Energy and Excitement at DistribuTECH 2017

This week we attended DistribuTECH 2017 with several thousand of the leading minds in technology, education and innovation for utilities, Smart Grid and municipalities. We had many great conversations about the direction of Industrial IoT (IIoT) and the all-encompassing digital technology shift. At the FreeWave booth we led many demonstrations of our latest technology. We also shared how our fellow attendees can achieve smart data at the Edge. Here is a small snapshot of the excitement and action from the show: FreeWave at DistribuTECH We had a lot to share at DistribuTECH this year. In addition to providing product demos at our booth, we just launched several important company, product and partnership announcements. Here’s the run-down on what we launched this week: New IIoT Products & Two New Partnerships Introduced at DistribuTECH Zumlink Z9-C and Z9-T Radios: FreeWave introduced the Zumlink-Z9-PE last Fall, but now it brings the next generation, high performance platform to market. ZumLink is the underpinning of the company’s go-forward IIoT strategy for IIoT and embedded radio applications. The Z9-C and Z9-T deliver high speed Frequency Hopping Spread Spectrum (FHSS) functionality in a radio module that is half the size of a credit card. FreeWave and Systech application partnership: Together with Systech, we announced an industrial Tank Level Control application that resides on and executes from FreeWave’s ZumLink IIoT Programmable Radio for edge networks. The new application features an easy-to-use “ITTT (If This Then That)” process control programming interface that will control analog, digital and RS485 sensors linked to the ZumLink programmable radio.  The FreeWave ITTT App is designed for a user-friendly experience and requires no previous programming knowledge or practice. Technology partnership with E2E Technologies: E2E is a comprehensive solutions provider specializing in communication architecture design, implementation and network management. E2E’s Stingray Network Management System (NMS), supports the full array of FreeWave’s industry-leading wireless communication solutions and is optimizable for IT professionals looking to manage individual components of a limited IIoT or M2M communications system within a larger IT network management framework. The New FreeWave We officially unveiled a new look and website that reflects our move to the next generation of the industrial IoT: The Programmable Edge and Fog Computing. The new FreeWave visually projects our future-focused mission to help organizations around the world connect and gain valuable intelligence from devices – even in the most challenging of locations and conditions – anytime, anywhere in a secure, reliable fashion. This week has represented several major milestones for FreeWave, and launching it all at DistribuTECH was the perfect platform for sharing both our news and the future direction of FreeWave. What do you think about the new FreeWave website?

2017 IIoT Prediction Series, Part 1: Where the Fog Meets the Edge

As 2017 kicks into full gear and a particularly interesting 2016 fades into the rearview mirror, we took a look around the IIoT landscape to see what this year might potentially have in store. We will be unveiling five IIoT-related predictions throughout this week and into next, so stay tuned and let us know what you think! It’s become increasingly difficult to ignore the importance of cybersecurity. From the role it played in the 2016 presidential election to the recent revelation that in 2013, more than one billion Yahoo accounts were breached, cybersecurity is no longer a problem unique to Sci-Fi thrillers. Of course, the two examples mention here are simply the most egregious of recent memory, but they pale in comparison to the threat of a cyberattack on actual infrastructure. Cybersecurity for the Industrial Internet of Things (IIoT) began as a minor headache and quickly grew into a full-blown migraine. Data is the perhaps the most important “currency” in the world today, and companies both public and private are scrambling to figure out the best way to protect that data will still ensuring real-time transport and analytics. With that in mind, our first prediction for the new year centers on the deployment of new methods for data transport and protection: 2017 will see the emergence of True Fog Computing and Programmable/Intelligent Edge Devices with the strongest security measures to-date. According to analysts, organizations have become more comfortable hosting critical infrastructure and application in the Cloud. In efforts to further optimize processes and shorten response times, organizations will explore ways to host applications at the device/sensor level (i.e., the Edge or Fog Computing). A decentralized network architecture that brings computing power closer to where data is generated and acted upon, Fog Computing enables analysis, control and automation closer to the “Things” in the Industrial Internet of Things. Because Fog Computing reduces the amount of data being sent to the Cloud, cybersecurity will be enhanced by reducing the threat and attack surfaces of IIoT networks. In industries where even milliseconds are vital, certain processes will move away from the Cloud and closer to the Edge. The basis of this shift in intelligence deployment is simple: the Cloud, while fairly secure, is still prone to security breaches, so rather than host all of the data and the analytics tools, move those processes closer to the edge to the sensors and devices with security already built in. Now, while the concept is simple, the execution is more difficult. This shift requires a robust, high-speed network capable of real-time data transmission and, perhaps even more importantly, programmable devices at the edge. Rather than thinking about big data from the perspective of drinking from a fire hose, a programmable device at the edge allows the user to develop proprietary applications that filters out unnecessary data. Subsequently, the smaller data packets enable two things to happen: faster transmission to the analytics engines, and the ability to send that data via mesh networking technology, which has proven to provide greater security. Simple, right? As it stands, the greatest problem facing this shift in intelligence to the edge is that there are, at the moment, very few companies creating programmable devices for the edge. It’s a different way of approaching data transmission and security, and so far, the industry has been slow to catch on: rather than trying to build a wall in front of a massive door (the Cloud), eliminate the door and create a series of constantly moving mouse holes (the Edge). Which sounds easier to protect?

