Beruflich Dokumente
Kultur Dokumente
NOVEMBER 2016
The Industrial Internet Platform
Table of Contents
The Industrial Internet of Things Opportunity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Predix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Why a software platform? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Why in the cloud? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Why at the edge? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Why move today? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Delivering outcomes that matter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
A Comprehensive, Edge-to-Cloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
EdgeDistribute and run analytics to maximize outcomes . . . . . . . . . . . . . . . . . . . . . 8
Predix Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Predix Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Predix EdgeManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
CloudRun industrial workloads in a managed, gated community . . . . . . . . . . . . 11
Gated industrial community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Built on Cloud Foundry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
GE managed points-of-presence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Capacity on-demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Enhanced security controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Essential Industrial Services That Support The Unique Needs of Industry . . . . 12
Modeling assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Data capture, processing, and management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Turning insights into outcomes with analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Building contextually relevant user experiences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Mobility for always-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Geospatial intelligence for enhanced insights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Brownfield integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1 GE estimates: https://www.ge.com/digital/press-releases/GE-Announces-Predix-Cloud-Worlds-First-Cloud-Service-Built-Industrial-Data-Analytics
2 IDC report: December 2012 - THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far Easthttps://www.emc.
com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf
3 Cisco report: The Internet of Things. How the Next Evolution of the Internet Is Changing Everythinghttp://www.cisco.com/web/about/ac79/docs/innov/
IoT_IBSG_0411FINAL.pdf
Predix Machine
Software / Analytics Cloud Foundry
Data Infrastructure
Enterprise Systems
External Data The Predix Cloud
END-TO-END SECURITY
Future-proof their initial investments An edge-to-cloud deployment model can help the
majority of industrial applications, removing many of
Independent third parties can also build apps and the limitations of a cloud-only strategy.
services on the platform, allowing businesses to
extend their capabilities easily by tapping into the WHY MOVE TODAY?
industrial app ecosystem. There is no time like the present to decrease
unplanned downtime, increase productivity, and
WHY IN THE CLOUD? minimize missed opportunities. By getting started
The cloud model allows businesses to take advantage with an industrial edge-to-cloud platform today,
of key capabilities, including: businesses address an immediate need, knowing that
Lower costs based on the economics of a centrally an extensible architecture is there to help them grow
managed and shared infrastructure in a pay-as- to meet future requirements.
you-go subscription model
TRANSPORTATION
POWER
AVIATION
DISTRIBUTION
SCHEDULING
INTELLIGENT 1 AND LOGISTICS
ENVIRONMENT
HEALTHCARE
CONNECTED
OPERATIONS
2 PRODUCTS
7 OPTIMIZATION
INTELLIGENT
POWER
3 ENVIRONMENTS
ASSET PERFORMANCE
GENERATION
6 MANAGEMENT (APM)
OIL & GAS
FIELD FORCE
4 MANAGEMENT
INDUSTRIAL
5 ANALYTICS
WIND WATER
AUTOMOTIVE
MINING
MANUFACTURING
EDGE CLOUD
Reduced latency, adherence to SLAs and regulatory needs, and avoiding unnecessary Centrally managed, on-demand
exposure to data capacity, improved system governance
Securely manage devices, data, and app logic from the edge equipment to the plant or field, and all the way to the cloud.
ud
On Clo
re mise Direct to Cloud
On P
Gateway Gateway Gateway
IT / OT
Protocols
Sensor/ Sensor/
Device 1 Device n Machine Controller Sensor Nodes
The gateway acts as a smart conduit By using existing controllers, industrial Leveraging low-cost intelligent sensors
between the cloud and the machines and commercial assets that previously deployed on or near the assets allows
- providing connectivity to assets via a operated stand-alone can be connected data to be transmitted directly or
variety of IT or OT protocols. to the cloud for data collection and through a gateway to Predix.
analytics.
In order to support edge analytics, Predix Machine provides advanced edge analytics such as in-motion data
analytics, machine learning capabilities with zero-touch application, and analytics deployment at the edge.
