Made in China 2025: Who Cares?

Is China's "Made in China 2025" initiative a final, looming doom for the West's manufacturing sector or the beginning China's "maintenance mode"? We start our 4-part special report by introducing China 2025 and posing the question: Will all the smart factory initiatives across the world just end up in helping China?

Introducing Ultivo: “Small is Big Again”

Last year, Agilent revolutionized gas chromatography with Intuvo.  This year, we’re revolutionizing liquid chromatography with Ultivo.

Gas chromatography and liquid chromatography are two of the most established techniques for determining the chemical composition of an unknown compound.  Liquid chromatography is optimized for analyzing larger and more complex molecules. With the rise of biological compounds (versus chemical compounds), LC has seen tremendous growth.

The new Agilent Ultivo Triple-Quad LC/MS is about one-fourth the size of its predecessor.  Customers have been asking for a more compact option for years.

“Small is big again,” says Agilent’s Badr Astiphan.

But size is just one factor.  The Ultivo is also powerful.  It delivers the same or better performance than its predecessor, even though it has a 70-percent smaller footprint.  With smarter diagnostics, it alerts the user if maintenance is needed.  And with customizable software, users can enable different features depending on which workflow they are running.

Agilent innovations include a vortex-collision cell, a cyclone-ion guide and a fundamentally new quadrupole design.  One other important innovation: The Ultivo is the same price as its predecessor!


For more information go to:

Simulate Composite Thermoforming to Avoid Defects Early in Development

Simulation of a plastic dashboard being thermoformed. The results show that the part experienced a defect in the form of excessive thinning. (Image courtesy of ESI Group.) When people think of composite materials for the automotive sector, they typically imagine strong structural materials such as fiberglass or carbon fiber reinforced polymers. But material and mechanical engineers know that not every composite is designed to offer structural support in worst-case scenarios. However, these...

Cyber Security and the Water Industry

From September 12 to 14 2017 the biennial WATEC professional exhibition and conference will take place in Tel Aviv, Israel. Founded 10 years ago, WATEC has become a highly regarded meeting place for water industry stakeholders – manufacturers, researchers, investors, operators, decision-makers, etc. WATEC 2015 attracted 10,000 visitors from 90 countries around the globe.

One of the main themes that will be highlighted at WATEC 2017 is “Securing our Future: Water Industry Embracing Cyber Technologies.” In this blog, we will explore what this means and why it has become such a hot topic in the water industry.

A few words on cybercrime

Two massive ransomware attacks have dominated the news this year — WannaCry and, most recently, Petya. Hospitals and other healthcare facilities in Britain were affected, as were major corporations such as banks, shipping companies and advertising agencies.

Ransomware is just one example of malicious criminal activity in cyber space, known collectively as cybercrime. Whether for profit, activism (“hactivism”), or espionage, cybercrime includes activities such as phishing emails (that steal credit card numbers and other personal financial information), zero day attacks (that exploit application security vulnerabilities before they’re discovered), and rootkits (that enable unauthorized access to a computer system at the root or admin level). [2]

In all its forms, cybercrime is expected to cost its victims – which include you and me – as much as $6 trillion by 2021. [1]

Digital transformation has created cyber-physical systems

As shown in the concept map below, the convergence of sensors, IP networks, processors, actuators and informatics has transformed what used to be purely physical systems, such as buildings and vehicles, into cyber-physical systems that sense and interact with the physical world. Advances in machine learning, artificial intelligence and predictive analytics are making these cyber-physical systems increasingly smart and autonomous, with unprecedented levels of performance and efficiency.


This trend is having a deep impact on water distribution systems as well. To solve water scarcity problems and to meet regulator demands for greater efficiency, water utility operators are adopting digital technologies and big data to improve leak detection, optimize infrastructure planning, reduce maintenance costs, and enhance customer service. The pace of adoption is often dictated by the urgency of the need, with water-scarce countries such as Australia and Israel being among the fore-runners in developing and adopting digital tools. [3]

The Security Risk and How to Mitigate It

The emergence of cyber-physical systems holds great promise for improving the quality of many aspects of our lives, but it also introduces the risk of increased exposure to cybercrime. Already in the late 1990’s the US President’s Commission on Critical Infrastructure Protection (CCIP) identified eight infrastructure systems, including water supply systems, that play a critical role in the fabric of modern society. If any one of these systems were to be brought down by a successful cyber attack, the impact on the economy and on daily life in general would be catastrophic. [4]

The US Homeland Security Department, and other governments around the world, are actively partnering with academia, industry, entrepreneurs and investors to advance interoperable, high-quality security solutions that can be deployed across cutting-edge infrastructures to secure the control systems — and the data they rely on — from cyber attacks. [5]

When it comes to water utilities, the following are some ways to mitigate the risk of a cyber attack [1]:

  • Build robust models for detecting and rapidly dealing with cyber attacks.
    One attack and defense model that has been proposed, for example, is the RAIM model [6], based on Real-time Monitoring for rapid Anomaly Detection and robust Impact Analysis and Mitigation Strategies.
  • Segregate control systems so that a breach will not create a domino effect across all essential functions.
  • Choose solutions that are secure by design.
  • Hire personnel who specialize in the field.
    More and more water utilities are establishing positions such as Chief Data Officer or Information Security Officer, whose job it is to help prepare, prevent, detect and respond effectively to ever-changing cyber threats.
  • Most cyber attacks are the result of human error, such as falling prey to phishing emails. All personnel in the facility need to be educated on the dangers of cyber threats and how to avoid them.

The Arad Group will be actively participating in WATEC 2017 and we are looking forward to the insights that will be shared by industry experts regarding the status of cyber security in the water industry and how it can be enhanced. We hope to see you there.

References

[1] Key to ensuring cyber security now and into future, Australian Water Association, June 30, 2017
[2] Department of Homeland Security, Cyber Security Division
[3] Frank Cespedes and Amir Peleg, How the Water Industry Learned to Embrace Data, Harvard Business Review, March 27, 2017
[4] Performance, Robustness, and Cyber Security of Critical Infrastructure Systems –  A Cyber-Physical Systems Research Theme
[5] Dr. Robert Griffin, Securing Critical Infrastructure in the 21st Century, Department of Homeland Security Science and Technology (S&T) Directorate, March 20, 2017
[6] C. Ten et al, Cybersecurity for Critical Infrastructures: Attack and Defense Modeling, IEEE Transactions, July 2010

The informationCyber Security and the Water Industry appeared first on Arad Group.