Smart manufacturing has the potential to improve the entire manufacturing industry.
The Internet of Things (IoT) combined with broadband connectivity allows us to create smart factories where every aspect of the manufacturing process can be monitored using artificial intelligence and predictive analytics and optimization. However, as the number of connected devices increases, so do the potential security risks, making cybersecurity a key consideration in smart factory design and implementation. In this article, we will discuss the advantages of smart manufacturing, the role of 5G in enabling smart manufacturing, and the importance of cybersecurity to protect digital assets and prevent cyber threats.
YuHelenYu invited industry thought leader Dez Blanchfield as a guest to host AT&T
Business Talks, and together we explored the exciting world of smart manufacturing, IoT, 5G, and MEC in making smart decisions , advantages in predicting demand and preventing downtime, while prioritizing strong network security.
The following is a summary of the discussion:
Q1. What does a smart factory look like in practice? What is the best case scenario?
YuHelenYu: Smart factory means applying smart technology to manufacturing operations. Through connectivity solutions such as IoT, video intelligence and 5G, we can use predictive analytics to make informed decisions, predict demand and prevent downtime. My ideal factory would also have an effective cybersecurity strategy that extends from the factory to remote workers, third-party vendors, and vendors to help protect against vulnerabilities that hackers could target.
Dez Blanchfield: I use infographics to illustrate the key components of a smart factory. The key drivers of smart manufacturing are digital technologies and fast telecommunications, both of which are drivers of innovation and digitization.
Maryson W.: Smart factories maximize edge computing by strengthening cybersecurity. Industry 4.0 requires more frameworks than just checklists, strategies or plans. As digital transformation eventually evolves into a race for digital survival, the hardest part will be Industry 5.0.
Q2. Why is 5G considered a catalyst for "smart factories"?
YuHelenYu: 5G is a catalyst because it provides higher bandwidth and lower latency, and enables real-time communication between machines, sensors, cameras and people. It allows more machines to connect to the network and communicate with each other, optimizing production processes in real time. 5G enables manufacturers to use sensors to track the location and condition of inventory in the supply chain and help prevent delays and reduce waste. It can use augmented reality technology in manufacturing. Technicians can use AR to visualize and solve problems.
Dez Blanchfield: Industry 4.0 is only possible in a high-speed, trusted, secure, low-latency, high-data-throughput network like 5G, because data is the catalyst for smart manufacturing.
Maryson W.: The litmus test has begun. If we want artificial intelligence to one day manage everything, now is the time to act. When factories have less manual monitoring of real estate, 5G could open the door to 4K security cameras. 5G can be summarized as the backbone of IoT, industrial IoT devices, and simplifying digital twin operations.
Q3. What is the difference between 5G and fiber optics? How do they help create a more reliable network?
YuHelenYu: Advanced wireless technologies such as 5G, edge or Wi-Fi can maximize the flexibility of connecting data collection endpoints. Advanced Internet solutions, such as commercial fiber optics, create the backbone for advanced wireless technologies to build the speeds required for real-time decision-making.
Dez Blanchfield: The key points here are that one is wireless (5G) and the other is "fixed wired" (fiber optic) technology. They offer distinct yet powerful and valuable solutions to manufacturing sites.
Q4. What expertise does a company need to build a reliable manufacturing network?
YuHelenYu: Everything starts with business priorities. The expertise required starts with what business outcome you want to achieve and then the technology required to achieve it. Some of the priority areas I see are artificial intelligence, machine learning, IoT, big data and analytics. Choosing the right partner with the required expertise is crucial.
Dez Blanchfield: Successful smart manufacturing companies will choose the right partners to design, deploy and manage their future networks while focusing on their core business.
Maryson W.: The probability that blockchain is not needed is less than 50%.
Q5. What is the role of cybersecurity in the digital revolution of manufacturing?
YuHelenYu: Cybersecurity plays a vital role in the digital revolution of manufacturing. As manufacturing facilities increasingly adopt industrial IoT devices, automation systems, and cloud computing, the attack surface for cyber threats is expanding. Cybersecurity measures are key to protecting digital assets. Implement firewalls, intrusion detection and prevention systems, access control mechanisms, and encryption protocols to prevent unauthorized access, data leakage, and other cyber threats. Cybersecurity in manufacturing also involves securing the supply chain, as many manufacturers rely on third-party suppliers for components and services.
Dez Blanchfield:: Security, or cybersecurity, has always played a key role in the development of manufacturing, and now it is a key element of the digital revolution.
#Q6. What are the biggest barriers to cybersecurity and reliability for manufacturers?
YuHelenYu: The biggest barriers to cybersecurity are a lack of awareness and expertise, as well as the increasing complexity of manufacturing networks as more digital technologies are adopted and various devices and systems are interconnected. Manufacturers may prioritize achieving production goals over safety due to perceived costs or a lack of understanding of potential risks. In addition, cyber attacks are becoming increasingly frequent and complex, posing major challenges to the security and reliability of the network.
Dez Blanchfield: Early barriers to digital transformation are often education or awareness, and the intelligent design and implementation of the right tools and systems to achieve them.
Q7. What is MEC and what role does it play in manufacturing network security and reliability?
YuHelenYu: MEC is a multi-access edge computing, a managed service that enables enterprise customers to differentiate specific data traffic in a private wireless network campus environment based on device, IP address and customer policy, and Route it to the specified client application. It allows factories to put decision-making intelligence into this edge computer, which can decide what to keep on the network. It prioritizes inherent security capabilities. This is a device that makes intelligent decisions within the factory. It brings edge computing closer to the manufacturer rather than to the edge of the cloud provider's network. It brings the benefits of cloud networking directly into the facility. It reduces complexity because it makes distributed decisions about what to retain.
Dez Blanchfield: MEC has proven to be a powerful enabler of digital technology, telecommunications, data analytics and manufacturing insights.
Maryson W.: Mobile edge computing (MEC) helps connect smart factories to the cloud, and of course requires self-healing networks as there are a wealth of automation technologies to choose from.
The smart factory of the future requires secure networks and reliable connections. This includes security at the device level, network level, edge and cloud. These overlapping layers of protection from AT&T help reduce risk and identify threats as they arise:
- Cybersecurity Strategy, Planning and Assessment Services
- DDoS Defense and Application Layer Security
- Managed Firewall Services
- AT&T Global Security Gateway
- Cloud Security Policy and Assessment
- Threat Detection and Response Solutions
The complexity of the modern security environment requires cybersecurity experts—managed security services are easier than training or hiring in-house experts. Choose a vendor with a history of trustworthy, enterprise-grade service.
As we continue to embrace the evolution of smart manufacturing, it is critical to prioritize security and connectivity to ensure a successful future. With AT&T's expertise in cybersecurity and reliable networks, smart factories can operate efficiently, sustainably and securely. Let’s work towards a future where data-driven insights and technological advancements drive innovation and success.
The above is the detailed content of What will the future of smart manufacturing look like?. For more information, please follow other related articles on the PHP Chinese website!

