• Extreme PI System Hardening

    \"High value systems warrant hardcore hardening measures. The PI System resides at a critical junction, communicating across strict network boundaries. Under this paradigm, the PI System acts as a 'safe harbor' for data, defending critical systems by reducing the number ...
    Year: 2018

    Getting the most out of AFSearch

    This Live-Coding demonstration & presentation delves into the various search scenarios that empower the learner to fine-tune their searches for maximum benefit rather than settle for a one-size-fits-all solution.  We will dive into the mechanics of how paging is implemented.  ...
    Year: 2018

    How to Put Your AF Server into a Container

    Containerization has become a strong and viable alternative to physical and virtual machines. In this HowTo session, we will be exploring containerization, alternative technologies, and how to put an AF Server into a container.
    Year: 2018

    Writing Highly Performant PI Web API Applications

    In this live-coding and optimization demonstration & presentation session, we’ll start out with a web application that uses PI Web API to present data from the PI System. While it satisfies the functional requirements, the refresh rate is too slow ...
    Year: 2018

    Fog Computing on the Plant Floor

    Fog Computing is at the heart for new IIoT infrastructures. This relatively new architecture includes the data collection, processing and routing at multiple levels - named Edge, Fog and Cloud. In this talk we will describe Fog Computing architectures and ...
    Year: 2018