• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Technology Events 2026-2027
  • Sponsored Post
  • Technology Markets
  • About
    • GDPR
  • Contact

Cybernization of American Manufacturing: The Path Forward for Global Leadership

September 26, 2019 By admin Leave a Comment

The following is an opinion-editorial provided by Howard Grimes, associate vice president for institutional initiatives at The University of Texas at San Antonio, and Peter Koudal, senior research scientist of GE Research at General Electric Company.

By investing in digital and smart manufacturing, the U.S. can lead the world in manufacturing productivity, energy efficiency and innovation. But we must do so in a cyber secure manner. The challenge is enormous and the complexity of cybersecurity grows bigger every day with the explosion of digital linkages between manufacturers, suppliers, customers and employees along with the digitization of products and services. Digitization directly leads to increased energy efficiency, productivity, overall equipment efficiency and cost savings throughout the supply chain. Digital communication is critical for this smart manufacturing ecosystem, but our current legacy internet infrastructure – ARPANET, the precursor to the internet is 50 years old this year – was never designed with security in mind. Consequently, digitization of automation and manufacturing supply chains expands existing cyber-attack surfaces and creates new ones every minute of every day. We need to rethink the economics of cybersecurity and how we build cyber systems for the future of manufacturing.

According to Cisco Systems, the number of nodes in the Internet is expected to reach 50 billion by 2020, including humans, machines, devices, companies and government agents. Because each new node potentially exposes all network participants to cyber risks, essentially, the risk of the network correlates with the number of nodes in the network. This is what we posit is the other side of the coin to Metcalfe’s law, which states that the value of a telecommunications network is proportional to the square of the number of connected users of the system. Indeed, these attack surfaces across the network are of great interest to adversarial nation states and other threat agents as vehicles to damage our economy; destroy our energy, communications and logistics infrastructure; disrupt our manufacturing supply chains; and harm our soldiers and citizens. The 2019 President’s Budget includes $15 billion for cybersecurity, representing an increase of more than 4% in a single year. According to William Evanina, Director of the U.S. National Counterintelligence and Security Center, “The U.S. loses $400B a year due to IP, trade secrets, and other data thefts.”

We must fundamentally change our approach to cybersecurity and develop a new business model that enables a secure digital transformation to propel America to the forefront of manufacturing competitiveness. The new cyber secure paradigm must leverage emerging digital and economic tools to drive security and trust in cyber space. New digital technologies, such as pervasive cloud computing, peer-to-peer computing, advanced mobile networks (e.g. 5G networks), distributed networking and storage, secure distributed ledgers, crypto contracts, quantum key distribution, and trusted identity keys and digital passports are increasingly available for industrial applications at cost points significantly lower than those of legacy technologies. Enabling new microeconomic models with dramatically lower transaction costs will drive positive alignment of the actions of humans and machines with cybersecurity and business goals. These technologies enable the design of new cyber-secure architecture and systems that lead to newfound innovation in manufacturing supply chains while dramatically lowering system and transaction costs.

In this new world of cyber-secure manufacturing innovation, all participants in cyber systems (humans, machine tools, robots, network operators, companies, government agencies, etc.) can become economic participants in designing, implementing and operating a more secure cyber world.

The U.S. Department of Energy has recognized both the economic reality of current cybersecurity models and the growing cyber threat in this new world of digital manufacturing. They have asked nothing less than to rally to a common vision to create a cybersecurity approach and architecture that will unleash American manufacturing innovation for decades. A new cyber architecture must be industry-driven and result in a suite of methods, standards and tools that are rooted in the concept that everything in the manufacturing supply chain has a unique authentic identity, addresses the comprehensive landscape of complex vulnerabilities, and that can be economically implemented in a wide array of specific machines and environments. We must design systems of systems where cybersecurity is no longer a dreaded cost of doing business but a productive investment to drive growth and profitability in digital manufacturing. Achieving this new vision of digital manufacturing also requires a cyber-savvy work force. It is well known in the cybersecurity world that amateurs attack systems while professionals attack people. The “human in the loop” needs to become a cyber asset instead of a cyber risk. This new cyber architecture can create new job opportunities for tens of thousands of people. Not only are new jobs created but they are in exciting and vibrant innovative work environments as opposed to the iron foundry that one of us worked in as a young adult.

