Tuesday, 23 December 2014

Security is Paramount in the Internet of Things

This article was written by my friend Kim Rowe of RoweBots and it has been slightly adapted for this blog. The original can be read at http://www.embedded-know-how.com/article/1776/security-is-of-paramount-in-the-internet-of-things...

Security is of paramount concern for internet connected systems because it now controls all infrastructure, most entertainment, most factories, medical systems, all electronic communications – both corporate and personal, and all financial transactions. As a society, we are completely dependent on the Internet and without reliable Internet services society would not function.

 
This Internet dependence will only grow as we add more devices and capabilities creating the Internet of Things. Dependence will create significant vulnerabilities if the devices are not secure. Imagine a connected hospital without security for patient data collected in real time or a voting system vulnerable to hackers. How about traffic lights which can easily be changed by criminals? Without security on all devices, everything that surrounds us will be subject to attack and exploitation by terrorists, criminals, power hungry hackers and vandals. Our society, safety and freedom will be at risk.

If pervasive security is in place, our society will have the capabilities to become much safer, with greater freedom and improved safety and security. The tyranny of the masses could be minimized and a society responsive to individual needs could be created – from getting the right traffic lights while eliminating all accidents, through guaranteeing private information remains private and ensuring that medical results are both secure and immediately accessible. Internet of things devices will go into the field now but will remain viable for many years depending on the application. Traffic lights and utility meters are rarely changed. Communications infrastructure is designed to be compatible and operational for twenty years. Electrical transmission systems last thirty years or more. Homes, offices, industrial buildings and other structures are intended to last indefinitely with retrofits in terms of decades.

If new systems are not secure now, they could be a significant risk for the purchaser very quickly as threats grow. To preserve customers investments in their smart devices and protect society, security is an essential requirement for all new devices. The time to protect society is when systems are designed. How secure can small microcontrollers (MCUs) and microprocessors (MPUs) be? Of the 20-50B devices expected to go onto the Internet in the next few years, all can be secure to the point where abuse and misuse is minimal.  Small devices can be more secure than much larger devices for two reasons. First, they are not subject to the same type of threats – threats are much lower level. Second, they often lack the features to dynamically run new programs and the mechanisms that they have for reloading the program either require physical access or can be secured relatively easily. This does not mean that security is very easy, just that it is not as difficult if you properly exploit the features of MCUs and small MPUs for maximum security. The remainder of this article discusses how to protect small devices on the Internet of Things.

Hacking an Embedded Device

 In the case of systems with dynamic loading, modification of executable files and other sophisticated features, security is difficult. Imagine the following scenario:
  • An intruder moves a file onto the machine using email, ftp or some other means.
  • The file is dynamically loaded and when it runs, it corrupts other executable files. It then cleans up and deletes itself.
  • If the virus is new or unknown to the system, it won't be recognized as a virus and will pass into the system and infect it.
Consider another scenario where communication links are not secure or not properly secured. In this case, there is likely a means to read data at a minimum. There might also be a means to inject new data into the data stream which could be used in turn to corrupt the receiving system. A good example of this is loading a non-secured image for a device over the Internet. When the new image is loaded and run, it could take over the system assuming that it has the correct access. In yet another scenario, a device with critical data on it is stolen. Unless the data is encrypted or sits in an encrypted file system, it could be possible to recover the restricted data from the device. This is another scenario to consider.

To ensure system security, often it is best to consider how the device information will be accessed. Typically, great security would require: something you know (password), something you have (debit card or a wearable device), and something that you are (an iris scan). For small devices this is typically overkill, but in cases where very high security is required, it is possible to achieve this through indirect means as long as the various elements are all secure. By securely interacting with a server which in turn securely accesses the device the device interfaces for security can run on larger machines and still be used to secure small devices.

Another critical element for secure systems is layered security and an assumption that someone will gain partial access. A good design practice uses layered security where possible. In this case, the intruder may access some part of the system but not all the system without significant additional work. Examples of this might be using two different firewalls in cascade to secure a server so that vulnerabilities in one are secured by the second firewall. Following a discussion of the processes required and the components or software elements which provide various security features, the use of these components will be discussed further in the context of system security, addressing each of these scenarios.

Securing Small Devices

 The first and most important thing that is required to secure a small system is the desire to make sure the device is impenetrable by all reasonable means. Without the proper motivation and mindset to make the system secure, it most certainly won't be secure. The second thing that is required is an approach that designs in layered security at the design level. After having completed a design, to then think about how best to secure the device is at best impractical. By using the correct approaches and knowing what is needed at design time, and actually using these tools to achieve a secure system is the next step to a secure system.

