Documente Academic
Documente Profesional
Documente Cultură
The term remote management is used to describe any process in which the controlling device
is not physically attached to the actual unit. There are four aspects to this process:
i)
Communication method
The communication method used in a remote management system is dependent
upon the intended application. For example, communication with a drilling
machine in a mine cannot be based on a clear line of sight between the operator
and the machine. Instead, a dedicated radio frequency or wireless communication
channel is needed. The number of other machines and units controlled via a
remote management system has a huge impact on the effectiveness of the
communication method. Each unit must be controlled separately, with no
interference from other devices.
ii)
Level of control
The level of control provided via remote management is very important. Initially,
most of the equipment was very large, and the technology was used to get close
enough for manual control. However, operators now require a high degree of
precision and control. The tools used to control the equipment are extremely
sophisticated dashboards that can be used to create a program or to move the
machine in very small increments.
iii)
Operator training
The remote management operator typically sits in a separate location and is
responsible for controlling the equipment based on a video feed and similar
information. The training required to work with this type of equipment usually is
provided by the employer, because each system is different. The increased use of
these tools has resulted in the development of short courses and training programs
designed specifically to increase the level of skill of the operator.
iv)
Performance issues
One of the challenges of remote management is related to overall performance.
Operator expectations can be unduly influenced by images in the media of remotecontrolled robots that can be easily manipulated with great precision. In fact, a
significant amount of programming and effort is required to complete a process
with a remote-controlled device. Most of the adjustments that an operator would
make require additional time to execute in this model.
The primary reasons for implementing a remote management system are to improve safety
and increase productivity. Remote Management involves the usage of wireless LANs to track
warehouse and factory assets. It is an example of how a mainstream IT resource has been
adapted to benefit industrial environments. Some of the examples of remote management are
as follows:
1. Powerful remote management systems have been developed specifically to configure,
monitor and troubleshoot bar code readers and printers, RFID equipment, ruggedized
computers and other industrial. In this case the end users having one scanner that
reads codes in any orientation dramatically improves productivity.
1. Device loss
If an employee leaves a tablet or smartphone in a taxi cab or at a restaurant, for
example, sensitive data, such as customer information or corporate intellectual
property, can be put at risk.
2. Application security
One problem is mobile apps that request too many privileges, which allows them to
access various data sources on the device. Many mobile apps especially free ones are
built with ties to advertising networks, which makes contacts, browsing history and
geolocation data extremely valuable to application developers. "Developers want to
monetize, consumers want free apps and then ad networks will pay developers to get
all of that juicy data from their users." Leaked corporate contacts, calendar items and
even the location of certain executives could put the company at a competitive
disadvantage.
Another concern is malicious or Trojan-infected applications that are designed to look
like they perform normally, but secretly upload sensitive data to a remote server.
4. Malware attacks
The vast majority of mobile malware are SMS Trojans, designed to charge device
owners premium text messages.
5. Device theft
Smartphone theft is a common problem for owners of highly coveted smartphones
such as the iPhone or high-end Android devices. The danger of corporate data, such as
account credentials and access to email, falling into the hands of a tech-savvy thief,
makes the issue a major threat to the IT security pros who took the survey.
Mobile computers can be locked down so customer information and other data cant be
accessed if the device is lost or stolen. Rugged wireless computers and data collection
equipment also support many of the leading securities used to protect enterprise wireless
networks. Wireless data collection devices that support Cisco Compatible Extensions (CCX)
can be fully included in a Cisco Unified Wireless Network and take advantage of all the
associated management, reliability and security features, including hacker and rogue access
point detection, authentication and encryption, integrated firewalls and more.
Business needs for security, real-time visibility, and up-to-date information dont stop at the
office door. These needs extend throughout supply chain operations, so reliable information
systems must extend just as far. Developments in mobile computing, wireless
communication, RFID, bar code and other data collection and communications technologies
are helping businesses extend visibility and control over more areas of their operations.