment, lubricating oil analysis equipment, and motor current signature analysis equipment.The vibration-based condition monitoring equipment holds the leading place amongst all condition-based maintenance technologies. On and off-line vibration monitoring is extensively used by industries to perform continuous production processes. In addition to vibration monitoring, other techniques used for machine condition monitoring are wear analysis, thermography, performance monitoring, degradation by products, and physical testing.Types of Machine Condition MonitoringEach of the five main varieties of machine condition monitoring serves a different role.Route-Based Monitoring - Route-based monitoring involves a technician recording data intermittently with a handheld instrument. This data is then used for trending to determine if more advanced analysis is needed.Portable Machine Diagnostics - Portable machine diagnostics is the process of using portable equipment to monitor the health of machinery. Sensors are typically permanently attached to a machine and portable data acquisition equipment is used to read the data.Factory Assurance Test - Factory assurance test is used to verify that a finished product meets its design specifications and to determine possible failure modes of the device.Online Machine Monitoring - Online machine monitoring is the process of monitoring equipment as it runs. Data is acquired by an embedded device and transmitted to a main server for data analysis and maintenance scheduling.Online Machine Protection - Online machine protection is the process of actively monitoring equipment as it runs. Data is acquired and analyzed by an embedded device. Limit settings can then be used to control turning on and off machinery.Key vendors: Emerson, GE, Honeywell, Rockwell Automation
Download PDF
Mass Customization
Mass customization, in marketing, manufacturing, call centres and management, is the use of flexible computer-aided manufacturing systems to produce custom output. Those systems combine the low unit costs of mass production processes with the flexibility of individual customization.Mass customization is the new frontier in business for both manufacturing and service industries. At its core is a tremendous increase in variety and customization without a corresponding increase in costs. At its limit, it is the mass production of individually customized goods and services. At its best, it provides strategic advantage and economic value.Many implementations of mass customization are operational today, such as software-based product configurators that make it possible to add and/or change functionalities of a core product or to build fully custom enclosures from scratch. This degree of mass customization, however, has only seen limited adoption. If an enterprise's marketing department offers individual products (atomic market fragmentation) it doesn't often mean that a product is produced individually, but rather that similar variants of the same mass-produced item are available.Companies that have succeeded with mass-customization business models tend to supply purely electronic products. However, these are not true "mass customizers" in the original sense, since they do not offer an alternative to mass production of material goods.
Download PDF
Microgrid
A microgrid is a local energy grid with control capability, which means it can disconnect from the traditional grid and operate autonomously.The Microgrid Communication and Control Testbed of the IIC re-architects the power grid system into a series of distributed microgrids that control smaller areas and support load, generation, and storage.The goal of the Microgrid Communication and Control Testbed is to prove the viability of a real-time, secure databus to faciliate machine-to-machine, machine-to-control center, and machine-to-cloud data communications. It will combine distributed, edge-located processing and control applications with intelligent analytics. It will run in real-world power applications and interface with practical equipment.Three Industrial Internet Consortium member organizations will be lending their expertise to this project:Real-Time Innovations (RTI) is providing the real-time databus software using their DDS standard based RTI Connext communication platform for IIoT; National Instruments is providing the intelligent nodes for edge control and analytics based on their CompactRIO and Grid Automation Systems; and Cisco is providing network equipment and security expertise using their Connected Grid Router. They will also be collaborating with Duke Energy and the Standard Grid Interoperability Panel (SGIP) to ensure a coordinated, accepted architecture.The testbed is unfolding in three phases. In April 2015, Phase One commenced as a proof-of-concept that ensures basic security and performance. Phase Two - slated for 2016 - will demonstrate the scalability of the Microgrid Communication and Control Framework in a simulated environment. The final phase will demonstrate the testbed in a real-world situation.The first two phases will take place in Westminster, California at Southern California Edison's Controls Lab. The field deployment test will take place at CPS Energy's "Grid-of-the-Future" microgrid test area in San Antonio, Texas.While most microgrids in operation today are combining existing generation and demand with new technology, the majority of new projects are greenfield.Two additional market trends are also apparent in Navigant’s report – a shift toward military microgrids and growing influence of extreme weather threats in new investments for local communities.