The third important approach is a well defined process for testing the security of the system after the implementation is completed and the device is properly configured. Through proper configuration followed with good testing approaches, the security of the final system can be assured; provided that the installation is correct. The final step to a secure system is a secure installation. A secure installation requires a rigorous procedure for installation which is strictly followed. Automation of the process is not necessary but is highly desirable as it can eliminate human error. Final in place testing will ensure that the install was correct and the security is operational.

Security Features

To completely lock down an MCU or small MPU at design time, the following security features are required. Some may not be necessary for your system, but in general, all should be considered. Security using standard information technology security solutions are the core security mechanisms for deeply embedded MCU and MPU products. These security protocols are:
•    TLS
•    IPSec / VPN
•    SSH
•    SFTP
•    Secure bootloader and automatic fallback
•    IP Filtering
•    HTTPS
•    SNMP v3
•    Secure wireless links
•    Encryption and decryption
•    DTLS (for UDP only security)
•    Secure email

TLS, IPSec/VPN, HTTPS, Secure wireless links, and DTLS are all means to secure communications links. SFTP provides secure file transfer while SSH provides secure remote access and Secure email provides email services over encrypted links. A secure bootloader with automatic fallback ensures that the system cannot be corrupted. SNMPv3, encrypted data, and an encrypted file system protects data through encryption either locally or as it is about to be transferred to another machine. IP filtering is really a firewall feature, intended to keep out unwanted and uninvited guests. Each section and each item will be discussed after a discussion on system level security.

System Security

Security is only as strong as its weakest link or component. To make a system secure, all the various communication channels, all the file transfer, all the data storage and any means to update anything must be secure. By making all of these things secure, the system becomes secure.

rowebots140826-1Figure 1. Network Security Components highlighted. The diagram shows the Unison OS Internet protocols, highlighting the components that offer the necessary security for that feature in order to build secure MCU and small MPU based devices. The security components require seamless integration across the entire set of protocols to provide high quality security.





The approach whereby the system is secured in layers using components is an excellent approach and the one used in the RoweBots Unison Operating System and most higher level environments. At the core, all operating system components are secure to protect against unauthorized tampering. Operating system security includes an encrypted file system so even if the device is stolen, the data is protected. Small MCUs use memory protection units (MemPU) and MPUs use their memory management units (MMUs) to ensure unauthorized changes to the programs are prohibited. Often flash reading is eliminated by using memory protection features which stop users from accessing the programs and or executing new programs from RAM or non program flash.

Secure boot and re-flash should be part of the core operating system security. By using the mechanisms provided by a secure boot system in conjunction with secure operating system features, all unauthorized tampering with the program can be prevented.  After the basic OS has been secured, attention is turned to the next layer of security – namely secure data link communications protocols. This includes wireless link level security and various military data link security protocols.

The next layer is at the IP level. This includes the following protocols:
•    PPP, PPPoE, PPTP
•    IPSec (or VPN)
•    IP filtering or firewall capabilities

These protocols securely transfer IP packets over the network. With reference to the OSI model, they all operate in the IP or network layer. IP filtering is used to authenticate and accept and reject connections. IPSec provides a virtual network built on top of the IP network using encrypted packets, and the remaining protocols provide encrypted and/or authenticated communications links for iP packets.

The next layer of security includes the transport, session and presentation layers. This end to end encryption layer includes TLS and DTLS. The remainder of the security protocols are application level protocols and provide the following features:
•    SSH – secure remote access
•    SMTP – secure email
•    SFTP – secure file transfer
•    SNMP v3 – secure device management
•    HTTPS – secure web server access
•    Encryption and decryption provide separately secured data in the environment to prevent unauthorized use.

Using all of these components and layers together, within a secure framework which has been thoroughly tested will ensure that your layered, secure design has optimal protection.

rowebots140826-2Figure 2. Unison Nanokernel Architecture – highlighted with security components. The Unison RTOS offers an additional secure boot feature at the lowest levels which completely locks down the system. Without an interpreter or other means to load a program which would run and then exploit a vulnerability of the system, it becomes extremely difficult for the system to be attacked.





