Schneider Electric Limited - Experts & Thought Leaders

Latest Schneider Electric Limited news & announcements

Innodisk AI solutions: Transforming smart manufacturing

Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams around the world. Innodisk's innovative development Gearing Up Production to Drive AI Business Growth The year 2024 marks a period of innovative energy for Innodisk, with the simultaneous launch of new products and technologies. The latest manufacturing plant will begin production on various edge AI products, focusing on three core technologies: "AI Acceleration,” “Vision-Driven,” and “Custom Integration.” For "AI Acceleration," Innodisk's subsidiary Aetina recently launched the NVIDIA MGX Server, the group's first edge AI server. Innodisk also introduced industrial-grade CXL 2.0 memory and E1.S/E3.S edge server SSDs for AI and high-speed edge computing. "Custom Integration" displays group's core spirit of small-volume, diverse, and highly customised keys "Vision-Driven" showcases Innodisk's innovative development in edge AI machine vision, including the pioneering MIPI over Type-C extension patent technology for embedded cameras. "Custom Integration" embodies the group's core spirit of small-volume, diverse, and highly customised solutions. With the accelerated development of global edge AI and the increased production capacity of the manufacturing plant, Innodisk expects to speed up the realisation of innovative technologies and enable the effective deployment of products and AI solutions in practical scenarios. Demonstrating edge AI solutions in practice Innodisk set an AOI AI secondary inspection key for smart manufacturing to enhance production While promoting smart transformation for clients, Innodisk is also implementing these practices by transforming its production centre into a model for smart manufacturing and management. Collaborating with Aetina, NVIDIA, and through the Metropolis for Factories framework, Innodisk developed an AOI AI secondary inspection solution for smart manufacturing to enhance production line efficiency. Additionally, Innodisk's subsidiary Millitronic, in collaboration with Schneider Electric and ASPEED Technology, developed a panoramic smart visualisation remote management solution for the plant's data centre.  This solution transforms traditional on-site inspections into real-time remote management, displaying data and enabling remote monitoring. Furthermore, the iCAP Air solution, announced this year, will connect multiple sensors to measure temperature, CO2, and other air indicators, providing real-time alerts for abnormal values and facilitating prompt facility management. This comprehensive application will ensure employee health and product quality. Creating a base for training AI talent With the inauguration of the Phase II manufacturing plant, Innodisk is focusing on recruiting AI-related talent. The company, which has locations in the USA, Europe, Japan, China, and more, invites global tech professionals to join its team. This expansion supports Innodisk's goal of promoting innovation and advancing edge AI solutions worldwide.

AVEVA launches CONNECT, the world’s pioneering industrial intelligence platform, at Hannover Messe