Download PDF
Outage Management System
An Outage Management System (OMS) is a computer system used by operators of electric distribution systems to assist in restoration of power. At the core of a modern outage management system is a detailed network model of the distribution system. The utilities Geographic Information System (GIS) is usually the source of this network model. By combining the locations of outage calls from customers, a rules engine is used to predict the locations of outages.For instance, since the distribution system is primarily tree-like or radial in design, all calls in a particular area downstream of a fuse could be inferred to be caused by a single fuse or circuit breaker upstream of the calls. The outage calls are usually taken by call takers in a call center utilizing a customer information system (CIS). Another common way for outage calls to enter into the CIS (and thus the OMS) is by integration with an Interactive Voice Response (IVR) system. The CIS is also the source for all the customer records which are linked to the network model.Customers are typically linked to the transformer serving their residence or business. It is important that every customer be linked to a device in the model so that accurate statistics are derived on each outage. Customers not linked to a device in the model are referred to as "fuzzies."
Download PDF
Peak Demand Metering
An electric demand meter works on the principle that customers who require a higher or more intensive level of service during bursts of peak demand should pay more for the availability of that service.Electricity flows in a current. It cannot be stored. It's not possible to cut back on electricity four or five days in advance to have power on reserve for peak demand. A demand meter calculates billing based on the highest level of service that a residential or commercial customer would possibly need.A demand meter is similar to a car's speedometer that can register speeds of 100 miles (161 km) per hour or more. Although the car's usual driving speed, even on an expressway, will be much lower, there might be times when the car needs to go as fast as possible, such as when passing a slow-moving car on a two-lane highway. The speedometer is designed to handle the car's peak demand for driving speed.With electric service, a family or business that places demands on the electric grid, for example, to run a a high-level, energy-intensive mainframe computer or a whole-house air conditioner, even for short periods of time, would require more capacity from the electricity grid during those periods of peak demand than would a household or business that did not have such energy-demanding equipment. Even businesses or homes that used more electricity overall wouldn't place the same kind of demand on the electric grid, because most electricity systems are capable of handling a normal demand load from their customers.
Download PDF
Perimeter Security & Access Control
Perimeter Security and Access Control systems protect the external perimeter of a facility, control access to restricted areas, and detect and monitor anomalies. Access control includes the control of persons, vehicles and materials through entrances and exists of a controlled area or premises. Perimeter detection, in contrast, is the detection of access to the outer limits of a detection area by means of physical barriers, sensors on physical barriers, or exterior sensors. Finally, intrusion alarm systems signal entry or attempted entry of a person or an object into the area or volume protected by the system.Since at least the Roman Empire, fortifications, walls and barriers have been an important part of protecting sovereign territories and private property. Perimeter security is designed with the primary purpose to either keep intruders out or captives contained within the area the boundary surrounds. Both natural and man-made barriers can serve as perimeter security.Governments utilize perimeter security not only for the safety of their citizens, but to control the flow of commerce and immigration, as well as to protect vital infrastructure from vandals and terrorists. Property owners and organizations of all sizes use various man-made technology to achieve varying degrees of perimeter security.
Download PDF
Power Quality Monitoring
The monitoring of electric power helps to identify the important power quality problems such as voltage sags and swells, interruptions, harmonics, and high-frequency noise, consistently seen in industrial and commercial grid applications.Troubleshooting these problems requires accurate measurements and analysis of power quality with monitoring instruments that can effectively locate issues and identify solutions. The key to an continuous improvement of power supply and its use is, first of all, to know the relevant local system circumstances in detail, using the information of all available sources connected to the system.
Download PDF
Precision Farming
Precision farming enables farmers to increase production (yield), lower their operational costs and economize their applications of chemicals and fertilizers. Precision Conservation Management (PCM) focuses on improving crop yield through the analysis of real-time data from a variety of environmental sensors and other data sources located in commercial crop fields or throughout the enterprise.
Download PDF
Predictive-based Maintenance (PBM)
Predictive-based maintenance is the science of maintaining physical assets over time, in order to maximize their return on those assets. It is enabled by identifying and diagnosing the condition of equipment via sensors and data analytics that provide visibility into the current and future status of assets. AKA  Condition-based Maintenance (CBM). This is with the intent of reducing costs and down time. 