System Security Revisited

Now consider the security of a MCU or MPU with limited resources needing to apply most if not all of these protocols to achieve security. To provide practical examples, this will be considered for the Unison OS, a tiny POSIX RTOS which has these features off the shelf in its tiny footprint. First, using secure communications protocols, all applications talking to the target device can be made secure. This includes phone applications, secure web based access to a tiny web server and more. Tricks like buffer overflow attacks are not possible because Unison is designed to run in minimal resources and must protect against any unreasonable resource use. Secure wireless links can be used. A VPN may be used.

To transfer files into the system SFTP can be used. This guarantees that the data is not corrupted during transmission – very important to secure the system updates. Adding filtering to the front end processing in the TCP server ensures that only authorized requests and updates are processed. This protects the device from intruders and significantly improves security. In addition, SSH can be used to remotely setup the device using a terminal based approach which may be more conducive to a scripted approach compared to a web server. This guarantees that the setup of the device is secure as well. At this point, the data flowing to and from the device is secure. Any changes or setup is secure and authorized applications and users can get access to the device's data and features. What if the device is stolen? To protect against this either encrypt the stored data on the device, keep no local data or use an encrypted file system. This will ensure that the critical data on the device is secured. If the user has the device, and has a password, this is generally regarded as reasonable security. Additional security in terms of fingerprint scans, iris scans, palm prints and other devices can be added for additional security either with the device or connected to a secure access station. If you review the security scenarios that were first discussed, you will see that all but one of the scenarios has been discussed. The issue of execution of a program which subverts the security system has not been considered in depth.

In the case of an MCU and some MPUs, the program is a single linked image that runs from flash memory. In this case, it is not possible to add anything to the system because the entire image runs from flash and if the boot mechanism or re-flashing mechanism is secure, then an intruder can't introduce new code. This is true in the Unison case which makes the system extremely secure. In the case where an interpreter is in the system, the same cannot be said. An interpreted program could go and change the system image with unfettered access on an MCU or MPU unless elaborate security mechanisms are put into place such as use of a memory protection unit or MMU.

Securing MCU and MPU Systems

In summary, MCU and small MPU systems can be completely locked down using standard IT security protocols, secure boot and by restricting interpreter use. Unison benefits from the complete integration of all these components and the attention paid to layers security as part of this integration. Security should not be an afterthought or something layered on top of the operating system – it should be designed into the system and integrated and tested as a unit for true security.


 Kim Rowe is the CEO of RoweBots Limited, the manufacturer of the Unison Operating System and builder of Internet of Things devices.

More information can be found at http://rowebots.com/products/unison_rtos .

Wednesday, 24 September 2014

Industrial Equipment & Network Security - A Growing Concern

Increasingly our industrial world is adopting Information Technology (IT) advances such as networking, remote control via the web, mobile interfaces, 802.11 wireless, USB support,  and now cloud based applications in the race to stay ahead in this competitive world. This application of technology may be coming a a cost of vulnerability and we need to look at this.

At the recent International Manufacturing Technology Show (IMTS 2014) in Chicago, exhibitors showed how they could leverage every advance in the IT world on to the factory floor. At the leading edge 100,000 sq ft DMG MORI booth, amazing new controllers and machines with remote OEM support options and high tech interfaces made in their new Davis, California plant were highlighted.

Following DMG MORI's lead, every manufacturer wants to reduce costs and yet enhance customer service - and leveraging IT is a great way to do so. That said, this openness cannot be done at the cost of making the system less secure and opening up the potential for a cyber attack and disaster.

Anyone in the defense industry (especially in the US) has heard of the International Treaty of Arms Reduction (ITAR) and the many security requirements that this program entails. Right now security on the factory floor is focused on perimeter control (network, magnetic card locks, video surveillance, etc) and the human element (checking out each worker and contractor). This may not be good enough in the future - we must get security into each machine.

The opportunity here is to investigate Machine to Machine (M2M) security systems - having part programs secure right to each machine (and perhaps once in them). Machine protocols like open source XML-based MTConnect need a secure version to be considered for ITAR or even cloud-based machine monitoring and Overall Equipment Effectiveness (OEE) programs.

In the days to come, Nexas will be looking into just what would be needed to provide secure factory communications to enable mobile, wireless and cloud-based applications. If factory floor network security is not yet a concern - I think it should be. This may indeed be the "next big thing" in the manufacturing sector worldwide...


Reference Links You Should Check Out...

