In the past, the worlds of IT and OT were separate. The gulf has been rapidly closing as the latest technologies benefit production efficiency and offer greater controls for IT teams to implement vital security standards to ever-more connected devices.
Tag: manufacturing investment
Make Raw Manufacturing Data Make Sense
Data is one of the most valuable assets an operation can acquire for powering continual improvement, but not all data is created equal.
Part 18 – Make the Right decisions in Digital Transformation
With many choices in front of you, the subject of Digital Transformation can be daunting. When considering the associated costs involved, making the right choices in the current economic climate is of paramount importance.
The first and best step you can take is to select a System Integrator (SI) with the correct philosophy, skillset, and partners to consult on your needs and identify your most significant opportunities for future growth and continual improvement.
Continue reading “Part 18 – Make the Right decisions in Digital Transformation”
Part 17 – How Standards Drive Digital Transformation
In the 80s, ISO 9000 (and BS5750 in Britain) came to the fore to create standards for quality management. The standardisation process strove to introduce methods for continual improvement and ensure consistency and quality. As time moved on, throughout the 90s and 00s, standards have been applied to manufacturing settings more and more, beginning with S88, which governs batch control processes, followed by S95, which defines plant structure to support enterprise asset models.
Continue reading “Part 17 – How Standards Drive Digital Transformation”
Part 3 – Mitigating cyber-security threats
In the previous article of the ‘Fit for the future’ series we looked at how to check your level of readiness and begin to map out the first steps to buck the trend to start on a path of innovation which will lead to operational improvement. In this post, entitled, “Mitigating cyber-security threats” we look at the potential threats to your business and how to mitigate them.
Continue reading “Part 3 – Mitigating cyber-security threats”