AVEVA, a global pioneer in industrial software, driving digital transformation and sustainability, has chosen Hannover Messe to unveil CONNECT, the world’s fastest-growing industrial intelligence platform providing trusted and actionable insights to decision-makers in diverse sectors.  CONNECT empowers industrial pioneers with a deeper understanding of their business and an intelligent digital twin that unifies insights across their industrial ecosystem to drive performance, optimise efficiency, and maximise sustainability for increased ROI. Built on the trusted software of AVEVA, CONNECT brings together applications from diverse other providers including Schneider Electric, RIB, ETAP, and other partners.  New levels of sustainability CONNECT also empowers industries with scalable capabilities that can unlock new levels As an open and neutral digital platform spanning the entire industrial lifecycle in real-time, CONNECT offers native data services, visualisation services, modelling and analytics capabilities, application development services, as well as service and usage management. Within a single experience, the platform brings together data, the digital twin, industrial artificial intelligence, and deep domain expertise. Thanks to its cloud foundation on Microsoft Azure, CONNECT also empowers industries with scalable capabilities that can unlock new levels of sustainability and efficiency. Benefits of global collaboration During the press conference held at Hannover Messe, Caspar Herzberg, CEO, AVEVA declared, “The connected industrial economy will unlock the benefits of global collaboration across the industrial ecosystem. As the world’s pioneering industrial intelligence platform, CONNECT empowers industrial teams with a holistic understanding of the value chain and sparks real-time innovation at every level." "Enhanced with analytics and AI, this unique and complete data ecosystem provides unparalleled efficiency in one frictionless environment, where teams are empowered to engineer smarter, operate better and drive profitability." AI-infused platform “CONNECT is accelerating the next wave of industrial digital transformation (Industrial DX 2.0). This AI-infused platform shares and unifies relevant industrial intelligence in the cloud to drive enhanced efficiency, productivity, and sustainability for companies, their partners and customers." "From streamlining workflows to real-time monitoring and control, to improving remote collaboration, and maximising the end-to-end lifecycle performance of industrials assets, CONNECT addresses the industry’s digital transformation needs,” Herzberg added.  Enabling a custom industrial ecosystem CONNECT enables industrial enterprises to make the most of their technology investment in the cloud CONNECT enables industrial enterprises to make the most of their technology investment in the cloud by combining remote assets, applications from AVEVA, and third-party data sources into one single, secure platform, creating a unique industrial ecosystem calibrated for game-changing innovation.   According to IDC’s 2023 Future of Industry Ecosystems global survey, the vast majority (90%) of 1288 industrial C-suite and business pioneers said they planned to maintain or accelerate their investment in their unique data ecosystems. IDC’s survey spanned decision-makers across energy, construction, process manufacturing, government and other industries around the world.  How CONNECT unlocks new industry paradigms Featured products within CONNECT's near-limitless boundaries include the AVEVA PI System ZGlobal, a California-based consulting firm, closed the gap between insight and emissions reduction using CONNECT’s cloud-based data-sharing solutions to consult and contextualise in real-time insights from across their solar power ecosystem. Tangible outcomes include enhanced transparency for both companies and their partners, thousands of dollars saved, and thousands of metric tons of carbon emissions avoided—all while enabling the clean energy transition. CONNECT is already used by tens of thousands of active users each month. Featured products within CONNECT's near-limitless boundaries include AVEVA PI System, AVEVA Operations Control, AVEVA Unified Engineering, AVEVA Advanced Analytics, AVEVA Asset Information Management, RIB CostX, and more. New industrial applications The CONNECT ecosystem is growing to include new and exciting partnerships that will form the basis of a new industrial applications marketplace. For example, AVEVA and Microsoft unify and contextualise production execution data and supply chain production planning data in Microsoft Fabric, using AVEVA’s industrial intelligence platform, CONNECT, and Microsoft Cloud for Manufacturing.  Matt Kerner, CVP Microsoft Cloud said: “CONNECT bridges the gap between operational technology and information technology. CONNECT seamlessly integrates data, enables real-time monitoring, leverages predictive analytics, and ensures cloud scalability. This solution empowers our customers to optimise processes, enhance quality, and drive efficiency.”

Schneider Electric announces partnership with IPConfigure to offer enhanced security solutions for buildings

Schneider Electric, the pioneer in digital transformation of energy management and automation, announced a new partnership with IPConfigure, a managed service provider of business security, to integrate cutting-edge video surveillance solutions into Schneider Electric's EcoStruxure™ Buildings platform. The combination of Schneider Electric's Access Expert and Security Expert products with IPConfigure's Orchid video management system (VMS) will provide an unparalleled security ecosystem, offering a comprehensive and integrated solution for protecting people, assets, and data. Orchid is the industry's simplest and most scalable video management platform, highly adaptive to both greenfield and existing security projects. The platform offers an intuitive user experience accessible from any device. Orchid will be integrated with EcoStruxure's two security technology platforms: Security Expert, which unifies physical access control and intrusion detection, and Access Expert, which offers mobile cloud security with video monitoring, alarms, visitor management, and building operations. The partnership empowers customers to streamline the adoption of a comprehensive building solution encompassing efficiency, security, and occupant needs, significantly simplifying the process through a new, scalable cloud management tool. Future-proof buildings "The partnership with IPConfigure reflects Schneider Electric's commitment to a digital future that offers our channels and customers long-term technology solutions that modernise and future-proof buildings," said James Mylett, Senior Vice President of U.S. Digital Buildings at Schneider Electric. "Matching the needs of the customer with both Schneider Electric and IPConfigure's standard of providing a single-source, simplified security management and building operations tool has always been top priority, in addition to excellent service, insight and leadership for our products." EcoStruxure EcoStruxure and Orchid's flexible, intuitive Security Solutions are currently being used by global and national enterprises, including some of the largest fast-food companies, retailers, and school districts in the U.S. Features of Orchid that will be integrated with EcoStruxure include: On-Premise and Cloud Options: Orchid supports single to multi-site configurations locally or via the cloud. It offers solutions for both private networks, hybrid cloud (local recording with cloud management), or pure cloud configurations. OS and Hardware Agnostic: Orchid can be installed on Windows or Linux devices to record thousands of different camera models using open standards such as Open Network Video Interface Forum (ONVIF). Scalable Recording Environments: Orchid enables the recording and management of any number of cameras, locations, and users through a single interface, accommodating from one to an unlimited scale seamlessly. Customisable Interfaces: Orchid utilises open standards, providing a complete web browser interface and an open API for seamless third-party integrations. The accessible RESTful API enables effortless customisation and script development for both technology partners and customers. Seamless User Access: A refreshingly intuitive, browser-based interface has been shown to encourage swift adoption and increased usage of the camera system. Single Sign-On integrations automatically adjust users to allow secure access throughout changing roles in the organisation. Easily grant permissions access to selected capabilities, cameras, and locations with specific users and user groups. Digital security needs "Our Orchid video management platform embodies simplicity at its core, offering users a seamless and straightforward solution," said Christopher Uiterwyk, CEO of IPConfigure. "Pairing it with EcoStruxure equips users with the precise technology needed to swiftly and decisively address their digital security needs with unparalleled efficiency and effectiveness." Orchid's integration with Schneider Electric's EcoStruxure Buildings platform will put pioneering video security technology into EcoStruxure's existing energy management tools that outfit new and existing buildings with smart technologies that enable measurement of energy usage. This integration extends both companies' global reach, delivering deployment for global architectures and substantial benefits to multinational customers seeking enhanced security and energy efficiency solutions