1. 2014 Kaspersky Industrial Security Review
2. LoJack System for Cargo
3. IMPERVIO Information Rights Management System
4. Finding Your Cyber-Security Weak Spots
5. Tofino Factory Automation Security

Tuesday, 1 July 2014

Words of Wisdom - 2014 Centennial College Commencement Address

On June 11, 2014, I had the honour of delivering the commencement address to 900 graduates of the School of Transportation and their families at Centennial College in Toronto. Several thousand people came out and I was televised for this formal affair - see the link at the end of this post. The experience was rewarding and exciting, in part because the students and faculty seemed to appreciate my "words of wisdom".

Afterwards, I was thanked by students and even asked by faculty if I would allow them to use it in their future teaching. As each graduate received their Diploma, I got a chance to congratulate them - and many thanked me for my encouraging words.

I wanted to post my speech here so that it becomes a public document reachable for these graduates that I now have a personal interest in. To those that just graduated, may you always keep "Love, Truth & Honour" in your hearts as you make your way in the world...


2014-06-11 Centennial College Commencement Speech

LOVE, TRUTH & HONOUR 
----------------------------------
Distinguished Members of Centennial College’s Board of Governors, President Ann Buller, other members sharing the platform with me today, students, your families and guests… 

I welcome you here and thank you for the opportunity to address you today.

I have come to learn that commencement speeches are quite symbolic and steeped in tradition. 

To graduates, then this speech actually represents the final lesson that Centennial College wishes to share with you before sending you out into the world to make your mark. 

As such, I consider this a high honour to be able to share my thoughts, experiences and life lessons with you today. 


INTRODUCTION – Let Me Share A Little About Myself:
-------------------------------------------------------------
In my incredibly intense and blessed life so far - I have lived, played and worked hard. 

In short, I have had a blast. 

I have built businesses that have uniquely applied technology to the metalworking manufacturing space. 

In fact, two of the companies I founded have gone public, but the first failed largely to timing – being on the wrong side of 911. 

To highlight this, on Sept 11, 2001 my net worth had grown to over $70 million, but I watched as our e-Manufacturing Networks prospectus for financing rained down from those New York towers. I can say that my hopes and fortunes crashed and burned that day too. 

I cannot tell you how gut wrenching that time was with no power to change what was happening, and eventually would happen as a result. 

I would lose everything thanks to this event, but I have bounced back. The message here is one of dogged persistence, of getting up over and over when life hits you hard, as it invariably will to test your heart. 

I have won big, and I have lost big – but I believe that my greatest accomplishment is that I have made a difference with integrity. 

Over the years, I have been seen as a visionary trying to connect every machine on the factory floor to the network. I have also been the co-founder of an open standards group called MTConnect that I am proud to say is being adopted worldwide these days. 

I have truly been “up-to-something” with many supporting me – especially my family, friends & co-workers.

Today my goal is to touch, move and inspire you to even greater things than I have done – for you to make a difference in this world too. 

I want to share with you thoughts in three areas – LOVE, TRUTH & HONOUR.


About LOVE – A Misunderstood 4 Letter Word:
----------------------------------------------------
Although the word “love” is used a lot these days, I don’t think that people appreciate the depth that it has. 

We talk casually about love and often minimize it – but really it is a force that binds the universe together – something you will have to tap into to really succeed at this thing called life.

Over the years I have seen so many people pay a heavy price to rise to other people’s expectations. They have mistakenly chosen to love image, power or money and thus simply lose themselves (and their health, their families, and their self-worth) in the process. 

 “Don’t use people and love things, rather love people and use things.” 

In my mind, loving yourself means respecting yourself, taking care of yourself, improving yourself, nurturing yourself, and taking time for yourself. You also need to love those supporting you like family, friends and even teachers. Share your appreciation. It is not all about you.

If you ignore these areas, you will learn hard lessons which will be repeated until they are learned I might add.

When I graduated over 26 years ago, I distinctly remember saying – so now what? I look back now and see the ride of my life, as I took on the world.  

I started my first business when I was 14 and I learned a valuable lesson about money – namely that there is no mystery on how to make it … money is made simply by solving another’s problem. 

If you want more money you can either solve bigger problems or more problems for others … or change who you are solving them for.

As the world gets more and more complicated, we vitally need people like you who can fix, maintain, and service mission critical transportation equipment like you can – you are important and even vital. 

Your travels will lead into many areas, but never forget your training here and your worth.

The energy to keep going, growing, learning and eventually recovering from a setback or fall – comes from knowing your worth, loving what you are doing and doing what you love. 

