Está en la página 1de 4

Remote Management

The term remote management is used to describe any process in which the controlling device
is not physically attached to the actual unit. There are four aspects to this process:
i)

Communication method
The communication method used in a remote management system is dependent
upon the intended application. For example, communication with a drilling
machine in a mine cannot be based on a clear line of sight between the operator
and the machine. Instead, a dedicated radio frequency or wireless communication
channel is needed. The number of other machines and units controlled via a
remote management system has a huge impact on the effectiveness of the
communication method. Each unit must be controlled separately, with no
interference from other devices.

ii)

Level of control
The level of control provided via remote management is very important. Initially,
most of the equipment was very large, and the technology was used to get close
enough for manual control. However, operators now require a high degree of
precision and control. The tools used to control the equipment are extremely
sophisticated dashboards that can be used to create a program or to move the
machine in very small increments.

iii)

Operator training
The remote management operator typically sits in a separate location and is
responsible for controlling the equipment based on a video feed and similar
information. The training required to work with this type of equipment usually is
provided by the employer, because each system is different. The increased use of
these tools has resulted in the development of short courses and training programs
designed specifically to increase the level of skill of the operator.

iv)

Performance issues
One of the challenges of remote management is related to overall performance.
Operator expectations can be unduly influenced by images in the media of remotecontrolled robots that can be easily manipulated with great precision. In fact, a
significant amount of programming and effort is required to complete a process
with a remote-controlled device. Most of the adjustments that an operator would
make require additional time to execute in this model.

The primary reasons for implementing a remote management system are to improve safety
and increase productivity. Remote Management involves the usage of wireless LANs to track
warehouse and factory assets. It is an example of how a mainstream IT resource has been
adapted to benefit industrial environments. Some of the examples of remote management are
as follows:
1. Powerful remote management systems have been developed specifically to configure,
monitor and troubleshoot bar code readers and printers, RFID equipment, ruggedized
computers and other industrial. In this case the end users having one scanner that
reads codes in any orientation dramatically improves productivity.

2. RFID-enabled forklifts offer an opportunity for end-users to reduce investment in


reader infrastructure without compromising capability.
3. The U.S. Social Security Administration (SSA) implemented RFID systems in a
warehouse to track inventory and facilitate more efficient shipping to branch offices.
The SSA realized productivity improvements and incremental annual savings.
Network administrators have typically had little visibility or control over these remote
devices because enterprise IT asset and network management systems are made for
common PCs, servers, and network equipment and dont address the configurations
and usage conditions specific to data collection and computing in industrial
environments.
Here are a few examples of why general-purpose management systems have limited
effectiveness for preserving uptime and managing equipment used in supply chain operations.
a. Ruggedized computers are like office PCs in that they periodically require software
updates and security patches, and should be monitored to ensure consistency in
configurations and software versions.
b. Bar code and RFID smart label printers periodically need to be updated with new
label templates and bar code formats, and use thermal print technology, which
sometimes requires heat setting adjustments. Bar code printers have specialized
command languages, so they are largely incompatible with print monitors and other
applications made for office laser and inkjet printers.
c. RFID readers can be optimized for their immediate environment by changing power
output and making other tuning adjustments.
Device management software is available to meet all these needs plus provide real-time
monitoring and notification if devices go offline, and if implemented with open systems
standards, it can be accessed through enterprise network management solution (e.g. Tivoli).
Companies use such software to improve reliability and uptime in mission-critical
production, distribution and service operations. Such software is also extremely valuable
during rollouts and upgrades, because system administrators can use it to set configurations
and install software remotely and across groups of devices, instead of having to handle each
device individually. These features take a lot of the time and cost out of managing devices,
making it much more cost efficient to keep systems up-to-date with new software and
security enhancements.
Wireless and device Security
Stronger security is another mainstream business trend and requirement that is supported in
supply chain technology.
Securing mobile devices has become increasingly important in recent years as the numbers of
the devices in operation and the uses to which they are put have expanded dramatically. The
problem is compounded within the enterprise as the ongoing trend toward IT consumerization
is resulting in more and more employee-owned devices connecting to the corporate network.
Top five mobile security concerns are:

1. Device loss
If an employee leaves a tablet or smartphone in a taxi cab or at a restaurant, for
example, sensitive data, such as customer information or corporate intellectual
property, can be put at risk.

2. Application security
One problem is mobile apps that request too many privileges, which allows them to
access various data sources on the device. Many mobile apps especially free ones are
built with ties to advertising networks, which makes contacts, browsing history and
geolocation data extremely valuable to application developers. "Developers want to
monetize, consumers want free apps and then ad networks will pay developers to get
all of that juicy data from their users." Leaked corporate contacts, calendar items and
even the location of certain executives could put the company at a competitive
disadvantage.
Another concern is malicious or Trojan-infected applications that are designed to look
like they perform normally, but secretly upload sensitive data to a remote server.

3. Device data leakage


Nearly all of the chief concerns identified in the mobile security survey, from data
loss and theft to malicious applications and mobile malware, are sources of data
leakage. While most corporate access privileges on mobile devices remain limited to
calendar items and email, new mobile business applications can tap into a variety of
sources, if the enterprise accepts the risks. Increased corporate data on devices
increases the draw of cybercriminals who can target both the device and the back-end
systems they tap into with mobile malware.

4. Malware attacks
The vast majority of mobile malware are SMS Trojans, designed to charge device
owners premium text messages.

5. Device theft
Smartphone theft is a common problem for owners of highly coveted smartphones
such as the iPhone or high-end Android devices. The danger of corporate data, such as

account credentials and access to email, falling into the hands of a tech-savvy thief,
makes the issue a major threat to the IT security pros who took the survey.
Mobile computers can be locked down so customer information and other data cant be
accessed if the device is lost or stolen. Rugged wireless computers and data collection
equipment also support many of the leading securities used to protect enterprise wireless
networks. Wireless data collection devices that support Cisco Compatible Extensions (CCX)
can be fully included in a Cisco Unified Wireless Network and take advantage of all the
associated management, reliability and security features, including hacker and rogue access
point detection, authentication and encryption, integrated firewalls and more.
Business needs for security, real-time visibility, and up-to-date information dont stop at the
office door. These needs extend throughout supply chain operations, so reliable information
systems must extend just as far. Developments in mobile computing, wireless
communication, RFID, bar code and other data collection and communications technologies
are helping businesses extend visibility and control over more areas of their operations.

También podría gustarte