2017 IIoT Prediction Series, Part 2: Industrial Apps Outpace Consumer IoT Apps

As 2017 kicks into full gear and a particularly interesting 2016 fades into the rearview mirror, we took a look around the IIoT landscape to see what this year might potentially have in store. We will be unveiling five IIoT-related predictions throughout this week and into next, so stay tuned and let us know what you think! Yesterday, we started our predictions by looking at the potential development of Fog Computing at the Edge and its impact on cybersecurity. IIoT App Development in 2017 In 2016, Industrial IoT app development made headlines as the technology landscape continued to evolve. App developers are becoming increasingly aware of the opportunity to create third-party apps for industrial and critical infrastructure operations. While the demand for Smart Data increases and organizations work to update legacy systems, particularly at edge networks, our next 2017 prediction is all about IIoT app development. The prediction  IIoT app development programs will begin to outgrow/outpace consumer IoT app development programs within the next three years. Third party IIoT application development at the edge (i.e., Fog Computing) specifically will eliminate need for big data transmission capabilities. The ability to filter specific data needs directly at the source means less of a need to collect all the data for broad analysis.   There are a number of industry drivers that support the prediction. Here’s our take on the big ones: Smarter Data, Not Bigger Data The ability to filter specific data needs directly at the source will reduce the need to collect all the data for analysis as Big Data transitions towards Smart Data. Smart Data Organizations within IIoT will develop applications that enable them to get only the data they need, when they need it.  This will drive faster response times and Cloud resources will be able to take on more data intensive tasks like trends and historical analysis. The Developer Benefits The attraction towards the more lucrative business of developing apps for IIoT networks will drive a lot of growth in the area of IIoT app development. Developers will also have the opportunity help solve major infrastructure issues that accompany big initiatives, such as Smart Cities and improvements to critical infrastructure projects. These initiatives are likely to drive more investments into IIoT app development, creating new business opportunities for developers. Cybersecurity Initiatives The demand for cybersecurity will drive the growth of IIoT app development as organizations work to prevent DoS and hacking attacks – especially on legacy systems. Leveraging cybersecurity apps to support those existing systems will help organizations protect their data and improve operations. Interoperability and Open Standards Systems today require more interoperability between disparate and oftentimes outdated technologies and systems. Because of the business demands for interoperability, the IIoT network impact on IT systems, the enterprises will require more software solutions for enhanced visibility and control to bring everyone and every system onto a single toolchain. Because there are more open standards and modern technologies being deployed, IT groups will need new business apps to coincide with the apps deployed along the IIoT systems. It will be interesting to see how each of these moving parts impacts IIoT app development over the next year. Stay tuned for our next prediction focused on IT/OT Convergence and the challenges of recruiting the next generation of the workforce.

