IT in Manufacturing


Top automation trends in the era of Industry 4.0

Technews Industry Guide: Industrial Internet of Things & Industry 4.0 IT in Manufacturing

The Fourth Industrial Revolution (Industry 4.0) refers to the current era of convergence between automation and data exchange technologies in manufacturing. The top five trends that will characterise automation technology in this new age of ‘smart factories’ include the Industrial Internet of Things (IIoT), augmented reality (AR), mobile access to machines, reprogrammable robotics and industrial automation security.

The Industrial Internet of Things

Automation, in a broad sense, refers to the integration of mechanical systems with electronics and embedded firmware. It is implemented to facilitate standardised, reliable production systems, effective monitoring, reduced waste and optimised production processes. During the paradigm shift of the digital age, the IIoT will develop these aspects of manufacturing by enabling accessibility to greater amounts of information at greater speeds than were possible before.

The IIoT is the convergence of information technology (IT) and operations technology (OT) systems in ways which give operators access to the information (Big Data) they need to make more informed process related decisions. Big Data mitigates risk and improves efficiency. It builds a connected enterprise to improve productivity and helps workers to develop new skills.

Today’s reality indicates that software, sensors and controls are at times outdated and difficult to upgrade. At the same time, there is limited integration between internal systems (plant data sources) and external systems (ERP). Tomorrow’s vision shows how through communication, sensors and operational technologies will work as an integrated system along with IT. Standard, fast software development techniques will be used to create intelligent industrial products in a common sensing and control architecture. Research indicates that these improvements in the industrial sector could yield revenue growth of up to 70% and an improvement in workforce productivity of up to 30%.

Remote access to machines

Building Android and Windows apps are some considerations for mobile access. Waiting for a third party to develop an app for a mobile device could take time, and if not skilfully coded, the result could be poor performance. Factors like time, complexity and expense result in a native mobile version of the app to be more productive, thereby optimising this process. At times a single device sacrificing performance is optimised to run the app on a website geared for several mobile devices. In terms of IIoT, the Siemens WiFi ETH-MPI DP S7-300 Ethernet communication adaptor module CP343/ 5611 can be incorporated with the S7-1500, S7-1200 and ET 200SP controllers or S7-1500 and ET 200SP CPUs running V1.8 firmware or S7-1200 running V3.0 firmware, to facilitate mobile access.

Augmented reality

Augmented reality is the real-time integration of digital information into the user’s environment. Unlike virtual reality, AR uses the existing environment and overlaps new information, by written application, in special 3D programs. AR applications incorporate GPS, machine vision, and object and gesture recognition technologies. An AR system provides a mixture of real and virtual images in the user’s interface unit, e.g. a cellphone. The objects of the real world observed by the user are sent to a processing system, e.g. a computer, which generates the virtual object. The real and virtual objects are synchronised in a way that produces a perception of observing a common graphical representation. The type of industrial system determines the approach to be used in terms of the resultant output. Displays, monitoring systems, interaction devices and computer systems are the primary components of AR. The display is crucial to provide a representation of the system. Accurate location in real-time is the responsibility of the monitoring system, which aligns the virtual and real objects. The interactive device provides a physical interface for the user whilst the computer system is responsible for generating the virtual objects.

Problems and related solutions

• An adjustment must be made to a machine: visually direct workers to the adjustment port.

• Worker is in an unfamiliar environment: provide contextual visual instructions.

• Worker spends time searching for data on equipment they are repairing: identify the equipment and display the data.

• Technical resources are required to evaluate an unplanned incident: provide communication tools and a real-time ‘snap shot’ of the equipment.