Filed Under: Tech Tagged With: Cybernization, digitization

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Apple Unveils MacBook Neo: A $599 Entry Into the Mac Ecosystem
  • Apple Unveils M5 Pro and M5 Max: A New Era for MacBook Pro, MacBook Air, and Studio Display
  • Apple iPhone 17e: Performance, Practicality, and a Smarter Entry Point into the iPhone 17 Family
  • Apple iPad Air M4 Arrives With 12GB Memory, Wi-Fi 7, and a Serious AI Push
  • Ericsson and Intel Are Redefining What 6G Is Actually For
  • Hollow-Core Fibre, Light Running Through Air Instead of Glass
  • Revel Raises $150M to Modernize the Software Backbone of Mission-Critical Hardware
  • Samsung Galaxy S26 Series: Polished, Predictable, and Playing It Safe
  • SambaNova Unveils SN50 AI Chip, Secures $350M+ Funding, and Strikes Strategic Intel Partnership
  • Aalyria Raises $100M Series B to Build the Control Plane for the Space Internet

Media Partners

  • Market Analysis
  • Cybersecurity Market
Memory Crunch: Why Prices Are Surging and Why Making More Memory Isn’t Easy
The End of Accounting as We Knew It
The Era of Superhuman Logistics Has Arrived: Building the First Autonomous Freight Network
Why Nvidia Shares Jumped on Meta, and Why the Market Cared
Accrual Launches With $75M to Push AI-Native Automation Into Core Accounting Workflows
Europe’s Digital Sovereignty Moment, or How Regulation Became a Competitive Handicap
Palantir Q4 2025: From Earnings Beat to Model Re-Rating
Baseten Raises $300M to Dominate the Inference Layer of AI, Valued at $5B
Nvidia’s China Problem Is Self-Inflicted, and Washington Should Stop Pretending Otherwise
USPS and the Theater of Control: How Government Freezes Failure in Place
Day Zero Threat Research Summit, August 30 – September 1, 2026, Las Vegas
CrowdStrike Returns to Profit as Revenue Climbs to $1.31 Billion in Q4
Cloudflare 2026 Threat Report Signals the Automation of Cyberwar
Fal.Con Gov 2026, March 18, Washington, D.C.
Huper Corporation Raises $1.5M Pre-Seed to Build a Security-First AI Chief of Staff
CyberBay Summit 2026, March 11–13, Tampa, Florida
Zscaler’s Q2 Beat and the Market’s Reluctance to Celebrate
AI as the New Insider: Why Trust, Not Code, Is Now the Weakest Link
Cybersecurity Meets Corporate Travel: Darktrace Chooses AI-Driven Navan to Power Global Mobility
Black Hat Asia 2026, April 21–24, Singapore

Media Partners

  • Market Research Media
  • Technology Conferences
The Rise of Faceless Creators: Picsart Launches Persona and Storyline for AI Character-Driven Content
Apple TV Arrives on The Roku Channel, Expanding the Streaming Platform Wars
Why Attraction-Grabbing Stations Win at Tech Events
Why Nvidia Let Go of Arm, and Why It Matters Now
When the Market Wants a Story, Not Numbers: Rethinking AMD’s Q4 Selloff
BBC and the Gaza War: How Disproportionate Attention Reshapes Reality
Parallel Museums: Why the Future of Art Might Be Copies, Not Originals
ClickHouse Series D, The $400M Bet That Data Infrastructure, Not Models, Will Decide the AI Era
AI Productivity Paradox: When Speed Eats Its Own Gain
Voice AI as Infrastructure: How Deepgram Signals a New Media Market Segment
COMPUTEX 2026, June 2–5, Taipei
360° Mobility Mega Shows 2026, April 14–17, Taipei
Forrester CX Summit Series 2026: Amsterdam, New York, San Francisco
IAMPHENOM 2026, March 10–12, Pennsylvania Convention Center, Philadelphia
Billington State and Local CyberSecurity Summit, March 9–11, 2026, Washington, D.C.
Mobile World Congress (MWC) 2026 – 2–5 March, Barcelona, Spain
The AI Summit London, 10–11 June 2026, Tobacco Dock, London
aim10x Digital 2026, March 18, Virtual
Harvard Business Review Strategy Summit, February 26, 2026, Virtual
International Compact Modeling Conference, July 30–31, 2026, Long Beach, California

Copyright © 2022 Technologies.org

Media Partners: Market Analysis & Market Research and Exclusive Domains, Photography