The Software that powers

Intelligent Factories

Intelligence to Manufacturing (I2M)

Manufacturing Intelligence Platform

Provides the intelligence and advanced analytics layer required by Industry 4.0: Artificial intelligence and machine learning, processing real-time advanced major algorithms that extract knowledge directly from manufacturing control and automation processes.
Autonomous and real-time, it interacts transparently and safely with the factory floor, being mission-critical software developed with the most modern software engineering techniques and with all the robustness characteristics required in the industrial area.
Their information is accessible via the intranet or the internet, making the manufacturing processes have full visibility and corporate access, allowing them to be managed simultaneously by key departments – production, maintenance, engineering, quality and plant management.
It is highly scalable, being able to manage from a single production cell to a Business Unit with hundreds of built-in industrial plants.

Big Data

Industrial Applications

Huge volumes of data, from the most varied sources available on the factory floor, are permanently monitored and analyzed in real time.
The Platform was designed to meet Big Data’s 5Vs:
 •Volume – must deal with the gigantic mass of data generated by the manufacturing process and automation process
 •Velocity – must have an adequate response time to analyze the data at the same rate as it is created in the production process (milliseconds)
 •Variety – must deal with diverse sources generating information dispersed in various formats (binary, analog, time curves, images, etc.)
 •Veracity – data are obtained from reliable and relevant sources and are treated to represent the reality of the process
 •Value – IM2 is fully business-oriented, focused on answering questions that can help you realistically manage manufacturing.

 

Artificial Intelligence

& Machine Learning

Artificial Intelligence and Machine Learning
The IM2 uses advanced technologies based on neural networks and fuzzy logic to model and understand the behavior of the productive process. Sophisticated algorithms analyze the information obtained applying specific knowledge and simulating the professional reasoning of experts in manufacturing processes:
 •Expertise and mindset of a Production Supervisor
 •Expertise and mindset of a Process Engineer
 •Expertise and mindset of an Automation Engineer
 •Expertise and mindset of a Production Engineer
 •Expertise and mindset of a Quality Analyst
 •Expertise and mindset of a Production Manager
 •Expertise and mindset of a Manufacturing Executive
It focuses on discovering models, trends and patterns not accessible to traditional analytical tools [Gartner]
 •Descriptive Analytics – What happened?
 •Diagnostic Analytics – Why Did It Happen?
 •Predictive Analytics – What will happen?
 •Prescriptive Analytics – How can we make it happen?
This makes it possible to extract managerial and engineering insights used to increase plant traceability, productivity, quality and reliability.

Cybersecurity

Encrypted and Digitally Signed

Designed following good international practices and to be compliant with safety standards such as those required by the US government [NIST – The National Institute of Standards and Technology].
All data from the industrial plant network remains protected and encrypted in the database.
In addition to encryption, is also digitally signed information, assuring its integrity (Authenticated Encryption with Associated Data). Any external access by Transport Layer Security (TLS) made, the same technology used by banking services. As they deal with critical data, monitored by quality audits (eg QS) and with recall influence, a robust system is required to meet international standards of information security [ISO/IEC 17799]:
 •Confidentiality – Guarantee that access to information will be limited only to legitimate users, that is, those authorized by the owner of the information.
 •Integrity – Ensuring that the information will retain all of the original characteristics established by the owner of the information, including change control and life cycle assurance (birth, maintenance and destruction).
 •Availability – Guarantee that information will always be available to legitimate users, that is, those authorized by the owner of the information.
 •Authenticity – Guarantee that the information is coming from an advertised source throughout the process and has not been mutated.
 •Irreversibility – Guarantee of the impossibility of denying authorship in relation to a previous transaction.