Reprogrammable robotics

The primary driver for manufacturers is the need to embrace automation to remain commercially competitive. Automation can be extremely cost-effective on a scale from SMMEs to large factories. In terms of flexibility, manufacturing processes can be adapted to different options from a single product in a given operation, e.g. a two-position gripper functions on two axes to offer flexibility and rigidity. Robotic effectors adapt to different sizes, shapes and textures to offer optimal performance and introduce cells or modules to facilitate flexibility, e.g. incorporate a ‘pick-and-place’ function but keep the remaining line unchanged. There is no waiting time for operators as the robot is programmed to perform basic repetitive operations, and can be reprogrammed to perform intermediary ones. In the long term, robots are less expensive than manual labour and can be programmed for specific tasks and then reprogrammed to change tasks, thereby increasing accuracy and preventing bottlenecks. A 2014 survey by PWC and Zpryme showed that 27% of respondents planned to implement robotics in assembly processes, 26% in machining, 22% in dangerous tasks and 16% in warehousing, within the next three years.

Industrial automation security

Alongside all the potential benefits offered by Industry 4.0, industrial automation security is one of the biggest challenges. Manufacturers will have to remain vigilant as their networks permeate down from the top floor to the shop floor. Any new device on the network is a potential access point for hackers and this will need to be addressed without compromising the high resiliency required by OT or the interconnectivity and compliance required by IT.

Viable new security models must be developed to work with both new and existing systems. In terms of security threats: remote code execution (RCE) vulnerabilities enable arbitrary code to be remotely executed in a target system; denial of service (DoS) vulnerabilities enable DoS attacks to be carried out remotely; code injections include vulnerabilities that enable SQL additions to be performed remotely. File manipulations enable various file operations to be performed remotely, while user access account manipulation enables attacks on legitimate user data to be performed remotely. In addition, ageing operating systems and vulnerable technologies add to the posed security risks.

For more information contact Prof. Ralph Naidoo, Department of Electrical Engineering, Mangosuthu University of Technology, Durban, +27 (0) 31 907 7426, pnaidoo@mut.ac.za





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Green IT practices: cutting costs while saving the planet
IT in Manufacturing
Sustainable IT practices are proving that companies can reduce their carbon footprint and operating costs simultaneously. The financial benefits are significant, offering a promising outlook for businesses.

Read more...
Coolant distribution unit for high-density data centres
Schneider Electric South Africa IT in Manufacturing
Motivair by Schneider Electric has introduced a new, industry-leading 2,5 MW coolant distribution unit designed to cool high-density data centres reliably and at scale.

Read more...
Data protection is the first line, recovery is the lifeline
IT in Manufacturing
Many businesses only realise the importance of data protection after experiencing system failures or data loss. The 3-2-1-1 backup model is a proven approach for safeguarding data.

Read more...
Cyber resilience moves from IT issue to board risk
IT in Manufacturing
Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely.

Read more...
Cybersecurity in South Africa
IT in Manufacturing
For cyber risk in South Africa the question is not ‘if’ but ‘when’.

Read more...
Sustainable aviation fuel
Siemens South Africa IT in Manufacturing
Siemens and the cleantech company CAPHENIA have entered a partnership to scale the production of sustainable aviation fuel.

Read more...
Using AI to solve South Africa’s biggest challenges
IT in Manufacturing
Unlike global superpowers that invest heavily in sheer compute capacity, South Africa doesn’t need to be the largest computing market to lead in innovation. What matters today is how we apply computing to accelerate insight, discovery and socio-economic progress.

Read more...
Unearthing AI’s real value in African mining
IT in Manufacturing
At Mining Indaba 2026, where miners and technology innovators explored how partnerships are turning AI’s potential into meaningful operational impact. For Siemens, the answer begins with a clear-eyed view of what AI can and cannot do, and a commitment to deploying it where it matters most - keeping people safe.

Read more...
Digital innovations reshaping the future of mining in Africa
IT in Manufacturing
Africa’s mining sector is stepping into a new era, driven by the accelerating pace of digital transformation. Digital tools are making operations smarter, safer and more efficient, laying the groundwork for a more competitive and sustainable industry.

Read more...
Siemens drives next-generation vehicle development
Siemens South Africa IT in Manufacturing
The Siemens PAVE360 Automotive technology is a new category of digital twin software that is pre-integrated and designed as an off-the-shelf offering to address the escalating complexity of automotive hardware and software integration.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved