5G: The carrier-grade digital infrastructure for the software-defined factory of the future

| September 9, 2019

article image
5G is expected to be a critical enabler of the Smart Factory. What is the smart factory?  In simple terms, it is the aspirational concept of a digitally transformed factory or warehouse. It is a cyber-physical ecosystem of virtualized and connected assets, people, and processes that constitute the manufacturing platform of the 4th industrial revolution that is Industry 4.0. 5G is poised to bring revolutionary connectivity and communications capabilities to the Smart Factory that are expected to enable new wireless applications realized through the familiar ITU 5G use cases: Ultra-Reliable Low Latency Communications (URLLC). Enhanced Mobile Broadband (eMBB). Massive Machine Type Communications (mMTC). One of the great expectations of 5G is that it will bring a new level of flexibility to the shop floor of a Smart Factory, allowing a growing number and range of mobile autonomous robots and vehicles to safely operate and coexist with humans in a manufacturing environment.

Spotlight

2BSecure@MATRIX

2Bsecure Ltd. is part of Matrix ltd. since 2013. 2Bsecure is a leader in Information Security providing advanced information security solutions, consulting and integration to a wide range of clients in Israel and other countries. Our services include: performing surveys and reviews, regulatory compliance, performing penetration tests, security awareness training, consulting, implementation and integration of Information and Communication security solutions. Our company has professional experts with diplomas and certifications in Information Security, Communications, Networks, applications and databases. We provide complete information security solutions mainly for enterprises. 2Bsecure specializes in the assessment, consultation, design and implementation of all information security and risk management related fields. A vendor-neutral professional services company, 2Bsecure structures customer-specific packages of security tools and services for an optimized synergy between business, t

OTHER ARTICLES

Rethinking How We Measure IT Infrastructure Value

Article | February 28, 2020

Planning needs a rethink. Else, IT leaders risk hobbling their companies’ growth potential or becoming blindsided by risks. For many, justifying an IT decision to the CFO or the Board begins with a business case. Often, they use the total cost of ownership (TCO) to convince. Using return on investment (ROI) goes a step further than IT costs and savings, and looks at user efficiency and business effectiveness. Both measures fall short on correctly highlighting the true impact to the business of an enabling technology or infrastructure. Either the metric is too narrow, the timeline is too short, or the investment is not mature enough. It warrants a more holistic approach that looks at multiple aspects of risks, costs and benefits, and compares different components of ROI.

Read More

Data Security in the Cloud Best Practices

Article | April 8, 2020

Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The shared responsibility model refers to the idea that both a cloud provider and the organization using the cloud are responsible for ensuring the overall security of the organization’s cloud infrastructure, including the data housed there.

Read More

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

Spotlight

2BSecure@MATRIX

2Bsecure Ltd. is part of Matrix ltd. since 2013. 2Bsecure is a leader in Information Security providing advanced information security solutions, consulting and integration to a wide range of clients in Israel and other countries. Our services include: performing surveys and reviews, regulatory compliance, performing penetration tests, security awareness training, consulting, implementation and integration of Information and Communication security solutions. Our company has professional experts with diplomas and certifications in Information Security, Communications, Networks, applications and databases. We provide complete information security solutions mainly for enterprises. 2Bsecure specializes in the assessment, consultation, design and implementation of all information security and risk management related fields. A vendor-neutral professional services company, 2Bsecure structures customer-specific packages of security tools and services for an optimized synergy between business, t

Events