Download PDF
Process Control & Optimization (PCO)
Process Control and Optimization (PCO) is the discipline of adjusting a process to maintain or optimize a specified set of parameters without violating process constraints.The PCO market is being driven by rising demand for energy efficient production processes, safety and security concerns, and the development of IoT systems that can reliably predict process deviations.Fundamentally, there are three parameters that can be adjusted to affect optimal performance:- Equipment optimizationThe first step is to verify that the existing equipment is being used to its fullest advantage by examining operating data to identify equipment bottlenecks.- Operating proceduresOperating procedures may vary widely from person-to-person or from shift-to-shift. Automation of the plant can help significantly. But automation will be of no help if the operators take control and run the plant in manual.- Control optimizationIn a typical processing plant, such as a chemical plant or oil refinery, there are hundreds or even thousands of control loops. Each control loop is responsible for controlling one part of the process, such as maintaining a temperature, level, or flow. If the control loop is not properly designed and tuned, the process runs below its optimum. The process will be more expensive to operate, and equipment will wear out prematurely. For each control loop to run optimally, identification of sensor, valve, and tuning problems is important. It has been well documented that over 35% of control loops typically have problems. The process of continuously monitoring and optimizing the entire plant is sometimes called performance supervision.
Download PDF
Rapid Prototyping (RP)
Rapid prototyping (RP) uses 3D printing technologies to create prototypes faster and at significantly lower cost than traditional methods. Prototypes are created directly from CAD data, which can be regularly revised based on real-world testing and feedback.
Download PDF
Real Time Electricity Pricing
Real-time electricity pricing requires the installation of an electricity smart meter that can send and receive information about electricity costs and give consumers more information about their own usage.
Download PDF
Real-Time Location System (RTLS)
Real-time locating systems (RTLS) are used to automatically identify and track the location of objects or people in real time, usually within a building or other contained area. Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location.RTLS is used to identify and locate objects, assets or individuals automatically in real time. The goal of RTLS is to continuously track the location of the targets. It works with the help of a tag that is attached to the target from which wireless signals are sent and received by the readers. The readers are usually fixed at predetermined positions and they transmit the location data to the software, which then interprets the exact location visually to the end user. Examples of real-time locating systems include tracking automobiles through an assembly line, locating pallets of merchandise in a warehouse, or finding medical equipment in a hospital. The physical layer of RTLS technology is usually some form of radio frequency (RF) communication, but some systems use optical (usually infrared) or acoustic (usually ultrasound) technology instead of or in addition to RF. Tags and fixed reference points can be transmitters, receivers, or both, resulting in numerous possible technology combinations. RTLS can be used numerous logistical or operational areas such as: locating and managing assets in a facility, sending location triggered alerts, maintaining proper staffing levels in operational areas.Locating concepts:RTLS are generally used in indoor and/or confined areas, such as buildings, and do not provide global coverage like GPS. RTLS tags are affixed to mobile items to be tracked or managed. RTLS reference points, which can be either transmitters or receivers, are spaced throughout a building (or similar area of interest) to provide the desired tag coverage. In most cases, the more RTLS reference points that are installed, the better the location accuracy, until the technology limitations are reached.A number of disparate system designs are all referred to as "real-time locating systems", but there are two primary system design elements:Locating at choke points:The simplest form of choke point locating is where short range ID signals from a moving tag are received by a single fixed reader in a sensory network, thus indicating the location coincidence of reader and tag. Alternately, a choke point identifier can be received by the moving tag, and then relayed, usually via a second wireless channel, to a location processor. Accuracy is usually defined by the sphere spanned with the reach of the choke point transmitter or receiver. The use of directional antennas, or technologies such as infrared or ultrasound that are blocked by room partitions, can support choke points of various geometries.Locating in relative coordinates:ID signals from a tag is received by a multiplicity of readers in a sensory network, and a position is estimated using one or more locating algorithms, such as trilateration, multilateration, or triangulation. Equivalently, ID signals from several RTLS reference points can be received by a tag, and relayed back to a location processor. Localization with multiple reference points requires that distances between reference points in the sensory network be known in order to precisely locate a tag, and the determination of distances is called ranging.Another way to calculate relative location is if mobile tags communicate directly with each other, then relay this information to a location processor.Location Accuracy:RF trilateration uses estimated ranges from multiple receivers to estimate the location of a tag. RF triangulation uses the angles at which the RF signals arrive at multiple receivers to estimate the location of a tag. Many obstructions, such as walls or furniture, can distort the estimated range and angle readings leading to varied qualities of location estimate. Estimation-based locating is often measured in accuracy for a given distance, such as 90% accurate for 10 meter range.Systems that use locating technologies that do not go through walls, such as