Author Archive for Craig Resnick

IIoT Enables The Connected Enterprise at Rockwell Automation TechED 2017

Rockwell Automation held its 20th annual TechED (formerly RSTechED) for a record number 2,200 end users, system integrators, distributors, partners and machine builders interested in how IIoT and The Connected Enterprise related solutions can help to, for example, optimize production data, increase yields, reduce energy costs, build secure networks, and ultimately increase revenue and profits. […]

Read More →

IIoT is GE’s Trump Card in Saudi Arabia

One of the key enablers of IIoT is its range and diversity of applications across many industries. So when, for example, the Kingdom of Saudi Arabia, as part of its Saudi Vision 2030 economic diversification plan, wants to move beyond oil & gas and into areas, such as power, healthcare, and mining, IIoT and digital […]

Read More →

Add IIoT to Legacy Automation Assets to Reduce Unscheduled Downtime

One of the most common questions that manufacturers have for the ARC Advisory Group regarding IIoT project justification is can it help to address one of their primary challenges, unscheduled downtime, which is often the number one issue for plants today. Often, one of the causes of a portion of this unscheduled downtime is that […]

Read More →

Can HMI/SCADA Software Be the “On Ramp” to the IIoT Digital Thread

HMI/SCADA software solutions continue to evolve to meet the needs of end users and OEMs as they continue their journey towards the IIoT. Rather than being just a standalone component, the HMI/SCADA platforms are evolving into integrated solutions that help solve end user and OEM problems to improve business performance. Although technological advancement will continue […]

Read More →

Is IIoT a Justification for Automation Modernization

Automation modernization remains one of the major issues faced by manufacturers.  ARC estimates that $65 billion worth of automation systems are nearing the end of their useful life. These estimates are even larger if one includes those installed systems that don’t meet the requirements for cybersecurity protection, or leveraging technologies, such as IIoT, cloud computing, advanced […]

Read More →