首頁(yè) > 計(jì)算機(jī)網(wǎng)絡(luò) >
編程語(yǔ)言與程序設(shè)計(jì)
> Architecting the Industrial Internet最新章節(jié)目錄
舉報(bào)

會(huì)員
Architecting the Industrial Internet
最新章節(jié):
Chapter 11
ArchitectswhoareinterestedinlearninghowtodefinesolutionsfortheIndustrialInternetwillbenefitimmenselyfromthisbook.Relevantarchitectrolesincludeenterprisearchitects,businessarchitects,informationarchitects,cloudsolutionarchitects,softwarearchitects,andothers.Thecontentisalsorelevantfortechnicallyinclinedlineofbusinessleadersinvestinginthesesolutions.
目錄(262章)
倒序
- cover
- Title Page
- Copyright
- Architecting the Industrial Internet
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- The Industrial Internet Revolution
- How today's Industrial Internet came about
- Earlier generations of the Industrial Revolution
- Why is it time for the Industrial Internet?
- Challenges to IIoT
- The architect's roles and skills
- Architectural approaches for success
- Reference architectures for the Industrial Internet
- The multi-tier IIoT architecture
- A security framework for the Industrial Internet
- A connectivity framework for the Industrial Internet
- The industrial data analytics framework
- Cloud and user experience considerations
- Business strategy framework for the Industrial Internet
- Summary
- Architectural Approaches for Success
- Architectural framework
- Architectural viewpoints
- Business viewpoint
- Security considerations for the business viewpoint
- Usage viewpoint
- Security considerations for the usage viewpoint
- Functional viewpoint
- Control domain
- Operations domain
- Information domain
- Application domain
- Business domain
- Cross-cutting functions and system characteristics
- Computational deployment patterns
- Security considerations for the functional viewpoint
- Implementation viewpoint
- Security considerations for the implementation viewpoint
- Data and analytics
- Data management
- Analytics and advanced data processing
- Integrability interoperability and composability
- Connectivity
- Intelligent and resilient control
- Dynamic composition and automated interoperability
- Using PoCs to evaluate design
- Scope definition
- Business case considerations
- Solution definition
- Building the PoC
- Prototype scale
- Evaluate/modify
- Production scale
- Architecture
- Components
- Continuing engineering
- Summary
- Gathering Business Requirements
- Initial business discovery
- Getting ready for business discovery
- Gathering CSFs
- Gathering KPIs
- From data sources to KPI delivery
- Prioritizing the building of solutions
- Building the business case
- Components of backend infrastructure cost models
- Smart device and networking costs
- Estimating implementation costs
- Documenting future benefits
- Financial justification of our supply chain project
- Selling the project
- Summary
- Mapping Requirements to a Functional Viewpoint
- The control domain
- Basic edge device capabilities
- Smarter edge device configurations
- Selecting sensors and edge devices
- The supply chain optimization control domain
- The operations domain
- The information domain
- Solving information domain functional requirements
- A supply chain optimization information domain
- The application domain
- Assessing business analysts and user skills
- The supply chain optimization application domain
- The business domain
- DevOps and the agile movement
- Agile approaches
- Using microservices and containers to speed DevOps
- Summary
- Assessing Industrial Internet Applications
- Architecture patterns for the Industrial Internet
- Build versus buy decisions
- Asset Performance Management (APM)
- Assessing the analytics applications
- Descriptive analytics
- Diagnostic analytics
- Predictive analytics
- Prescriptive analytics
- Fit gap analysis
- Brilliant Manufacturing
- Field Service Management (FSM) application
- Summary
- Defining the Data and Analytics Architecture
- Data and analytics requirements and capabilities
- Data reduction and analytics
- Publish and subscribe
- Query
- Storage persistence and retrieval
- Integration
- Description and presence
- Data framework
- Rights management
- Creating business value
- Analytics functionality
- Mapping analytics architecture to reference architecture
- Advanced analytics
- The Lambda architecture and IIoT
- Analytics machine learning and analyst tools
- A process for advanced analytics creation
- Machine learning tools
- Other analyst tools
- Early Industrial Internet applications and historians
- The speed layer and field gateways
- The batch layer
- Data lakes and Hadoop
- Graph database
- Data warehouses data marts and relational databases
