We can collect this data, but are we able to get to it? This is key to using equipment information to make informed business decisions that can help lower maintenance costs, optimise production, and reduce support and travel expenses.
Two of ProSoft’s solutions released this year show users how to access the data they need to add value.
Making data-driven decisions
The gateway brings together three major industrial automation protocols – OPC UA, EtherNet/IP, and Modbus TCP/IP. This gateway to the IIoT sends production information to the MES or ERP. From there, it can be acted upon to make the changes necessary to achieve corporate goals. The benefits of analysing equipment information include reduced maintenance, energy and overall operating costs.
The gateway works by enabling fast data transfers from EtherNet/IP and Modbus devices to OPC UA clients, thanks to an OPC UA server connection. The EtherNet/IP and Modbus TCP/IP equipment can also communicate with each other. The gateway enables 10 simultaneous OPC UA sessions, which is ideal for larger applications.
By connecting equipment that use these two protocols to the MES, one takes the first step to streamlined access and analysis of data that can help to optimise resources.
Access historical data
You’re at your desk, it’s almost time to go home, and you find out you need to go on-site for an issue with a piece of equipment. You’re not quite sure what the problem is, and now you’re looking at a later end to the day and hoping you can troubleshoot the issue quickly.
For applications that involve remote access equipment, the data logger avoids costly network enhancements, storing 16 million time-stamped records.
OEMs can also benefit from using the data logger. The module’s records can indicate whether equipment was tampered with or if the maintenance schedule was followed, helping to determine if a warranty claim is valid. Knowledge gleaned from devices can help to improve a company’s Overall Equipment Effectiveness (OEE). Studying how equipment performed in real-time applications can help determine if a design can be tweaked.
Edge I/O NTS and the need for industrial speed Schneider Electric South Africa
IT in Manufacturing
One of the most compelling solutions to emerge from industrial automation is Edge I/O NTS, which represents a natural evolution of computing from centralised servers to localised, device-level input/output processing, offering improved speed, efficiency and resilience.
Read more...The next wave of AI-driven process automation Schneider Electric South Africa
IT in Manufacturing
As process industries hurtle toward an AI-driven future, four powerful trends are set to redefine automation strategies in 2026: hyper automation, AI-first automation, low code/no code platforms, and advanced process intelligence.
Read more...Huge increase in denial-of-service cyber threats
IT in Manufacturing
NETSCOUT has released its Distributed Denial-of-Service Threat Intelligence report, revealing sophisticated attacker collaboration, resilient botnets and compromised IoT infrastructure that drove more than eight million DDoS attacks worldwide.
Read more...Sustainable manufacturing ABB South Africa
IT in Manufacturing
ABB’s production facility in Shandong province, China is delivering measurable energy and emissions reductions through the implementation of advanced digital energy management and electrification solutions.
Read more...Open automation is breaking legacy chains Schneider Electric South Africa
IT in Manufacturing
Industrial automation is now entering a new era defined by open, software-driven principles that are breaking decades of hardware-bound limitations.
Read more...How Bühler SmartMill is shaping the future of milling
IT in Manufacturing
Digitalisation, automation and data-driven decision making are rapidly transforming the global milling industry. The SmartMill concept is helping millers respond to growing operational pressures, tighter margins and increasing quality and compliance.
Read more...The accelerating cyber threat from DDoS-for-hire services
IT in Manufacturing
The accelerating growth of DDoS-for-hire services is empowering a broader range of cyber threat actors, intensifying operational risk to digitally connected organisations and enterprises.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.