infrared or ultrasound, tend to be more accurate in an indoor environment because only tags and receivers that have line of sight (or near line of sight) can communicate.Applications:RTLS can be used numerous logistical or operational areas such as:- locate and manage assets within a facility, such as finding a misplaced tool cart in a warehouse or medical equipment- notification of new locations, such as an alert if a tool cart improperly has left the facility- to combine identity of multiple items placed in a single location, such as on a pallet- to locate customers, for example in a restaurant, for delivery of food or service- to maintain proper staffing levels of operational areas, such as ensuring guards are in the proper locations in a correctional facility- to quickly and automatically account for all staff after or during an emergency evacuation- to automatically track and time stamp the progress of people or assets through a process, such as following a patient's - emergency room wait time, time spent in the operating room, and total time until discharge. Such a system can be used for process improvement- clinical-grade locating to support acute care capacity managementTypes of technologies used:- There is a wide variety of systems concepts and designs to provide real-time locating.- Active radio frequency identification (Active RFID)- Active radio frequency identification - infrared hybrid (Active RFID-IR)- Infrared (IR)- Optical locating- Low-frequency signpost identification- Semi-active radio frequency identification (semi-active RFID)- Passive RFID RTLS locating via Steerable Phased Array Antennae- Radio beacon,- Ultrasound Identification (US-ID)- Ultrasonic ranging (US-RTLS)- Ultra-wideband (UWB)- Wide-over-narrow band- Wireless Local Area Network (WLAN, Wi-Fi)- Bluetooth- Clustering in noisy ambience,- Bivalent systemsA general model for selection of the best solution for a locating problem has been constructed at the Radboud University of Nijmegen. Many of these references do not comply with the definitions given in international standardization with ISO/IEC 19762-5 and ISO/IEC 24730-1. However, some aspects of real-time performance are served and aspects of locating are addressed in context of absolute coordinates.Key vendors: AeroScout, Ekahau, TeleTracking Technologies
Download PDF
Real-Time Monitoring of Shipments on the Blockchain
Ninety percent of global trade is processed via ocean shipping. The supply chain is slowed by the complexity and sheer volume of point to point communication across various parties including land transportation, freight forwarders, customs brokers, governments, ports and ocean carriers.International trading parties require both improved workflow and better visibility. They need a faster, safer and more efficient way to handle documentation for moving goods across international borders.
Download PDF
Real-Time Visibility
With real-time visibility, companies are alerted to delays, slowdowns and changing trends. Real-time visibility tools not only allow you to build smarter routes; they show you the impact of each change in real time.
Download PDF
Remote Patient Monitoring
Remote patient monitoring leverages IoT technology to revolutionize the way hospitals are organized and patients are taken care of. By making healthcare "smart" hospitals allow nurses and doctors to receive real-time data regarding the health of every patient.Extended life spans are placing an increasing burden on the world's healthcare systems, while particularly in developing countries like China and India there are insufficient doctors and nurses to care for the growing (and aging) population.This situation makes the health care industry ripe for innovation. Still today, healthcare providers are often unable to access patient health data remotely.
Download PDF
Room Automation
What is Room Automation?Room Automation refers to the control of room climate through the installation of automatic control equipment. When in use, the equipment can adjust heating, cooling, ventilation, lighting and shade to reduce energy strains on the room. 
Download PDF
Route Optimization
Changing customer needs, time sensitivity, capacity restraints, driver preferences, as well as historical and real-time data flows such as traffic and navigation ― all contribute to the complexity of executing the perfect delivery. The ultimate fleet route planning software solution balances all of the business constraints around workers, orders, vehicles, and compliance to create the most efficient routes possible. These routes are then monitored via real-time execution in order to understand how the day is unfolding.Strategic territory and route optimization solutions allow to balance overall workload while decreasing costs and adhering to business constraints. Create the optimal sales and delivery territories using route planning software's powerful algorithms that encompass customer needs and available resources while considering geographic areas, capacity, and more.
Download PDF
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is indication of a cybersecurity / security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods.
Download PDF
Seismic Acquisition
Seismic acquisition is a service for oil and gas companies and helps them to explore, develop, and manage hydrocarbon accumulations. 2D, 3D and 4D seismic data acquisition involves applying a seismic energy source at discrete surface location. The resulting energy is reflected back from interfaces where rock properties change.By recording this reflected energy at an array of geophones placed in the ground surface, the results can be processed to produce an image of underground geological structures and a range of attributes that can be used to infer the physical rock properties.
Download PDF
Small Series Production
3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file.It can be used to produce a first small series of the product in order to launch it on the market. Once the demand for the product is raising, investments in tooling for traditional manufacturing are made. This process is also called bridge manufacturing technique. For certain applications (e.g. small series), 3D printing is the cheaper and/or faster option than traditional manufacturing. This is the main reason, why 3D printing has been used for this application.