You have to want to change the world and be unreasonable to make this happen. 


Now on to TRUTH:
-----------------------
To me, truth is about seeking and clinging to what I call capital “T” truths. The world is very distracting and will want to pull you in many directions that are not what you love, not who you are, and do not generate happiness in the long run. 

This whole consumer world wants you to serve it first – buy what they are selling – do what they are saying – think what they tell you - so that you will serve their interests first.  Run, don’t walk, away from these detours and temporal traps. 

Truth is about clinging to what is right and just – serving others, and clinging to proven Truths that are unchanging. Protect your heart.

I have had some bitter losses, but I have never compromised on the truths I find to be self-evident. 

Seek wisdom, as it is the principal thing. 


A Note About HONOUR:
------------------------------
I would like to think that as each of you makes your way in the world, that you all uphold the highest character – that no one can buy, bully or entice you to compromise on your values. 

Take time to know your values – write them down even and keep them in your heart.

Be proud, take a stand, and learn to serve others well - this is what honour is all about. Great leaders are of service to others with everything they have – it is who they are. 

In the years ahead you may be asked to compromise on those values – to cheat the system, fudge a report, pass something of bad quality, look the other way or to lie, cheat or steal – do not ever do this, as it will come back to you. It could even have dire consequences that you will regret or be liable for years later. Live an honourable life.

This message here is about character – you need to have courage to take a stand for what is right. 

I believe that you should all consider yourselves as professionals, and act accordingly. Not every boss is good, company culture supportive, or staff morally upright – but you can be. 

I quote Ghandi, who once said: “You must be the change that you wish to see in the world.” 

It is important to align yourself with people who share your values in life, as you will become like those you are around. 

Learn to be courageous and take a stand - even if it costs you. Your goal should be to be respected, and not necessarily liked by all. 


And now, one final thought – Giving Back:
--------------------------------------------
As you get busy with life, it is easy to have focus only on you and your needs, but I want you to consider that part of your life should be dedicated to giving back. By virtue of your time here at Centennial and this graduation, you are way ahead of most people in this world. 

Although I have given back in many areas of my life thus far, I am most proud of starting Peoplewerks Volunteer Association in 2009. Peoplewerks is a non-profit group located in Hamilton dedicated to getting people working – one day at a time. 

I wanted to see a movement where people who want to work can, and thus be productive. It is a shame how many good people are not working, and the ones that are working are often over-worked and could use the help. 

Peoplewerks has been one of my experiments to create a difference – but I think that everyone can start their own action to make the world a better place. 

There is never a day when you cannot be generous – even if it is simply a smile, or a glass of water. 


In Conclusion:
-----------------
I encourage you in all goodness, and wish you well in the ride called your life - armed with your Centennial College diplomas soon to be presented… 

Go forth to make a difference in this world with 
LOVE, TRUTH and HONOUR in your hearts.

So now, I leave you with these immortal lines of encouragement from Britain’s wartime hero 
Winston Churchill:

“This is not the end,
Nor even the beginning of the end,
Rather, this is the end of the beginning!”

Thank you… 
---------------------------------------------------------
For a link to a video of the actual speech - click below and 
jump to 19 minutes 25 seconds where I start:


Tuesday, 18 June 2013

See - A New Idea In The Machining World

In the competitive world of machining, we need to look for new technologies to help reduce costs and boost productivity. One area that has been largely missed is the use of vision systems to help daily machining operations. Using a machine tool's positioning system to help setup, inspect and ultimate ensure quality is a new idea in this machining world. So today I want to introduce a new idea in the machining world - the TooliVision CNC Scope...
 

Heads Up - CNC Machining Vision Systems Are Coming

  
This patented TooliVision product is a new visual tool for the machining world. Like a touch probe in functionality, it mounts a robust high contrast USB camera into the machine tool's spindle.
 
The accompanying TooliVision software has a cross hair calibrated to the center of spindle rotation super-imposed on the image from the part it sees. This new product has a 40x magnification camera that captures images by using 20 infra red LEDs so it can literally see in the dark at a 3 inch focal length. This product can see where touch probes cannot and half the price. Besides setup time reduction, the TooliVision system can also capture the critical feature images for traceability and enhanced quality control if desired. Finally, the TooliVision CNC Scope has a 3/4" stud that can fit any CAT30, CAT40 & CAT50 tool holders and thus be mounted to most machines or even used beside the machine for inspection.
 
