IT in Manufacturing


Industrial considerations for BYOD

May 2013 IT in Manufacturing

With the ‘Bring Your Own Device’ (BYOD) trend beginning to gain a toe-hold in the process industries, plant managers and IT groups are taking note. Not only do they have legitimate security concerns but, in refineries, chemical plants, mines, and other industrial facilities with hazardous areas, the field devices must be certified to operate in those environments; a requirement that excludes most consumer devices.

Mobility is the core value proposition of BYOD. Mobile computing is rapidly becoming the normal use-case for enterprise IT, rather than the exception. In the plant, most workers already own their personal mobile devices, which they often prefer to use. And in every industry workers dislike mandates forcing them to carry multiple devices.

Ubiquitous wireless Internet access enables BYOD. Carrier cellular coverage saturated the strategic areas in developed economies many years ago. However, in recent years, carriers have rolled out higher capacity, 4G networks capable of much greater data rates to support the growing numbers of smartphones served by their networks. These service levels compare well with what was provided by wire line enterprise networks only recently.

The huge volume of the consumer market has also revolutionised the price/performance of smart devices, especially smartphones. At the same time, there has been a convergence of the networks and platforms. Most smartphones support LTE carrier networks, Wi-Fi and Bluetooth local networking, and GPS. There has been a huge convergence in terms of operating platforms toward Android and iOS, with the former champions BlackBerry and Symbian both on the ropes and Windows volumes remaining almost invisible.

For industrial service, smartphones, tablets, and other mobility devices require enhanced ruggedness, hazardous location certification, and in some cases, dedicated higher performing interfaces for barcode scanning or other job-specific capabilities.

Management is now the biggest challenge

While ubiquitous connectivity and technological convergence have enabled the BYOD trend, it has been constrained by the limited capability of enterprises to manage the more complex demands represented by mobile consumer devices operating within the enterprise.

Like all management, network management involves the allocation of resources according to policies and rules in pursuit of enterprise objectives. Effective network management balances a number of objectives. One of these is to improve cost behaviour. Enterprise TCO will scale well when network management reduces the labour intensiveness of network operation as the network grows. But TCO is only one of the attributes of BYOD requiring management attention.

Other major factors are:

Policy – Organisations need to make policy decisions at the outset of BYOD. These decisions include a set of supported devices and platforms, (BYOD does not mean the same thing as bring ANY device). Likewise, a set of carriers must be selected and rules developed for network selection when multiple networks are available. A set of applications must be supported. Finally, the policies for cost sharing between employees and the enterprise need to be developed, with a view toward keeping the rules simple and comprehensible, yet comprehensive.

Device management – Dozens of companies offer solutions for mobile device management. This includes provisioning, configuring, and updating devices, and deactivating devices as they are retired as well as protecting/destroying (‘zapping’) the content on devices that are lost or stolen. Some level of security and protection from malware is involved. Billing and network policies need to be implemented. These solutions can come from either the carrier or from a third-party enterprise solution.

Mobile application management – Effective mobile application management is critical because the apps come from multiple sources. Besides managing the set of supported applications, distribution of apps must be managed via the major online stores or other means.

Mobile identity management – For BYOD, identity management requires more rigorous authentication, authorisation and accounting (AAA). Enterprises need an architecture for distributed systems that enables control over user access to services and resources. Multifactor user authentication is just the first step.

Mobile information management – The coexistence of enterprise and personal data on the same device is drawing attention to the concept of managing device data through various means such as tracking, sandboxing, encryption, and automated data timeouts.

Mobile expense management – This consideration is non-technical, but nevertheless a pain point for real-world implementations. Enterprises can hardly expect service providers to manage their costs optimally. They have to implement their own policies based on both cost and technical considerations.

BYOD in industry

One of the biggest challenges with respect to BYOD is that it puts enterprise IT onto the fastest of fast-paced consumer electronics platforms. This presents management challenges for the IT organisation as well as third-party software firms. The rapid churn in consumer electronics is a barrier to device certification for hazardous service. The certification process can take up to two years and by the time it is completed, a consumer device is likely at the end of its product life. Unless the certification process can be speeded up, this will remain a serious barrier. Repackaging of smart devices for extra ruggedness is generally available immediately. Also, due to the platform convergence, industrial versions of smart devices can be developed at more favourable price/volume tradeoffs than was possible with past handheld platforms. Examples of these new products are reaching the market now.

For more information contact Paul Miller, ARC Advisory Group, +1 781 471 1126, [email protected], www.arcweb.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Unlocking mining efficiency with advanced processing control
IT in Manufacturing
ABB’s Advanced Process Control system, powered by its Expert Optimizer platform, is emerging as a key enabler of smarter, more efficient mining operations.

Read more...
Open control technology reduces energy consumption and carbon footprint.
Beckhoff Automation IT in Manufacturing
The Swedish company Airwatergreen AB is breaking new ground in the dehumidification of air in industrial buildings and warehouses. PC-based control from Beckhoff regulates the innovative process.

Read more...
Harnessing AI and satellite imagery to estimate water levels in dams
IT in Manufacturing
Farmers and water managers often struggle to accurately estimate and monitor the available water in dams. To address the challenge, International Water Management Institute researchers have worked with Digital Earth Africa to create an innovation that uses satellite images and AI to get timely and accurate dam volume measurements.

Read more...
Why industry should enter the world of operator training simulators
Schneider Electric South Africa IT in Manufacturing
System-agnostic operator training simulator (OTS) software is a somewhat unsung hero of industry that trains plant operators in a virtual world that mirrors real-world operations. The benefits are multiple.

Read more...
Track busway for scalable data centre power delivery
IT in Manufacturing
The latest generation Legrand Data Centre Track Busway technology addresses the operational pressures facing today’s high-density, AI-intensive computing environments and is being well received by data centre facilities around the world.

Read more...
Poor heat management in data centre design
IT in Manufacturing
Designing a world-class data centre goes beyond simply keeping servers on during load shedding; it is about ensuring they run efficiently, reliably, and within the precise environmental conditions they were built and designed for.

Read more...
It’s time to fight AI with AI in the battle for cyber resilience
IT in Manufacturing
Cybercrime is evolving rapidly, and the nature of cyber threats has shifted dramatically. Attacks are now increasingly powered by AI, accelerating their speed, scale and sophistication. Cybersecurity needs to become part of business-critical strategy, powered by AI to match attackers’ speed with smarter, faster and more adaptive defences.

Read more...
Why AI sustainability must be a boardroom priority
IT in Manufacturing
As South African companies race to harness artificial intelligence for innovation and growth, few are asking the most critical question - the environmental cost.

Read more...
RS South Africa shines spotlight on MRO procurement
RS South Africa IT in Manufacturing
RS South Africa has highlighted the growing pressures faced by procurement professionals responsible for maintenance, repair and operations supplies across the country’s vital economic sectors.

Read more...
Sustainable energy management
Siemens South Africa IT in Manufacturing
Utilising its innovative ONE approach technology, Siemens provides complete transparency on resource consumption and offers data-driven optimisation recommendations for sustainable energy management.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved