Industrial Systems: Red Hat, Canonical, and Security Problems
-
How Red Hat is reshaping the fabric of industrial computing at the edge with NVIDIA
Computing at the edge is fueling the need for special-purpose hardware and software infrastructure that complements computational capabilities found in a typical datacenter. The advent of Industry 4.0, the term often used to describe the fourth industrial revolution, has shifted the focus of industrial innovation toward the edge where operational technologies (OT) and traditional IT converge. This convergence requires organizations to adopt modern, software-defined practices that provide more effective and efficient data analysis closer to the source; implement on-premise artificial intelligence (AI) infrastructure for near real-time predictive analytics; and enable digital twin environments.
-
Ubuntu Core set to redefine industrial computing with new edge AI platform NVIDIA IGX | Ubuntu
Enterprises struggle to bring AI and automation to the edge due to strict requirements and regulations across verticals. Long-term support, zero-trust security, and built-in functional safety are only a few challenges faced by players who wish to accelerate their technology adoption.
At Canonical, we are excited by the promise of bringing secure AI and automation to the edge, and we look forward to providing a stable, open-source foundation for NVIDIA IGX, a new, industrial-grade edge AI platform announced by NVIDIA today. IGX is purpose built for high performance, proactive safety, and end-to-end security in regulated environments. The first product under the IGX platform is NVIDIA IGX Orin, designed to deliver ultra-fast performance in size and power. It’s ideal for use cases in manufacturing, logistics, energy, retail and healthcare.
-
CISA Releases Eight industrial Control Systems Advisories | CISA
CISA has released eight (8) Industrial Control Systems (ICS) advisories on September 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.