In summary this new visual tool for CNC machining helps with CNC setup time reduction, CMM feature recognition, part feature measuring, feature image capturing and rapid quality inspection while right on the machine.
 


TooliVision CNC Scope
Robustly made, the TooliVision CNC Scope can be loaded manually by the operator to help setup a fixture, clamp, vise or part properly and quickly. Using the MPG, the operator can move to the corner of the part, focus and see the coordinates to set a work zero. Seeing key features also allows for inspection of the parts perpendicularity with the machine. One can also see chips underneath, or part miss-alignments easily thereby saving scrap parts immediately and reducing set up time. 
 
40x Magnification Allows Operators To See Their Work
 
The TooliVision CNC Scope has a 40x magnification which is useful for inspecting small features, holes, walls or surfaces. Using the position system if the machine tool, one can measure parts and even calibrate the machined part to a NIST proof ring for extra post machining accuracy traceability.
 

Operators use the vision system before and after machining to reduce setup and ensure quality parts.
Although Nexas didn't invent this product, we see a huge market for using the vision system creatively to really help optimize manufacturing. We are so excited about this advance that we have exclusively licensed this product and are making software now to complement its features. The areas to address first are an automated way of taking images and managing them. Then a move towards a wireless version is our next challenge. 
 
As well, we are now making visual feature extraction feature software to auto-generate the important feature positions for the machine tool to run as G code. So at the end of a job, one runs the software to create a program to automatically inspect the part you just made and you can have images of every key point along the way.
 
From detection of quality issues to Foreign Object Debris (FOD), the TooliVision CNC Scope will be a valued tool to reduce setup time and help operators do their job. The future is quite bright as the new world of CNC vision systems comes to light...

 

Wednesday, 10 October 2012

We Need Focus To Grow & Sustain Manufacturing

Yesterday, my old friend A.J. Sweatt (formerly from Modern Machine Shop) started a Linkedin Manufacturing Blog with the above title. He started the discussion with: 

Right now, we need a clear vision, clearly enunciated, and easily understood. Instead, we get band-aids and myopia that seem to propel us farther away from the basic economic principals that gave us our manufacturing might in the first place.

His blog is at: http://www.linkedin.com/groupAnswers?viewQuestionAndAnswers=&discussionID=173319289&gid=126939&trk=eml-anet_dig-b_nd-pst_ttle-cn&ut=0MtQjgSASxiBs1

Here is my response:

I care a lot about manufacturing and sustainability as you may know. We initially connected in the late 1990's when you were with Modern Machine Shop magazine and leading them into the digital age. At the time, I was at running Memex and gave you a demo whereby you could control a Fanuc 11M control over the Internet which was a world's first. Now years later, I wonder if the magic has left and familiarity has entered. My Dutch grandmother used to say that "God hides things by putting them near us", and I wonder if manufacturing is suffering from this to a degree.

People hear in the media quite a few negative aspects of manufacturing - such as pollution, layoffs, antiquated technology, waste, globalization, plant closings, out-sourcing, off-shoring, brown fields, stress, injuries, union strife, management greed, etc. Yet our standard of living is dependent on manufacturing once can see why it has been a less desirable choice for young people and an easy target for politicians to either rail against or ignore.

The truth is that manufacturing and the principles that run it are everywhere. Lean principles, reduction of waste, management practices and even sustainability are ideas that have made a real difference in this world. I would argue that manufacturing - done right - is the one of the greatest wealth producers (rather than wealth re-distributors) ever invented.

Our growing society wants to have abundance and enough for all. This laudable objective requires wealth creation, good stewardship and excellent systems. Thomas Jefferson once noted that "great wealth and great poverty cannot co-exist in a democracy".

Indeed, Konosuke Matsushuta the founder of Panasonic in Japan created in 1946 a "Peace and Happiness Through Prosperity" plan that understands the link between peace and the economic well-being (see http://www.php.co.jp/en/think.php). The PHP movement is quite large today by the way.

A few years ago I have started a group called "Peoplewerks Volunteer Association" to put people back to work one day at a time (www.peoplewerks.com). People need to have something meaningful to do, and enough money to live and fuel the economic engine (Henry Ford had it right).  The waste of a human resource is our world's worst oversight in my opinion.

In summary then, I believe that manufacturing in its broadest transformative context is the key to dream of enough for all in a sustainable way. We just feel better making the world a better place for others. I say let's manufacture the future together...