JavaOne 2016 Recap

JavaOne had the pleasure of taking San Francisco by storm. The 2016 conference left little to be desired, with more than 450 java-focused demos, labs and sessions with peer experts, plus time to network with this high-tech crowd. This year aimed its attention at young coders, enterprise, developers and the tools they need to keep innovation alive. If by chance you weren’t part of the masses that migrated to San Francisco, this week’s recap is dedicated to JavaOne highlights. So sit back, relax and enjoy this week’s recap. Opening Keynote Hints At Ambitious Changes In Next Version Of Java By @Oracle | Published on @Forbes “A common theme in the keynote was the promised modularization feature, Project Jigsaw—which enables Java programs to ship and run with much smaller footprints, thereby using fewer system resources.”   Java EE moves forward once again By Alex Handy | Published on @SDTimes “The state of innovation in Java EE was so in question that, earlier this summer, the Java Guardians were formed to champion the platform and demand that it be pushed forward. At JavaOne today, Oracle finally detailed its plans to address the neglected enterprise Java platform. Alongside that road map came new information on the in-development Java SE 9 and OpenJDK 9.”   Audience Gets a Glimpse of the Power of JShell By @mon_beck | Published on @InfoQ “During his JavaOne 2016 keynote, Mark Reinhold, Chief architect of the Java platform group pointed out that Java 9 is much bigger than Jigsaw as can be seen in the 85 JEPs targeted for Java 9. I would like to discuss one new Java feature he highlighted, JEP 222, the Java shell (also known as JShell.) With JShell, Java 9 will enable developers to use Read-Eval-Print loop (REPL) which is an interactive tool that evaluates user input and prints the output either as a value or a state change.”   A boost for cloud app developers By Admire Moyo | Published on @ITWeb “Oracle says by giving developers a choice of programming languages, databases, compute types, operating systems and virtual machines, integrated development environments and tools, the company provides developers with the choice and flexibility needed to build modern applications in the cloud.”   Top Tweets During the Event! Women in tech are taking over Posted by @java Times are changing as women in tech fill up the next JavaOne panel discussion. Talking code, programming and technical specifics is no longer a man’s world. https://twitter.com/java/status/778694106503532545/photo/1 Don’t forget your Star Wars costumes! Posted by @hendrikEbbers JavaOne asked us to reach for our inner Star Wars fan, by giving away Star Wars stickers to the first 50 people that dressed up in their best Star Wars gear. We are still looking for the proof. If you did dress up, please share your pictures with us! https://twitter.com/hendrikEbbers/status/778347600600719360/photo/1 ReadWrite Meets FreeWave! Posted by @citizencaen The excitement around JavaOne was palpable! We were thrilled to finally meet the Chris Caen from ReadWrite as we caught him up on the new partnership announcements with Teachneaux and Resilio. We also had the pleasure of showcasing our latest ZumLink IIoT Programmable Radio at JavaOne, as pictured below. Chistorpher Caen with ReadWrite caught up wtih Michelle Marceny at FreeWave Technologies. Caen found out that, “When FreeWave says their devices have 2.8 million combat hours, they really mean combat hours.” https://twitter.com/citizencaen/status/778662244276064257/photo/1 JavaOne Entertains in Style!  Each night was filled with social networking, good food and drinks. Wednesday night they pulled out all the stops grabbing the attention of both young and old by having performances by both Sting and Gwen Stefani. Lots of fun!  

Friday Top 5 IIoT News Roundup

It’s time to nominate our Friday top five Industrial IoT news articles of the week. Much like the weather in Boulder this week, we couldn’t decide on just one vertical focus, so we cast a wide net of IoT topics. In this week’s roundup, you’ll find a splash of fog computing, manufacturing, smart grid, security and overall IoT updates. Dive in and see if you agree with our picks. Don’t miss the Friday bonus at the end of this short roundup. Making fog computing sensors clearly reliableBy @Patrick_Mannion | Published on @ednmagazinehttp://www.edn.com/design/sensors/4442602/Making-fog-computing-sensors-clearly-reliable“As fog computing rolls in, the onus is upon designers to figure out how much intelligence should be at each node of the system for optimal performance. This implies then that sensors will need to start being more intelligent, with some level of built-in processing, storage, and communications capability.”  Army needs wide-area electro-optical sensors for manned and unmanned aircraftBy @jkeller1959 | Published on @IntelligentAerohttp://www.intelligent-aerospace.com/articles/2016/08/ia-wami-sensors.html“Army researchers are interested in moderate-resolution persistent-surveillance electro-optical sensors that operate during the day and at night over large areas to detect vehicles and people on foot. Researchers want to develop a sensor that consists of an imaging sensor, as well as a storage and processing unit.”  Five essential IIoT DefinitionsBy @MMS_MattDanford | Published on @MMSOnlinehttp://www.mmsonline.com/blog/post/5-essential-iiot-definitions-“The idea is not just to exchange and collect data, but to act on that data to make things better. (One commonly cited example is a “smart” thermostat.) IIoT is the same concept applied to industry. Examples range from “smart” buildings and power grids to “smart” transportation networks. IIoT might initially take the form of a machine tool status monitoring system.”  What makes a grid smart?By David Shadle | Published on @tdworldmaghttp://tdworld.com/grid-opt-smart-grid/what-makes-grid-smart“My point, however, is that the critical consideration is not the number of sensors, controls or data storage components we add to our system when we decide to move ahead with smart grid applications. The focus also needs to be on mastering the integration of these systems, many times across traditional IT and OT lines, to allow them to achieve their potential for intelligence.”  Top ten security predictions through 2020By @Gartner_inc | Published on @Forbeshttp://www.forbes.com/sites/gartnergroup/2016/08/18/top-10-security-predictions-through-2020/#4d8ba8073cbe“Through 2018, more than 50% of Internet of Things (IoT) device manufacturers will not be able to address threats from weak authentication practices.”  Friday Bonus! FreeWave Technologies announces partnership with Solis Energy By @SolisEnergy and @freewavetech | Published on @SolarNovus http://www.solarnovus.com/freewave-technologies-announces-partnership-with-solis-energy_N10256.html “Both companies are excited about the partnership and are already working through high profile opportunities to take advantage of the growing demand for smart systems and industrial connectivity.”

