焊接事業(yè)部
在線留言
發(fā)送您的問(wèn)題或需求,我們將盡快與您取得聯(lián)系!
×
07/27/2020
Collecting, saving and evaluating data plays a leading role in digitised and networked production. To be able to design production processes more quickly, flexibly and effectively, all relevant information must be available at all times – even across companies and locations. New technologies, however, also harbour additional expense and significant security risks. The welding technology sector has recognised the significance of big data and is developing solutions to use sensitive data effectively whilst also safeguarding against unauthorised access.
Advancing digitisation and the use of new, web-based communication technologies have long been evident in our private lives, for example in the way we listen to music or store and share photos. A similar development is also occurring in industrial manufacturing: machines, load carriers, components and goods are being linked together to form overarching valueadded chains, whose elements communicate and seamlessly interact with each other. For all this to be possible however, all the relevant product and process data must exist in digital form and be made available to all the stations involved.
Data processing and analysis is on the march in the world of welding technology. Modern welding systems collect information about the current, voltage, wire speed, welding speed and time, as well as arc and dynamic correction or job numbers. “With the aid of this data, welding processes can be optimised and errors can be avoided,” explains Roland Schick, Technical Product Manager Welding Datamanagement & Applications at Fronius Perfect Welding. “Users are also able to seamlessly integrate welding systems into a networked and automated production environment.” For this reason, Fronius developed its own data management system, WeldCube, that allows power sources to be connected to each other via a network and the data to be retrieved on various devices via a web browser.
Using this data, however, also comes with additional expense: collection, storage and evaluation requires not only the appropriate technology, but also time, resources and expertise – even more so for large quantities of data sets. “Mass data collection, for example of the nature undertaken by large search engine operators, is therefore of less interest to industrial manufacturing firms,” adds Schick. “Instead of big data, the trend here is towards smart data; in other words, saving only what is relevant, instead of everything.” Exactly what that is varies from application to application. Collecting data on external factors such as humidity and temperature can provide important insights for the welding process. Combining these with device and process data and analysing them together could form the basis for further optimisations.
An important aspect is the security of the information that has been collected and stored. In many cases this is sensitive company data, which must not be permitted to fall into the wrong hands under any circumstances. “We are aware of the risks of data misuse, both for data stored locally and that processed in the cloud. That is why we not only have internal IT-security experts, but also work closely with external specialists in data security,” Schick explains.
There are various ways of protecting data. One of these is to adopt the latest cryptography methods to encrypt and authenticate data. Data would ideally be transferred according to the ‘end-to-end’ principle: the sender encrypts the information in a trusted environment with a system that can only be decrypted by the receiver in a similarly secure environment. Certificates that verify the authenticity of the data and the sender are also used. “Our customers’ data is sacred, which is why we adhere to the best possible standards,” emphasizes Schick. “In spite of this, in most companies there is a great deal of scepticism around networking and data exchange. We are trying to dispel such prejudices and illustrate the advantages. Users have to experience the benefits that digitisation will bring to their workplace; then acceptance will come.”
Security also involves protecting machines and equipment, e.g. power sources, against attacks from hackers. Due to the high degree of networking in the Internet of Things, it is possible for unauthorised access to parts of the industrial manufacturing environment to occur – whether that is to steal valuable data and know-how or to sabotage production operations. This also presents a challenge for device manufacturers. “At Fronius, the security of software products is already taken into account during the design phase,” explains Roland Schick. However, the user must also ensure sufficient security measures are implemented in their networks. This starts with changing default passwords to secure passwords according the latest technological standards.
For the future, the Fronius expert attests to the further potential of data collection in industrial applications: “With the right information, we can not only help our customers to optimise their welding processes, but also to take their requirements into account in our product developments.” The suggestions and wishes that Fronius service and application engineers bring back from their experiences in the field could thus be supported and made tangible through specific facts. “This data is also interesting to us. For example, we could see which software functions are being used most often, what we have to continue to develop and what we can simplify for the customer.” Schick is convinced that the software and data business will gain increasing significance for Fronius: “Whether it is for product and process updates or service and support; digital networking will allow us to help users more quickly, flexibly and cost-effectively in many matters. Trust in the new technology is a prerequisite for that.”