IT in Manufacturing


Parker Hannifin’s Industrial Internet of Things platform

Technews Industry Guide: Industrial Internet of Things 2017 IT in Manufacturing

Parker Hannifin has unveiled the Voice of the Machine IoT platform, an open, interoperable and scalable ecosystem of connected products and services. As part of a broader digital transformation, Parker is leveraging 100 years of product and application expertise to build better digital customer experiences.

“From online platforms that enable users to engage with our broad portfolio of products, systems and engineering talent, to global monitoring and asset integrity management services that keep critical systems productive, we are creating better outcomes for our customers,” said Bob Bond, VP eBusiness, IoT and Services. “Our Voice of the Machine offering operates at the sweet spot of our core competency at the component and system level. Parker is creating discrete insights across our broad range of motion and control products that we can then connect to enterprise IoT solutions.”

With the Voice of the Machine platform, Parker is addressing challenges that have prevented operators from fully leveraging IoT to improve safety and prevent unplanned downtime and high maintenance costs across their industrial applications. Some of these challenges include legacy devices that are not IoT-enabled, an absence of component-level insights, and competing communication protocols used by various suppliers.

“Through the Voice of the Machine IoT platform we enable our customers to hear what their assets are saying at a component level so they can improve application performance,” said Miguel Morales, director, Internet of Things. “Parker has 100 years of component and system expertise for motion and control technologies, a prerequisite for unlocking that last mile of safety, reliability and productivity residing within the machines that our products support.”

Parker has adopted a common set of IoT standards and best practices for use across all its operating groups and technologies. Every connected product uses the same repository of digital services with an exchange-based platform architecture designed by software experts at Exosite. The Exosite IoT architecture makes it easy to deploy a diverse set of connected solutions leveraging that same set of digital services and to integrate Parker solutions with other partner platforms.

For more information contact Lisa de Beer, Parker Hannifin (Africa), +27 (0)11 961 0700, [email protected], www.parker.com/za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhancing cyber security for industrial drives
Siemens South Africa IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.

Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.

Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...