PREDIX CONNECTIVITY
A truly global
Predix Cloud
Predix
Cloud
industrial platform
VPN needs to consume
and analyze
WAN Connectivity massive volumes of
(Cellular, Cloud Express, Satellite)
data by connecting
Customer Edge Gateway
to a wide variety of
Predix VPN machines, sensors,
Edge
control systems,
LAN/PAN/FAN
data sources, and
devices.
Assets
GE MANAGED POINTS-OF-PRESENCE
GE will make Predix available to customers in the
Americas, Europe, Africa, Middle East, and Asia. These
Points-of-Presence (PoPs) are to be selected based
on provider diversity, network peering, technology
capabilities, regional data privacy considerations,
customer needs, and security considerations.
All locations will be ISO27002/01, SSAE16 SOC 2
compliant and operate at either Tier III (Concurrently
Maintainable) or Tier IV (Fault Tolerance) levels, based
on the Uptime Institute Standards.
CAPACITY ON-DEMAND
Predix uses software-defined infrastructure (SDI) as
CloudRun industrial workloads in a an abstraction layer above the hardware, allowing
services to evolve over time, with minimal disruption
managed, gated community
to the applications. This SDI is especially useful when
As a leader in the industrial world, GE built an edge- an application dictates that a change to the underlying
to-cloud platform purpose-built to meet the needs hardware configuration is needed to ensure that
of industrial companies that require scale, security, demand is met. The provisioning management
and regulatory compliance. Predix can handle vast and pooling of resources can be done at a granular
amounts of Industrial Internet information, while level, allowing for optimal resource allocation, and
also managing customer SLAs, security, support, ultimately driving costs down and value up.
governance, compliance, and export controls.
ENHANCED SECURITY CONTROLS
GATED INDUSTRIAL COMMUNITY Security is embedded at every level of the cloud
Predix is based on a multi-tenant gated community stack. This specialized approach offers industrial-
model to ensure that tenants belong to the industrial grade security, as every layer is monitored and
ecosystem. This reduces the risk of bad actors scanned for vulnerabilities. Capabilities include
entering the community, and enables GE to account encryption, key management, incident response
for stringent regulatory requirements in ways that services, logging, network-level security, support
IT-focused public clouds cannot. Support for various for end-to-end chain of custody reporting for
data governance, federation, and privacy needs are code and data, and 24x7 security and network
included, as well as stringent security requirements, operations centers. See Appendix A for additional
such as perimeter security, data security, access infrastructure security details.
control, and data visibility.
Data Origination Data Ingestion Store & Process Analysis & Usage
Catalogs
Analytics
Enterprise Datasets TIME SERIES
Pipeline
NOSQL Web
Message Service
Machine + Enterprise
Cloud Gateway
Real Time
RELATIONAL
Machine
OBJECT
APIs
Data
CACHING
Pipeline Mobile
SEARCH
Historians
Compliance DIST. FILE SYSTEMS
Bulk Upload Access Ctrl
Privacy DATA PROCESSING
CRM, ERP
Governance
1. Connection to the source: Connections are to perform data cleansing, increase data quality,
established with GE and non-GE machine sensors, data enrichment (for example, merging with
controllers, gateways, enterprise databases, and location or weather data), data tagging, and real-
historians. time data processing.
2. Data ingestion: Data is ingested from the 4. Data management: Data needs to be stored in
source in real time, and bulk upload tools the appropriate data store, whether it be time
allow the user to identify specific sources and series for machine sensor data, Binary Large
to create default data flows for all data sets Object (BLOB) (for example, MRI images), or
and data types, including unstructured, semi- an RDBMS. This allows use of the data for both
structured, and structured. These tools speed operational and analytical purposes. It also
the design, testing, and generation of code, provides data blending capabilities, where users
making it easier to manage and monitor simple, can deploy tools to extract value from these data
onetime projects to complex, ongoing data sources to find patterns and process complex
synchronization projects. events (i.e. look for a combination of certain types
of events to create a higher level business event).