Since 2008, I've championed the shared-ride van—initially dubbed the "robotjitney," later the "vansit"—as the future of urban transportation. I foresee these vehicles as the 21st century's next-generation transit solution, surpas

Revolutionizing the Checkout Experience Sam's Club's innovative "Just Go" system builds on its existing AI-powered "Scan & Go" technology, allowing members to scan purchases via the Sam's Club app during their shopping trip.

Nvidia's Enhanced Predictability and New Product Lineup at GTC 2025 Nvidia, a key player in AI infrastructure, is focusing on increased predictability for its clients. This involves consistent product delivery, meeting performance expectations, and

Google's Gemma 2: A Powerful, Efficient Language Model Google's Gemma family of language models, celebrated for efficiency and performance, has expanded with the arrival of Gemma 2. This latest release comprises two models: a 27-billion parameter ver

This Leading with Data episode features Dr. Kirk Borne, a leading data scientist, astrophysicist, and TEDx speaker. A renowned expert in big data, AI, and machine learning, Dr. Borne offers invaluable insights into the current state and future traje

There were some very insightful perspectives in this speech—background information about engineering that showed us why artificial intelligence is so good at supporting people’s physical exercise. I will outline a core idea from each contributor’s perspective to demonstrate three design aspects that are an important part of our exploration of the application of artificial intelligence in sports. Edge devices and raw personal data This idea about artificial intelligence actually contains two components—one related to where we place large language models and the other is related to the differences between our human language and the language that our vital signs “express” when measured in real time. Alexander Amini knows a lot about running and tennis, but he still

Caterpillar's Chief Information Officer and Senior Vice President of IT, Jamie Engstrom, leads a global team of over 2,200 IT professionals across 28 countries. With 26 years at Caterpillar, including four and a half years in her current role, Engst

Google Photos' New Ultra HDR Tool: A Quick Guide Enhance your photos with Google Photos' new Ultra HDR tool, transforming standard images into vibrant, high-dynamic-range masterpieces. Ideal for social media, this tool boosts the impact of any photo,


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.