Secure & Democratize the Data in Your Customer's Brownfield Devices
Offered By: Opto Video via YouTube
Course Description
Overview
Syllabus
Introduction
Agenda
Three Goals
Three Technologies
Find Out Where Your Clients Stand
Edge Technology
Conventional Systems
Edge Computing
PubSub Architecture
Guidelines
System Architecture
MQTT
Canary Historian
Scale
Architecture
Remote Access
Conduits
Live Demo
Logging In
Secure Connection
Centralized Management
User Accounts
Network Setup
Firewall
Secure Connections
Certificates
Conduit
Rules
Data democratization
Native client
Persistent connection
Always know the state
Ignition Edge
Edit A B Driver
A B Data Tags
Cooking Cam
Scada
Public Website
Data Consumption
Logging Out
Back Up
Dashboard
Tesla Stock
Scada Dashboard
Secure Devices
CanaryHistorian
Historian Demo
Product Overview
Software Titles
Remote IO
Configurable IO
Quality Reliability
Our Innovation History
Opto Partner Program
Learning Center
Q A
Taught by
Opto Video
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network