Machine Hackathon: DARPA Plays Cyber Capture the Flag

A machine hackathon is about to take on a whole new meaning as Defense Advanced Research Projects Agency (DRAPA) prepares to hold it’s first ever machine-only hackathon. With a specific focus on cybersecurity, this cyber version of Capture the Flag (CTF), is DARPA’s way of combating the onset of cyber attacks in real-time. DARPA’s normal approval process is lengthy; once a potential threat is recognized and a software solution has been created, it has to be tested and approved before it can be implemented, and by the time the software fix is ready to be used across the board, another threat looms on their horizon. Some of you might be asking, “What is DARPA and who are their finalists in this cyber challenge?” Not to worry, the short video below provides some background and context. The contest is truly a battle of the minds, as hacker teams try their hand at reverse-engineering software to seek out and find weakness in the system and fix those holes while attacking other machines at the same time. Those teams that are successful in both attacking and fixing holes capture the digital flag and win points in the ongoing process. This competition will take place in conjunction with the annual DEFCON, the longest running annual hacker competition. Before we start thinking that we’re living a modernized version of “Hackers,” there are a few more things to know. First, this is really a battle of software. The final teams were given a DARPA computer to code and must create a software platform to interact with the DARPA database. Once the competition begins, the teams will not be able to intervene if their software fails to see a weakness or is attacked by another team. The goal is to create an artificial intelligence (AI) software that is capable of responding in real-time to potential threats and weakness within its databases.   Wired has added this contest to their radar, saying, “DARPA has gone full Tron. It might feel more like a video game, than a hacking contest, as DARPA has arranged for a visual diagram to be displayed on the big screen, that will show each attack and from what machine the attack came from.” Whether you believe Wired or the other tech experts, this type of machine AI is hoping to turn the tables on the war on cyber safety. Instead of waiting for an attack to strike, DARPA’s intuitive software will attempt to seek out weakness autonomously giving the Defense Department the added edge it needs to prevent leaks in the system. This is another intriguing example of how machine learning is becoming integrated into so many facets of the world at-large. Whether you make your way to Las Vegas to witness the DARPA’s version of CTF or not, that fact is we continue to add more M2M and IoT solutions to our daily lives. It’s only natural we find new ways to have machines assist us.

IoT Evolution Expo 2016 Recap

IoT Evolution Expo invaded Las Vegas this week by taking over Caesars Palace. The conference focus was to be a premier source of information needed to help drive your enterprise forward with the latest in IoT applications. A few of the tracks found this year at IoT Evolution included IoT Security, Fog Computing and IoT Enterprise. Overall this expo gave attendees the chance to listen to various talks and panel discussions, as well as hands-on demos on the exhibitor floor, and evening networking nights with industry experts and peers. Here are some of the posts during the event: Diving into the IoT Evolution sessions, we learn the weakness of our smartphone. Godfrey Chua, analyst at Machina Research, informs us that the smartphone can be a very weak link in IoT and M2M communications when it is used as a remote control. And…IoT Evolution continued with more panel discussions. Yann Kulp, VP SmartSpace North America with Schneider Electric tells us that, the panel with GE, Amazon, US Celluar and Argus Insights offered intriguing updates with the use of Wiser Air in your home and other Wi-Fi IoT applications. FreeWave was fortunate to participate this year on both the Oil and Gas: Pirates and Protection, as well as the Brown Field Round Table: What to do when it’s too late to start again panel discussions. The Pirates and Protection panel give us all a chance to dive deeper into the critical industries and what IoT secure options area available for these remote locations. My second panel of the night with the Brown Field Round Table gave attendees to hear real world case study examples of Sensor-2-Server implementation challenges with blending older SCADA systems with the latest IoT solutions for continuous real-time results.  Time to see an IoT application at work! James Brehm & Associates tried their hand at capturing this IoT conference with virtual reality technology. A new solution from RICOH THETA. The 360 angle is best viewed prior to hitting up Margaritaville. Interesting to see the “Workspaces & IoT” concept discussed as well. Digital workspaces takes center stage at IoT Evolution as Global Workspace Analytics reports 3.7 million U.S. employees now work from home. Cynthia Artin with IoT Evolution informs us that,”while the IoT is arguably taking off faster in more industrial domains (factories, farms, transportation), and has the most “sizzle” in consumer domains (smart homes, smart cars, fitness wearables), there is new energy forming around IoT enhanced offices.” Now as this year’s IoT conference comes to a close, we remember all the ways IoT will change our enterprise and our life this year. One thing is clear, the more we innovate, the more we strive to become more efficient, automated and safety operated within fog computing and cloud applications. We hope you have enjoyed this week’s roundup, as always tells us about your IoT highs and lows.

