22
Rise of Machines: How Industrial Equipment Can Join the Supply Chain David Miller, CSO, Covisint

Rise of Machines: How Industrial Equipment Can Join the Supply Chain

Embed Size (px)

Citation preview

Rise of Machines: How Industrial

Equipment Can Join the Supply ChainDavid Miller, CSO, Covisint

Covisint Evolution

201420112010200920082007200620052004200320022001

Compuware

acquires

Covisint

Deploys

platform in

healthcare

industry

2000

BORN: $500M investment in core

platform CONSORTIUM: GM, Ford,

Chrysler, Nissan, Renault and

Peugeot

Adds APAC Office:

Shanghai, China

Deploys platform in

oil & gas industry

Deploys platform across global

automotive supply chain –

largest B2B exchange in world

Platform positioned

strategically to capitalize

on cloud and IOT surge

Continual investment in core

platform – enhancing IDM

capabilities, and implementing

mobile and analytic technologies –

continuous modernization of

platform

2012

BORN OF THE BUBBLE LEADER IN THE CLOUD

Over 14 Years of Innovation and Investment

2013 2015

Enterprise-class Cloud Platform

Proven at Scale

3,000+

212K+

22M+

4B+

$1T+

Global Customers

Connected Organizations

User Identities

Yearly Transactions

In Transacted Business

Source: Cisco In 2008, the number of connected

things to the internet exceeded the

number of people on earth

CONNECTED “THINGS”

MOVEMENT TOWARD

CONNECTED WORLD

• It started with CE

• Quickly led to Connected:

o Automobiles

o Healthcare

o Homes

o Energy

o Manufacturing

o Industries

o Society

Connected” is much bigger than

automotive

• Connected Automotive is part

of the “Connected World”

• Connected is a new way

of life

CONNECTED MANUFACTURING…

70%US Factories

More than

20 Years Old

Cost of

unplanned

downtime

$20 Billion

Technical Skills Needed:

Shows in Job Openings

42%Advanced

STEM skills

STEM Job

Openings

Are In Manufacturing

2/3

Job Openings

STEM skills

62%

EXPECTATIONS

What’s Expected…

• Easy

• Fast – Instant service

• Relevant

• Remove hassles

• Add value

What You Get…

• Complex set up and use

• Delays and follow-up

• Disconnected communication

• More hassles

• Limited value

HOW CAN SUCH EXTENSIVE

CONNECTIVITY BE ACHIEVED?

Worker

GatewayInteroperability Platform

Inventory

Portal

Scheduling

Portal

Call

Center

Quality

Portal

Employee

Websites

3rd Party

Supplier

OEM

Connected

Manufacturing

Network

User

Data

Telematics

Data

Identity Management Services

(Cloud)

Modular Business Logic

Framework

Content Management System

Portal Platform

Authorization

Services

Identity

ProviderIdentity

Broker

API

Services

API

Services

(API Mgt.,

Data

Integration,

Web

Service)

Applications

Applications

Service

Service

Logistics

Mgt.

Systems

Enterprise

Applications

Call

Center

CRM

Applications

Sensors

Security

Plant

Phone

Communication ArchitectureAutonomous and Connected Manufacturing

SECURE INTEROPERABILITY

FRAMEWORK

Personalization

• User

Preferences

• Lifestyle

Preferences

• Radio Presets

• Travel

Unlimited

Triggers

• Location

• Speed

• Sensors

• Database (Status Updates, Profiles, etc.)

• Time

• Rules

Access

Management

• SSO

• Trust and Federation

• Identity Management

• Security Auditing

• Tokens

• PKI

• Monitoring

Identity

Lifecycle

• User mgt.

• Credential Mgt

• Identity

Integration

• Provisioning

Deprovisioning

Unlimited Content

Integration

• User Generated

• Social Networks

• Ecommerce

• Corporate

• Collaboration

• Others…

“CLOUD”

CONNECTED IDENTIFY

SECURITY CLOUD

ENERGY INDUSTRY

SUPPLY CHAIN INDUSTRY

SUPPLY CHAIN INDUSTRY

SUPPLY CHAIN INDUSTRY

HOW WILL WE GET THERE?

• Intelligent loading bays track trucks in transit

• Complex production schedules get laid out automatically

• Outbound carriers are automatically alerted about when to schedule a pickup

• Replacement orders are automatically placed when a retail store’s inventory levels drop below a certain number

1. Complexity builds exponentially

2. More endpoints, greater vulnerability

3. Privacy jeopardized more by each transaction

4. Adding or removing “things” is risky

5. Setup for self-destruction as data mounts

WHAT ARE THE CHALLENGES?

BEST PRACTICES

CLOUD COMPUTING

Trust – but Verify Don’t Shun the “tion’s”:

Personalization,

Communication,

Integration,

Presentation,

Collaboration…

Less lines are

better

A Closed Cloud is a

Dead-End Cloud

1 2 3 4

Trust – but Verify Don’t Shun the “tion’s”:

Personalization,

Communication,

Integration,

Presentation,

Collaboration…

Less lines are

better

A Closed Cloud is a

Dead-End Cloud

1 2 3 4

Trusted Information to the right person at the right place and time requires:

1. Identifying the right person or device/thing

2. Present all of the information in an easily consumable manner

no matter the device

3. Making it fast to connect people, place and things to the ecosystem

4. Allowing any technology to connect

BEST PRACTICES

CLOUD COMPUTING

B2B CLOUD PLATFORM

Automobile

Automobile

Mobile

Computer

Tablet

AppCloud

Public Cloud

Secure Cloud

Information from

Anywhere

One secure,

personal experience

Database

Presented

On Any Device

Module Communication

Framework

• Data and Application

Aggregation

• De-couples presentation

layer from business logic

and integration layer

• Communication and

Syndication

• Social Enterprise and

Collaboration Sites

• Connected Device

Aggregated and

Transformed

SUMMARY

• Complexity for connected things will continue to increase

• This isn’t the future we are here today

• Access will vary by device, brand, manufacturer

• Time consuming to set connections up today

• Enterprises are looking for “ease of use” and “speed to value”

• Organizations who adopt “cloud-based” connected device programs will win over their competitors

GETTING STARTED

Kicking Off The Initiative: 1. Identify starting points for fully connecting your supply chain

2. Mobilize and connect key supply chain processes and functional groups within your organization

3. Put in place a robust infrastructure for security and identity management that you can subsequently build upon and scale out as needed

4. Go after the low hanging fruit and promote the successes

5. Once your room is in order, you can then tackle the house, the neighborhood, and even the world

6. The machines will be there waiting for you - now it’s time to get them to earn their way

THANK YOU!

www.covisint.com

Email: [email protected]

Twitter: @IMDaveMiller