konnect Issue-date:30th September 2020.

The International Society of Automation – ISA-Bangalore section

Date: 26th September 2020
4 pm to 5:30 pm

“Automation Trends in Industrial Inspection”

Industrial inspection using Nondestructive Evaluation (NDE) technologies has undergone a phenomenal change in the way they are being developed, adopted, deployed and implemented in today's world. The highly multidisciplinary area of NDE is an integral part of every industry be it metals manufacturing, aerospace, automotive, power, nuclear, oil & gas, renewables, defence, etc. The continued and increasing demand for safety, reliability and productivity combined with the usage of newer materials and manufacturing processes, innovative and complex designs of components and structures for higher efficiencies, has also brought in increased adoption of automation in the industrial inspection world. The benefits accrued by several other allied domains through effective use of automation is also a motivation for accelerated deployment. The domains which are helping revolutionise the world of automation in Inspection are wide ranging from sensors, communications, digital, robotics, drones, electronics, high density interconnect, software, IIoT, materials, manufacturing, machine learning, artificial intelligence, data analytics, cloud infrastructure, virtual and augmented reality and many more. While each one of these is contributing to the change, it is the synergies between these multidisciplinary areas which is the true disrupting element of automation of the various elements in this lifecycle. This presentation will highlight the various trends being observed towards automation and its impact on industrial inspection.
Dr.Shyamsunder Mandayam
Former Principal Scientist, GE Research, Bangalore. Former Senior Scientist, IGCAR, Department of Atomic Energy, Kalpakkam Chairman, National Certification Board, ISNT
About the speaker :

In session-based authentication, the server has to remember the information, and whenever a request is made, it has to do a lookup to find the information. But, in JWT, all the data is stored in the token itself, and no information stored is in the server memory itself. And why is that great? You can then use the same token for multiple servers that you run without running into problems that one server has a piece of particular information, and the other server doesn’t.

This application of JWT is especially very useful in micro-services. In micro-services, multiple deployable products that are connected. Since there are various products, they all have their own individual servers. Now, in a session-based authorization, all the different servers must contain the user's information. So suppose three independent services are connected. The client makes a request to service two from the service one. The client has to re-enter all his details because the service two server doesn’t contain the information that service one server contains.

Whereas, in the case of JWT, if all the different servers share the same secret key, then a single JWT token can be used for authorization in all the various services. This makes JWT a handy tool for authorization purposes.