\"High value systems warrant hardcore hardening measures. The PI System resides at a critical junction, communicating across strict network boundaries. Under this paradigm, the PI System acts as a 'safe harbor' for data, defending critical systems by reducing the number ...
Year: 2018
This Live-Coding demonstration & presentation delves into the various search scenarios that empower the learner to fine-tune their searches for maximum benefit rather than settle for a one-size-fits-all solution. We will dive into the mechanics of how paging is implemented. ...
Year: 2018
Containerization has become a strong and viable alternative to physical and virtual machines. In this HowTo session, we will be exploring containerization, alternative technologies, and how to put an AF Server into a container.
Year: 2018
In this live-coding and optimization demonstration & presentation session, we’ll start out with a web application that uses PI Web API to present data from the PI System. While it satisfies the functional requirements, the refresh rate is too slow ...
Year: 2018
Fog Computing is at the heart for new IIoT infrastructures. This relatively new architecture includes the data collection, processing and routing at multiple levels - named Edge, Fog and Cloud. In this talk we will describe Fog Computing architectures and ...
Year: 2018