Insights & Opinions from thought leaders at Schneider Electric Limited

Our top-10 click-worthy articles in 2019 highlighted changing industry trends

The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2019 that generated the most page views. They are listed in order here with a brief excerpt. 1. Schneider Electric to sell Pelco to private equity firm Schneider entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software. 2. High-tech drones, robots and counter-drone solutions on display From robots to drones to counter-drone solutions, a range of new technologies [was] displayed at ISC West 2019. The Unmanned Security Expo [included] a dedicated complimentary education theater for attendees offering sessions on a range of topics. Also included [were] demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. 3. Hikvision and Dahua banned from buying U.S. exports In effect, inclusion on the “entities” list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Hikvision and Dahua have contracts to sell equipment that provides video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. 4. The many faces of today's facial recognition technology Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future. From street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. 5. Security industry trends to be led by focus on cyber security In 2019 With a more open, connected environment come cyber-risk and data privacy concerns – which is why, in the Security Industry Association’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. 6. Open Supervised Data Protocol (OSDP): the gold standard for access control installations The Open Supervised Data Protocol (OSDP) is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging, de facto Wiegand wiring standard. OSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. 7. Honeywell embracing AI, reinvesting in video portfolio Although uses for artificial intelligence (AI) are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. 8. A secured entrance is the first defense against an active shooter What the majority of venues [of recent active shooter incidents] have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. 9. Debunking the myths of the security of access control systems One of the areas where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smart cards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. 10. At Chubb Fire and Security, ethics is a core concept with practical impact Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process.

Schneider Electric to sell Pelco to private equity firm

Schneider Electric’s long-rumored sale of Pelco appears to be on the verge of consummation. Schneider this week entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software. Revenue in 2018 was about $185 million. Pelco currently employs a staff of 478. Pelco was sold to Schneider Electric for $1.22 billion in 2007 to enhance Schneider’s building automation business Transom Capital Group, Los Angeles, is an “operationally focused” private equity firm that invests in companies in the lower-middle market. Their management claims “industry expertise to create improved operational efficiency, significant top-line growth, cultural transformation and overall distinctive outcomes.” Presumably a “turnaround” initiative could reinvigorate Pelco after several years of decline. Transom promotes an “approachable, collaborative, and down-to-earth problem-solving approach.” Founded in 1957 and originally specialising in pan-tilt devices and joysticks, Pelco rose to prominence as an independent company in Fresno, Calif. Expanding to distribution in more than 130 companies, Pelco succeeded in part through an emphasis on customer service. The company was sold to Schneider Electric for $1.22 billion in 2007 to enhance Schneider’s building automation business. The Pelco business has declined substantially under the Schneider umbrella, and the synergies with building automation were never realised. Pelco has been rumored for sale for several years. The sale would come after Schneider’s announcement it would be reviewing assets totaling 1.5 billion to 2 billion Euros of revenue In recent years, Pelco has focused on its VideoExpert video management system as the core of end-to-end solutions targeting vertical markets. The company sought to re-establish its position as a global leader in surveillance and security, with new technologies, integrations, quality advancements along with significant support initiatives to provide value and innovation to the security industry community. The sale would come after Schneider’s announcement it would be reviewing assets totaling 1.5 billion to 2 billion Euros of revenue as it looks to focus on energy management and industrial automation. Schneider did not say how much Pelco would be sold for but said the company would book a non-cash loss on disposal of up to $250 million. However, its adjusted earnings before interest, taxes, and amortisation margin would rise by around 10 basis points.