- Supply chain optimization in the batch layer
- Summary
- Defining a Deployment Architecture
- Current state of deployment architectures for IT systems
- Hosted systems and the cloud
- Hosted services
- Single-tenant hosting
- Multi-tenancy
- Cloud computing
- Public cloud
- Private cloud
- Hybrid cloud
- Billing
- Enterprise Resource Planning (ERP)
- Considerations for SaaS cloud versus on-premises
- Customer Relationship Management (CRM)
- Human Resource Management Systems
- Data warehousing and big data
- Data warehouse and decision support
- Management considerations for data warehouse
- Big data
- Hadoop file systems
- Data lakes
- Management considerations for data lakes
- Big data analytics and data science
- Converged infrastructure and engineered systems
- Deployment considerations
- IIoT constraints
- Incremental upgrades
- On-premises versus cloud
- Consumption models
- Analytics capacity considerations
- Analytics considerations
- Key constraints in analytics architecture design
- Design for the edge tier
- Networking considerations
- Connectivity transport layer
- Network layer consideration
- Topology
- Edge connectivity
- Management and support infrastructure
- Summary
- Securing the Industrial Internet
- Examples of cybersecurity attacks
- IIoT security core building blocks
- NIST cybersecurity frameworks
- IIoT security guidelines
- Securing devices and the edge to the cloud gateway
- Device considerations
- Device to gateway connections
- Securing the backend
- Data lake security
- Securing other NoSQL databases
- Data warehouse security
- Risk assessments and best security practices
- Planning for security in the supply chain example
- Summary
- Governance and Assuring Compliance
- Assessing governance risk and compliance
- Data governance
- Assessing risk and trustworthiness
- International compliance certifications
- International consortia and emerging standards
- Government and public institution compliance
- Non-U.S. government standards and certifications
- U.S. government standards
- Industry compliance certifications
- Which guidelines apply
- GRC in the supply chain optimization example
- Summary
- Industrial Internet Use Cases in Various Industries
- Use cases versus case studies
- Use cases within industry vertical
- Use cases in agribusiness
- Use cases in alternative energy and environmental control
- Use cases in construction
- Use cases in logistics and transportation
- Use cases in manufacturing and CPGs
- Use cases in oil and gas
- Use cases in pharmaceuticals medical equipment and healthcare
- Use cases in utility companies
- Manufacturing IIoT architectures and examples
- A manufacturing test bed
- Factory operation visibility and intelligence
- Omnichannel initiatives
- Predictive maintenance
- Airline industry background
- Airline proactive and preventive maintenance
- Preventive maintenance as a business
- Asset tracking and handling
- Baggage and cargo handling
- Expanded baggage-handling services
- Tracking tools in manufacturing and construction
- Chemical industry automated tracking and replenishment
- Environmental impact and abatement
- Summary
- A Vision of the Future
- Maturing IIoT frameworks and applications
- Evolving edge devices
- The evolution of networking
- Cognitive and mixed reality HMIs and deep learning
- The impact on robotics and mobile devices
- Improved security through blockchain technology
- Quantum computing
- The Industrial Internet's impact on society
- Summary
- Sources
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11 更新時(shí)間:2021-07-03 00:00:05
推薦閱讀
- JSP網(wǎng)絡(luò)編程(學(xué)習(xí)筆記)
- 企業(yè)級(jí)Java EE架構(gòu)設(shè)計(jì)精深實(shí)踐
- 構(gòu)建移動(dòng)網(wǎng)站與APP:HTML 5移動(dòng)開發(fā)入門與實(shí)戰(zhàn)(跨平臺(tái)移動(dòng)開發(fā)叢書)
- Network Automation Cookbook
- Python高級(jí)編程
- Python 3網(wǎng)絡(luò)爬蟲實(shí)戰(zhàn)
- HDInsight Essentials(Second Edition)
- Python編程:從入門到實(shí)踐
- 編程菜鳥學(xué)Python數(shù)據(jù)分析
- Programming with CodeIgniterMVC
- Java EE企業(yè)級(jí)應(yīng)用開發(fā)教程(Spring+Spring MVC+MyBatis)
- Mastering AWS Security
- PHP Microservices
- Java EE項(xiàng)目應(yīng)用開發(fā)
- 零基礎(chǔ)學(xué)Java(第5版)
- C語(yǔ)言程序設(shè)計(jì)實(shí)驗(yàn)指導(dǎo)
- JavaScript高級(jí)程序設(shè)計(jì)(第4版)
- Python實(shí)戰(zhàn)指南:手把手教你掌握300個(gè)精彩案例
- Instant JRebel
- Expert Angular
- 15天學(xué)會(huì)JavaScript(視頻教學(xué)版)
- Python快速編程入門
- Pentaho Analytics for MongoDB Cookbook
- Java核心技術(shù)卷I基礎(chǔ)知識(shí)(原書第9版)
- Python深度學(xué)習(xí)實(shí)戰(zhàn):基于TensorFlow和Keras的聊天機(jī)器人以及人臉、物體和語(yǔ)音識(shí)別
- Responsive Web Design with HTML5 and CSS3 Essentials
- 三菱FX/Q系列 PLC工程實(shí)例詳解
- C#程序設(shè)計(jì)教程
- Android Studio 2 Essentials(Second Edition)
- 深入淺出Java編程