IT in Manufacturing


Industrial considerations for BYOD

May 2013 IT in Manufacturing

With the ‘Bring Your Own Device’ (BYOD) trend beginning to gain a toe-hold in the process industries, plant managers and IT groups are taking note. Not only do they have legitimate security concerns but, in refineries, chemical plants, mines, and other industrial facilities with hazardous areas, the field devices must be certified to operate in those environments; a requirement that excludes most consumer devices.

Mobility is the core value proposition of BYOD. Mobile computing is rapidly becoming the normal use-case for enterprise IT, rather than the exception. In the plant, most workers already own their personal mobile devices, which they often prefer to use. And in every industry workers dislike mandates forcing them to carry multiple devices.

Ubiquitous wireless Internet access enables BYOD. Carrier cellular coverage saturated the strategic areas in developed economies many years ago. However, in recent years, carriers have rolled out higher capacity, 4G networks capable of much greater data rates to support the growing numbers of smartphones served by their networks. These service levels compare well with what was provided by wire line enterprise networks only recently.

The huge volume of the consumer market has also revolutionised the price/performance of smart devices, especially smartphones. At the same time, there has been a convergence of the networks and platforms. Most smartphones support LTE carrier networks, Wi-Fi and Bluetooth local networking, and GPS. There has been a huge convergence in terms of operating platforms toward Android and iOS, with the former champions BlackBerry and Symbian both on the ropes and Windows volumes remaining almost invisible.

For industrial service, smartphones, tablets, and other mobility devices require enhanced ruggedness, hazardous location certification, and in some cases, dedicated higher performing interfaces for barcode scanning or other job-specific capabilities.

Management is now the biggest challenge

While ubiquitous connectivity and technological convergence have enabled the BYOD trend, it has been constrained by the limited capability of enterprises to manage the more complex demands represented by mobile consumer devices operating within the enterprise.

Like all management, network management involves the allocation of resources according to policies and rules in pursuit of enterprise objectives. Effective network management balances a number of objectives. One of these is to improve cost behaviour. Enterprise TCO will scale well when network management reduces the labour intensiveness of network operation as the network grows. But TCO is only one of the attributes of BYOD requiring management attention.

Other major factors are:

Policy – Organisations need to make policy decisions at the outset of BYOD. These decisions include a set of supported devices and platforms, (BYOD does not mean the same thing as bring ANY device). Likewise, a set of carriers must be selected and rules developed for network selection when multiple networks are available. A set of applications must be supported. Finally, the policies for cost sharing between employees and the enterprise need to be developed, with a view toward keeping the rules simple and comprehensible, yet comprehensive.

Device management – Dozens of companies offer solutions for mobile device management. This includes provisioning, configuring, and updating devices, and deactivating devices as they are retired as well as protecting/destroying (‘zapping’) the content on devices that are lost or stolen. Some level of security and protection from malware is involved. Billing and network policies need to be implemented. These solutions can come from either the carrier or from a third-party enterprise solution.

Mobile application management – Effective mobile application management is critical because the apps come from multiple sources. Besides managing the set of supported applications, distribution of apps must be managed via the major online stores or other means.

Mobile identity management – For BYOD, identity management requires more rigorous authentication, authorisation and accounting (AAA). Enterprises need an architecture for distributed systems that enables control over user access to services and resources. Multifactor user authentication is just the first step.

Mobile information management – The coexistence of enterprise and personal data on the same device is drawing attention to the concept of managing device data through various means such as tracking, sandboxing, encryption, and automated data timeouts.

Mobile expense management – This consideration is non-technical, but nevertheless a pain point for real-world implementations. Enterprises can hardly expect service providers to manage their costs optimally. They have to implement their own policies based on both cost and technical considerations.

BYOD in industry

One of the biggest challenges with respect to BYOD is that it puts enterprise IT onto the fastest of fast-paced consumer electronics platforms. This presents management challenges for the IT organisation as well as third-party software firms. The rapid churn in consumer electronics is a barrier to device certification for hazardous service. The certification process can take up to two years and by the time it is completed, a consumer device is likely at the end of its product life. Unless the certification process can be speeded up, this will remain a serious barrier. Repackaging of smart devices for extra ruggedness is generally available immediately. Also, due to the platform convergence, industrial versions of smart devices can be developed at more favourable price/volume tradeoffs than was possible with past handheld platforms. Examples of these new products are reaching the market now.

For more information contact Paul Miller, ARC Advisory Group, +1 781 471 1126, pmiller@arcweb.com, www.arcweb.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing brownfield plants back to life
Schneider Electric South Africa IT in Manufacturing
Today’s brownfield plants are typically characterised by outdated equipment and processes, and face challenges ranging from inefficient operations to safety hazards. However, all is not lost, as these plants stand to gain a lot from digitalisation and automation.

Read more...
Generative AI for immersive real-time visualisation
Siemens South Africa IT in Manufacturing
Siemens will deepen its collaboration with NVIDIA to help build the industrial metaverse.

Read more...
Award-winning Gen AI solutions
IT in Manufacturing
Amazon Web Services recently hosted an exclusive event in South Africa on ‘Elevating Possibilities with Partners - a Showcase of GenAI Excellence’. This event brought together ten esteemed partners, including Synthesis Software Technologies, to highlight innovative advancements in the field of Generative AI.

Read more...
AI is driving data centres to the edge
Schneider Electric South Africa IT in Manufacturing
The data centre has become the cornerstone that links our digitally interconnected world. At the same time, the rapid growth and application of AI and machine learning (ML) is shaping the design and operation of data centres.

Read more...
Full-scale central control room simulator
Valmet Automation IT in Manufacturing
Valmet will deliver a full-scale central control room simulator to Nordic Ren-Gas, the leading Nordic green hydrogen and e-methane developer in Finland.

Read more...
Re-imagining business operations with the power of AI
IT in Manufacturing
inq. has introduced a range of artificial intelligence solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Safe, sustainable cycling helmet technology
Siemens South Africa IT in Manufacturing
Lazer Sport, one of Europe’s leading cycling helmet manufacturers, has adopted the Siemens Xcelerator portfolio of industry software to bring to market KinetiCore, its new proprietary rotational impact protection technology.

Read more...
Defending against modern-day cyber threats
IT in Manufacturing
The anatomy of cyber threats has changed, meaning that organisations can no longer rely on traditional cybersecurity solutions to protect their perimeter, but should instead rethink their data protection strategy and become proactive in their defence against breaches.

Read more...
Data centre sector 2024 market outlook
IT in Manufacturing
As the world adapts to the digital transformation of almost every aspect of everyday life, the data centre sector, which plays such a pivotal role in digitalisation, is constantly evolving.

Read more...
Reinventing the workforce in the age of generative AI
IT in Manufacturing
Generative AI has burst onto the scene. It appeared fast, and is evolving even faster. Its impact on value chains will fundamentally transform the nature of work, reshaping how businesses deliver value, and delivering better experiences for employees and customers.

Read more...