3. Pipeline processing: The ingestion pipeline can
efficiently ingest massive amounts of data from Turning insights into outcomes with
millions of assets. However, data can be messy, analytics
arrive in different formats, and come from multiple Predix offers a scalable, reusable framework for
sources, all of which make running predictive industrial analytics. This enables a business to be
analytics difficult. Pipeline processing allows the more data drivenanalyzing data using targeted
data to be converted to the correct format so that analyses that create insights leading to better
predictive analysis and data modeling can be done business outcomes. Analytic services abstract
in real time. The pipeline policy framework provides the intellectual property of a businesss advanced
governance and cataloging services, allowing users analyses to reusable components that can be
PRESCRIPTIVE
Simulation What-If
the cloud and at the edge also ensures that Decision Support
analytics are distributed across the business to
increase effectiveness of the proximity.
COMPLEXITY OF ANALYTICS
PREDICTIVE
Forecasting
Prognostics
Operational analytics at the edge
ensure the efficient operation of Health
DESCRIPTIVE
Assessment
Condition
assets, but those analytics can Monitoring
Additional services:
4 GE Sponsored report - The State of Industrial Internet Application Development January 2016: http://predix-io-assets.s3.amazonaws.com/2016%20
State%20of%20Industrial%20Internet%20Application%20Development.pdf
APM gives you a single, secure way Once your equipment is The ultimate goal of APM is to
to gather data from a wide variety connected, APM applications identify maintenance strategies
of assets and systems, creating go to work monitoring your that balance reliability,
a comprehensive and validated assets and alerting you about performance and costs. APM
data repository. APM applications behavioral anomalies. APM allows you to replace scheduled
provide you a unified, complete, predicts equipment problems maintenance with just-in-
and accurate view of your before they happen so you time, predictive maintenance.
operations at the asset, plant, can focus resources where APM takes optimization to an
and enterprise levels anytime they are needed. And when entirely new level, providing you
and anywhere. issues do arise, APM provides the quantitative foundation to
comprehensive case and implement a comprehensive,
knowledge management to financially optimized asset
ensure that your best practices management strategy.
are captured and available for
future use.
To Learn More
Learn more
About Predix To start developing on Predix
predix.com predix.io
OS security Harden and maintain base OS images for provisioned virtual machines
based on Predix hardening standards and related guidelines developed to
comply with ISO27002/01 and SSAE16 SOC 2 standards and industry best
practices.
Hardware security Architect and securely deploy hardware for the infrastructure based on
Predix hardening standards and related guidelines developed to comply
with ISO27002/01 and SSAE16 SOC 2 standards and industry best
practices.
Secured storage Provide encrypted block and object storage with associated services.
Secured data in transit Secure the network (using IPSec and SSL/TLS protocols) based on controls
within the cloud network defined in Predix hardening standards and related guidelines.
Federated identity Use tools that leverage the existing identity stores and remove the burden
management of identity management.
Secure single sign-on (SSO) services for access Predix.
Vulnerability and patch Test and update software and hardware based on security advisories
management and regular vendor patch releases utilizing proper change management
procedures.
Monitoring and logging Actively search for network intrusion, malicious activities, and compliance
policy violations that are a threat to the infrastructure; communicate and
remediate any incidents.
Rigorous risk assessments Perform penetration testing and compliance scanning to detect any
against the cloud vulnerabilities and compliance violations and quickly remediate them;
infrastructure perform assessments against security controls and procedures.
2016 General Electric Company All rights reserved. THIS DOCUMENT AND ITS CONTENTS ARE PROVIDED AS IS,
WITH NO REPRESENTATION OR WARRANTIES OF ANY KIND,
GE, the GE Monogram and Predix are trademarks of General Electric WHETHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
Company. WARRANTIES OF DESIGN, MERCHANTABILITY, OR FITNESS FOR
A PARTICULAR PURPOSE. ALL OTHER LIABILITY ARISING FROM
No part of this document may be distributed, reproduced or posted RELIANCE UPON ANY INFORMATION CONTAINED HEREIN IS
without the express written permission of General Electric Company. EXPRESSLY DISCLAIMED.