Friday, 5 October 2012

Microsoft's Long Standing Interest in Manufacturing


I came across today this entry that I had made to Tyler Bryson's Blog, who was at the time the point person for Microsoft's Manufacturing Strategy. Although it is old (Aug 30, 2010), it is interesting to see how long Microsoft has been involved in this space. My comments were designed to welcome him (and the Microsoft Blog) into this manufacturing space, and let him know that we have enjoyed Microsoft's long standing interest in our sector. 

If I could talk to him today, I would ask about Microsoft's "Green Project" as it applied to manufacturing. I was told this summer at the Microsoft World Partner Conference in Toronto that the initiative was stalled when Steve Ballmer took over Microsoft and I wonder why. The "Green" initiative was to help manufacturing and I think we should open this up again...

Check Out Microsoft's "Manufacturing Matters" Blog at:

http://blogs.msdn.com/b/manufacturing/

Also of interest was Tyler's first blog posting way back in 2008:
http://blogs.msdn.com/b/manufacturing/archive/2008/07/28/manufacturing-matters-to-microsoft.aspx


By the way, the current US Manufacturing & Resources General Manager for Microsoft is now Craig Hodges and he is continuing to highlight "innovations and ideas from across Microsoft in Manufacturing" in the Blog.

-------------------------------------------------- 

Tyler - I know that this is an old Blog - but I just wanted to welcome you to the manufacturing space.

Microsoft has actually been interested in and sponsoring events in our space for years. When I was with the Global HMI Sub-Committee in OMAC (Open Modular Architecture Controls group), Microsoft had a MUG (Microsoft User Group). We are talking over 10 years ago, before OMAC joined ISA and when it was under the ARC people's direction. Back then, I was running an upstart company after I had coined a new name that quickly became a category, namely "e-Manufacturing". After writing the first widely accepted XML Schema with Dr. Stephen Lane-Smith, I was happy that it has been used in the last few years and added to by MTConnect (see MTConnect.org) with sponsorship from the American Machine Tool Association. I now am involved with MTConnect on their Technical Advisory Board.

Our dream of barrier-free connectivity is now coming to pass and Microsoft will be a player in this. Our software systems over the years have relied heavily on Microsoft products - at times this was trying, but at least a standard could be leveraged for all. Today our goal is to connect the millions of isolated machine tools and provide a cloud of "machine2machine" inter-connectivity and synergy. We look at the plant as one machine now, and are in some ways living up to the 1998 press in Modern Machine Shop we got under the Memex name as the suppliers of the "shop floor nervous system".

I want to leave you with a thought - back in the DotCom days (yes, we were one of them - TSX:MFG) I explained to the VCs that wondered about this connectivity thing, that what we were talking about was the equivalent of clicking buy on the Net and the machine would almost instantly start making the product you needed. We are talking of a "Zero waste - made to order - ultra high velocity of data flow - integrated - quick response - perfect orders" - type of thing and all JIT! We want to leverage IT on the factory floor and with my new team of over a dozen companies, and with the technology we have today, I do not see why we cannot have this "click-buy-make-ship" dream.

Friday, 14 September 2012

Manufacturing Today - Walking IMTS 2012 in Chicago

Well I just got back from the International Manufacturing Technology Show (IMTS 2012) in Chicago. What a spectacular show with over 1900 exhibitors, miles of isle ways, every building used at McCormick and a great crowd of people. IMTS comes around once every two years on the even year, and the last one was just before the financial meltdown that no one seemed to see coming in Sept 2010. This week over 100,000 manufacturing people came to see what was new, and where they could improve their operations.

My observations are as follows:

1.    Manufacturers are gearing up these days for "re-shoring," where jobs subcontracted to China and other low-cost "off-shore" countries are coming back. As such, they need to seek out new technologies to stay competitive and nimble. The use of technology, automation and the greater leveraging of information technology is clearly evident. From small inverted hexapod mini-assembly machines at the Fanuc FA booth in the South Hall, to the half dozen folks selling tooling vending machines in the West Hall, we see a drive to automate everything.

2.    The East Hall was filled with software technology providers that are focusing on Overall Equipment Effectiveness (OEE), real-time machine monitoring, energy management, CAD/CAM and better MES/ERP integration. A common theme was the adoption of MTConnect, but today it has more software applications than native machine types. The complaint from these software vendors was that people know they need information, but are wondering how to get the connectivity and grappling with the user interface. From bar code readers to hand held terminals, touch screens to the leveraging of optional machine protocols - everyone knows that the last few inches is where the MTConnect movement will need to focus to gain greater traction.