IIoT + S2S = Industrial Innovation at the Access Layer

The Industrial Internet of Things (IIoT) is moving at a rapid pace towards a higher intelligence platform to help collect, protect, transport and control data at scale from a myriad of sources. The access layer in the IT landscape is now particularly becoming an innovative technology environment with many new sensory solutions available to bring intelligence back to the core systems and analytics engines. Another area to consider when discussing IIoT are the individuals working with these technologies today, tomorrow and in the future. To start, the younger/millennial generation is entering the workforce in droves and is arguably the first generation open to big data integration and as part of IoT application solutions. Now that IT and Operations personnel work closer together than ever before, there is a need to be able to share the sensor data across the access layer. On the other hand, the older generation is trusting of the SCADA data systems they have been using for years, and are slow at first to adapt to the new intelligence created in the access layer. How Does an Enterprise Address this Transition? One strategy is IT/OT convergence, which promotes a single view of an enterprise’s information. Process-management tools help ensure that every person, machine, sensor, switch and device in an organization has accurate information in the best form and at the right time. As OT products—for example, programmable logic controllers (PLCs) and remote terminal units (RTUs)—become more aligned with IT infrastructure and applications, getting OT information integrated efficiently with IT systems at a process level is difficult enough for many companies. Getting IT and OT systems to work together to maximize business efficiency — while avoiding negative consequences, risks and pitfalls in the process —makes the task more challenging. However, thanks to new technologies, this process is becoming more practical and is creating the opportunities for huge economic benefits when these two disciplines are successfully integrated. Evolution of Sensor-2-Server (S2S)  (As described by Brandon Lewis, Technology Editor for IoT Design) S2S architectures define a method for communicating data collected by sensor platforms at the access layer of an IoT network back to servers at other layers, including but not limited to centralized servers in the core network. This type of architecture allows sensor data to be transmitted to points in the network that are best suited to the specific type of analysis, decision making, and control, which in an industrial deployment could be a SCADA controller located at the aggregation layer rather than a mass dump of heterogeneous data from hundreds or thousands of endpoints back to the core network. For critical IoT systems that require real-time or near-real-time analysis of sensor data, this more localized communications can speed decision cycles using data in motion rather than waiting to parse data at rest. Want to Learn More about S2S and the Future of Industrial IoT? For more information and a full discussion on S2S and the future of IIoT, please check out this recent interview with the IoT Roadshow and Scott Allen. You can also listen to the SoundCloud recording below!

ENTELEC 2016 Conference News Roundup

This past week many of you migrated to Houston, Texas for the annual Energy Telecommunications and Electrical  Association Conference (ENTELEC). This user association had around 200 vendors, that mainly focus on control technologies that are used by petroleum, natural gas, pipeline and electric utility companies. In honor of this being the 88th year of ENTELEC, Richard Nation, a fellow board member with Copano Energy gives us a brief history on how this association formed and evolved over the years. Now take a moment and watch this video, its only a few minutes long, so get to watching! A brief history on ENTELEC https://youtu.be/OaSMd2__naQ In case you missed it, we have a full recap here to fill you in on all the happenings at this year’s conference! ENTELEC 2016 started off with a bang, with the keynote address from Carey Lohrenz, the first female F-14 Tomcat Fighter Pilot with the Navy. Carey shared her winning experiences working aboard an aircraft carrier. These tools she explains, can be translated to everyday life in order to reduce error under pressure. Once the conference got under way, the ENTELEC team wanted to remind everyone, “they think you are kind of a big deal.” Inviting everyone to stop by their main booth throughout the conference. The Pipeline & Gas Journal snapped a picture of networking in action, as the communications and control technology experts got a chance to mingle during the opening day of ENTELEC. It was an action-packed conference, filled with speaking, networking, demonstrations and overall knowledge sharing. Hope you have enjoyed this week’s round up; as always tell us what we missed!

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.