top of page

BLOGS

Below are a series of blogs about technical and societal aspects of the ZDMP project. Further blogs on the winning subprojects can be found HERE.

ZD logo Final feb transparent.png
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog56

Women in ZDMP - Andreea Paunescu

View Blog56 - Women in ZDMP - Andreea Paunescu
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog52

Storage

View Blog52 - Storage
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog48

ZDMP and Manufacturing Industry

View Blog48 - ZDMP and Manufacturing Industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog44

Distributed Computing

View Blog44 - Distributed Computing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog40

Application Run-time for zApps

View Blog40 - Application Run-time for zApps
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog36

Application Builder

View Blog36 -  Application Builder
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog32

Manufacturing IT Plarforms

View Blog32 - Manufacturing IT Plarforms
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog28

Industry 4 Factory Solutions (i4FS)

View Blog28 - ZDMP Blog28 - Industry 4 Factory Solutions (i4FS)
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog24

Prediction and Optimisation Run-Time

View Blog24 - Prediction and Optimisation Run-Time
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog20

AI Analytics

View Blog20 - AI Analytics
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog16

Process Orientated Artificial Vision in Industry

View Blog16 - Process Orientated Artificial Vision in Industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog12

Gender action Plan

View Blog12 - Gender action Plan
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog08

Non-Destructive Inspection in manufacturing

View Blog08 - Non-Destructive Inspection in manufacturing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog04

How Surface Inspection leads to zero defect manufacturing

View Blog04 - How Surface Inspection leads to zero defect manufacturing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog55

Women in ZDMP - Alessia Focareta

View Blog55 - Women in ZDMP - Alessia Focareta
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog51

ZDMP Electronics Case

View Blog51 - ZDMP Electronics Case
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog47

ZDMP and OEE Improvement through data analytics

View Blog47 - ZDMP and OEE Improvement through data analytics
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog43

Zero Defect Manufacturing in Aerospace

View Blog43 - Zero Defect Manufacturing in Aerospace
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog39

ZDMP Portal

View Blog39 - ZDMP Portal
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog35

Autonomous Computing

View Blog35 - Autonomous Computing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog31

Cross platform Interlinking

View Blog31 - Cross platform Interlinking
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog27

Women in ZDMP - Daniela Kirchberger

View Blog27 - Women in ZDMP - Daniela Kirchberger
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog23

Zero Defects through Process Quality Assurance in Industry 4.0

View Blog23 - Zero Defects through Process Quality Assurance in Industry 4.0
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog19

AI Analytics Runtime

View Blog19 - AI Analytics Runtime
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog15

Secure communication channels in Industry

View Blog15 - Secure communication channels In Industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog11

Securely Installing Third-party Apps for Industry 4.0

View Blog11 - Securely Installing Third-party Apps for Industry 4.0
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog07

Legal Issues Data Exchange

View Blog07 - Legal Issues Data Exchange
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog03

IIoT - Monitoring Critical Assets

View Blog03 - IIoT - Monitoring Critical Assets
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog54

Decision Making Using Data

View Blog54 - Decision Making Using Data
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog50

Women in ZDMP - Laura Caroline Ribeiro de Melo

View Blog50 - Women in ZDMP - Laura Caroline Ribeiro de Melo
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog46

Data Privacy

View Blog46 - Data Privacy
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog42

Applying Industry 4.0 component inspection in Electronic Automotive production

View Blog42 - Applying Industry 4.0 component inspection in Electronic Automotive production
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog38

Human Collaboration Environment

View Blog38 - Human Collaboration Environment
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog34

Monitoring and Alerting

View Blog34 - Monitoring and Alerting
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog30

Project Clustering

View Blog30 - Project Clustering
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog26

Standardization

View Blog26 - Standardization
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog22

Open Source to Achieve Zero Defects

View Blog22 - ZDMP Blog22 - Open Source to Achieve Zero Defects
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog18

Service and Message Bus

View Blog18 - Service and Message Bus
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog14

ZDMP and the Automotive industry

View Blog01 - ZDMP and the Automotive industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog10

Why the Construction industry has a place in Industry 4.0

View Blog10 - Why the Construction industry has a place in Industry 4.0
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog06

Orchestration Design and Run-Time

View Blog06 - Orchestration Design and Run-Time
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog02

Fault detection and diagnosis in Industry 4.0

View Blog02 - Fault detection and diagnosis in Industry 4.0
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog53

Analytics in Industry

View Blog53 - Analytics in Industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog49

ZDMP and machine tools

View Blog49 - ZDMP and machine tools
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog45

Artificial Intelligence integration in process and quality control in industry

View Blog45 - Artificial Intelligence integration in process and quality control in industry
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog41

Inter-platform Interoperability for Zero Defects Platforms

View Blog41 - Inter-platform Interoperability for Zero Defects Platforms
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog37

Marketplace

View Blog37 - Marketplace
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog33

Data Harmonisation in a Factory 4.0 Environment

View Blog33 - Data Harmonisation in a Factory 4.0 Environment
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog29

Privacy in smart manufacturing environment

View Blog29 - Privacy in smart manufacturing environment
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog25

Secure Authentication and Authorisation

View Blog25 - Secure Authentication and Authorisation
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog21

Digital Twin

View Blog21 - Digital Twin
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog17

Ethics related to the use of data and AI technologies

View Blog17 - Ethics related to the use of data and AI technologies
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog13

ZDMP is funding millions & looking for Ambassadors - But what is an Ambassador?

View Blog13 - ZDMP is funding millions & looking for Ambassadors - But what is an Ambassador?
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog09

ZDMP Architecture - A microservices architecture for zero defects in manufacturing

View Blog09 - ZDMP Architecture - A microservices architecture for zero defects in manufacturing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog05

Reference Models for Zero Defects Manufacturing

View Blog05 - Reference Models for Zero Defects Manufacturing
ZDMP Blog01 - Why Cybersecurity Risk Ass

ZDMP Blog01

Why Cyber Security Risk Assessment Matters in Industry 4.0

View Blog01 - Why Cyber Security Risk Assessment Matters in Industry 4.0
bottom of page