Download PDF
Smart Buildings
Smart buildings are buildings (commercial, residential etc) that have technologies installed within to lower costs, become energy efficient and reduce the overall carbon footprint and foster a healthy environment. 
Download PDF
Smart HVAC
HVAC (heating, ventilating, and air conditioning) is the technology of indoor environmental control. Its goal is to manage air temperature, humidity and quality to meet the needs of both people and industrial processes. With low cost sensors, wireless connectivity and more powerful data processors, HVAC companies are now able to collect real time performance data and monitor the condition of their equipment. Remote monitoring solutions can monitor hard to reach areas and sites in order to alert staff to a breakage and heat or water damage in a cable. IoT can help the HVAC industry improve overall equipment effectiveness and save money by minimising equipment failure and optimizing energy usage and performance levels. Direct digital control: Central controllers and most terminal unit controllers are programmable, meaning the direct digital control program code may be customized for the intended use. The program features include time schedules, setpoints, controllers, logic, timers, trend logs, and alarms. The unit controllers typically have analog and digital inputs that allow measurement of the variable (temperature, humidity, or pressure) and analog and digital outputs for control of the transport medium (hot/cold water and/or steam). Digital inputs are typically (dry) contacts from a control device, and analog inputs are typically a voltage or current measurement from a variable (temperature, humidity, velocity, or pressure) sensing device. Digital outputs are typically relay contacts used to start and stop equipment, and analog outputs are typically voltage or current signals to control the movement of the medium (air/water/steam) control devices such as valves, dampers, and motors. Groups of DDC controllers, networked or not, form a layer of system themselves. This "subsystem" is vital to the performance and basic operation of the overall HVAC system. The DDC system is the "brain" of the HVAC system. It dictates the position of every damper and valve in a system. It determines which fans, pumps, and chiller run and at what speed or capacity. With this configurable intelligency in this "brain", we are moving to the concept of building automation. Key vendors: Grainger, Johnson Controls, Lennox Commercial, Mitsubishi
Download PDF
Smart Lighting
Smart Lighting is about intelligent and weather adaptive lighting in street, commercial and factory lighting.The smart lighting market is primarily driven by the growing demand for energy efficient lighting system in order to reduce energy consumption cost. Development of sensor and wireless technology enable improved energy efficiency, process monitoring remote control, and worker safety and satisfaction. IoT solutions enable partially or fully autonomous lighting control based on daylight availability, time, facility activities, and other factors.
Download PDF
Smart Supply Chain
Smart supply chains monitor conditions along the supply chain and track products for traceability. There are three primary components: IoT instrumentation on fixed objects such as pallets and trucks; interconnection across systems up and down the supply chain; and advanced analytics implemented through optimization software.Smart and mobile supply solutions provide users with intelligent, interconnected, and instrumented information about the supply chain. Supply chain modeling is a must-have capability for businesses to optimize their supply chain operations and adapt to changing market conditions by enabling data driven decisions. Supply chain design should be able to see across the entire business to optimize the true end-to-end supply chain and not just a specific business unit or business function.IoT is enablign increased visibility into aspects of the supply chain that have previously been difficult to track in a granular manner. Key objectives of an enabled supply chain include mitigating supply chain risk, accelerating decision making processes, improving efficiency, and monitoring performance across functions.Development and design: With increasing globalization and easier access to alternative products in today's markets, the importance of product design to generating demand is more significant than ever. In addition, as supply and therefore competition among companies for the limited market demand increases, and as pricing and other marketing elements become less distinguishing factors, product design likewise plays a different role by providing attractive features to generate demand. In this context, demand generation is used to define how attractive a product design is in terms of creating demand. In other words, it is the ability of a product's design to generate demand by satisfying customer expectations.But product design affects not only demand generation but also manufacturing processes, cost, quality, and lead time. The product design affects the associated supply chain and its requirements directly, including manufacturing, transportation, quality, quantity, production schedule, material selection, production technologies, production policies, regulations, and laws. Broadly, the success of the supply chain depends on the product design and the capabilities of the supply chain, but the reverse is also true: the success of the product depends on the supply chain that produces it. Since the product design dictates multiple requirements on the supply chain, as mentioned previously, then once a product design is completed, it drives the structure of the supply chain, limiting the flexibility of engineers to generate and evaluate different (and potentially more cost-effective) supply chain alternatives.
Download PDF
test test