3. The South Hall had spectacular million dollar booths from industry veterans such as Mazak, Makino, Hyundai, Hurco, Haas, OKUMA, Methods, MAG and so on. It is not every day that you see two story booths, bars serving alcohol, robots moving train wheels in a Flexible Manufacturing System (FMS) cell. It was a feast for the eyes and probably the most advanced display of manufacturing ever - and I have been going for 22 years!

4. The North Hall had smaller booths with EDM, grinding, saws, DNC, tool management, metal suppliers, you name it - the entire manufacturing world was represented. A sales rep from Hyd-Mech, a company in the fabricating cut-off saw business, admitted to me that IMTS is a place you have to attend, but for them they get 3 times the sales from their specialty FabTech Show in Vegas. That said, he admitted if you don't come, your customers and competitors will assume you are out of business. So IMTS is a place to be seen and catch up with the industry for sure.

5. The emerging technology area still had an MTConnect booth staffed by TAG and Institute staff members like Paul Warndorf - but this is probably the last year for it as it is 6 years old now. Some new applications using iPads were shown by Joel Neidig from ITAMCO and Ken Tock from MacKintock demonstrated their iPad and HMTL5 dynamic web-based MTConnect factory floor emulation and data feed which was impressive. John Turner and Will Sobel, two of MTConnect's main technical architects, took the time to explain to Paul Hogendoorn, an electronics entrepreneur and tech writer with Manufacturing Automation in Canada, what MTConnect's main value equation was. In short, MTConnect is an open web-centric schema that acts like a common dictionary for the manufacturing connectivity world. That means developers and users always know what and where data can be found in any MTConnect appliance and the simple, expandable common interface that will enable future plug n' play integration economies. In simple terms then, gone are the days when you were locked into poor communication options, expensive protocols for each and every machine, or heavy costs to migrate to new technologies as they came along. Once again, the industrial democracy is demonstrated at its' best here and we all benefit. The extensible open aspects of MTConnect are now using "Read/Read" to safely get dissimilar equipment talking fast. As an electronics developer, and former manufacturer himself, I think that Paul "got" the MTConnect value equation and realized that the next big hurdle is legacy connectivity.

6. It was great to connect with vibrant Diane Pepi at Methods Machine about advances in Yasnac third party products. Nexas is looking to soon supply the Yasnac J300 memory module and Methods is the Matsuura dealer in North America that focused on Yasnac controls before they stopped producing. That said, it is clear that the memory upgrade and DNC market are soon to be eclipsed by technology that makes every machine a node on the corporate network. Jim Brown from Makino pointed out that all his machines have Ethernet connectivity, but it is the old ones they worry about as more and more clients see the benefits of inter-machine inter-connectivity on all their machines Makino or not. While we waited for MAG VP Jeff Price, PJ pointed out to me late on Tuesday afternoon that all the machine monitoring solutions they sell still need better legacy connectivity. So much can be done to help operations and plant floor visibility if we can just elegantly bridge the last few inches - a theme we have heard before. With Dave Edstrom, Chair of MTConnect, calling for abstracts by Oct 1 for the next MTConnect [MC]2 Conference in April 10-12 at the Hyatt Regency Hotel in Cincinnati - this topic needs to be addressed before then.

7.   Finally the theme in the emerging technology booth was all about additive technologies. Teams converging on a trick car design in this area also highlighted that global engineering teaming and skunk works will be a future reality. Solid modeling seems to a standard  on the all the CAD/CAM software offerings in the East Hall as the world gets robots and automated handlers to reduce waste, shorten development time and save energy for better sustainability and cost control.

In summary, IMTS 2012 was for me a great eye opener as to the advanced state of manufacturing. I found the attendee mood was upbeat with serious buying on people's minds. We seem to want to do more with less, and do it faster than ever. Sophisticated electronics control systems are in almost ever single manufacturing tool these days, and the next drive will be to interconnect those islands of automation. I predict that when one looks at the cyber factory floor of the near future, they will realize that it is really one big machine with many connected parts - all connected with a shop floor nervous system.

In short, I foresee that machine tools will soon just be like USB metal printers that plug into the system, mount and run together easily in the very near future...



Tom Gaasenbeek - Find me on Bloggers.com