Avoid damaging network breaches with reevaluated cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer a breach at some point, introducing risks that can lead to business interruption, financial loss, reputational damage and more. How we view and evaluate cybersecurity In light of these realities and the potential fallout of network breaches, it is time to change the way we as an industry view and evaluate cybersecurity. Rather than seeing the technologies and practices for securing networks from a cost perspective, we must instead carefully consider the value of cybersecurity through the lens of the damage and potential liabilities of a breach caused by cybersecurity failures. Traditional cost-centered views of cybersecurity are not only outdated but are also inaccurate, as securing the network begins far before the implementation of a cybersecurity solution – with best practices including a number of basic precautions that do not require major investments. Security passwords and credentials One of the most effective measures security professionals can take to decrease the likelihood that an IP device will be a hacker’s point of entry to a network is also one of the most basic: change default passwords. But as straightforward and obvious as this may be, the truth is that many networked surveillance cameras and other security technologies deployed in the field are still using default settings. Some estimates put their number of these IP devices in the hundreds of thousands. The truth is that many networked surveillance cameras and other security technologies deployed inthe field are still usingdefault settings  Cyber criminals know that there are websites dedicated to listing known default passwords for any number of branded IP devices, including cameras, access control hardware and more. This means these devices are essentially broadcasting to anyone who wants to put forth the effort it would take to access them. Not surprisingly, when hackers attempt to compromise a device, the first thing they try is the default password with an unbelievably high rate of success. The only reason this risk exists is because installers and/or end users far too often fail to take the incredibly simple step of creating new passwords for IP devices when they are deployed. This is both unacceptable and unnecessary. Segmented surveillance networks Another critical step organisations can take to protect their IP cameras, recorders and other security devices from intrusion is to isolate the security surveillance network from networks used for general operations. Physically or virtually separating your security surveillance network from the general, internet-facing network prevents hackers from accessing surveillance systems, helping to protect your valuable, sensitive information. For achieving this segmentation, virtual LANs are recommended. These networks separate traffic between surveillance systems and other devices on the network. Organisations can protect their security devices from intrusion by isolating the security surveillance network from general operations networks Physical access tampering Surprisingly, not all network intrusions are committed remotely by hackers using sophisticated technologies and methods to remotely gain access. Cybercriminals have considerable expertise in breaking into facilities and often begin their crimes with physical access to the systems they are looking to compromise.  With physical access, individuals can reset any IP device to defaults, allowing new settings to be configured and security to be compromised. The first step in preventing this from happening is to install devices in locations where they cannot be reached easily, preferably within appropriate vandal-resistant housing that prevents physical access and damage. Tampering detection technology should also be employed to quickly detect any unauthorised access, and any cabling should be run through conduits or behind or through walls to prevent them from being unplugged or otherwise intercepted. This is also where the entire physical security programme, from access control to guards to software, provides protection for itself in addition to protecting the organisation’s premises and personnel. Monitored user permissions Another technique for preventing unwarranted or unauthorised access to data and settings is for organisations to restrict user permissions for both local and remotely connections to networks or devices. A best practice for applying user permissions is the least privilege principle, which limits the features users may access to the minimum users require to perform their necessary functions. Additionally, any guest access to networks or devices should enable very limited functionality and access. It is imperative that security professionals and/or end users ensure surveillance systems are up to date Identify and exploit software vulnerabilities A common approach hackers employ is to identify and exploit software vulnerabilities, relying especially on versions that have not been updated to improve security. Once a vulnerability has been found, it is quickly shared online, which opens the door for multiple individuals to easily access devices running outdated firmware and potentially gain access to the network itself. Recognising this, software providers continually release updates that deliver improvements to close these open doors and protect users from unauthorised intrusions. However, no update can be effective if it isn’t installed, which is often the case, leaving devices and networks vulnerable to attacks. It is imperative that security professionals and/or end users ensure surveillance systems are up to date. All it takes is a few clicks to improve the cybersecurity protection of devices and networks. Effective cybersecurity tactics Unfortunately, network intrusions are here to stay and given the increasing sophistication of the tools and tactics hackers employ, the problem will only get worse. In the security industry, we must shift our view of cybersecurity away from costs and consider the value of preventing breaches. By employing some very basic but effective tactics, organisations can substantially increase the security of their networks and help to protect the sensitive data and assets they contain.

Quick poll
Which AI-powered capability will dominate in the years ahead?