What is Digital Twin Technology?

Digital Twin technology has moved beyond manufacturing and into the merging worlds of the Internet of Things, artificial intelligence and data analytics.

As more complex “things” become connected with the ability to produce data, having a digital equivalent gives data scientists and other IT professionals the ability to optimise deployments for peak efficiency and create other what-if scenarios.

What is a Digital Twin?

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed.

The basic definition of a digital twin: it’s a digital representation of a physical object or system.

The technology behind Digital Twins has expanded to include larger items such as buildings, factories and even cities, and some have said people and processes can have digital twins, expanding the concept even further.

Digital Twin Applications

Digital Twins could be used in manufacturing, energy, transportation and construction. Large, complex items such as aircraft engines, trains, offshore platforms and turbines could be designed and tested digitally before being physically produced.

These Digital Twins could also be used to help with maintenance operations. For example, technicians could use a Digital Twin to test that a proposed fix for a piece of equipment works before applying the fix the physical twin.

Digital Twins and IoT

With the explosion of IoT sensors, digital-twin scenarios can include smaller and less complex objects, giving additional benefits to companies.

In a February 2018 article for Network World, Dave McCarthy cites “5 reasons Digital Twins matter to your IoT deployment," which include the ability to use digital twins to predict different outcomes based on variable data.

This is similar to the “run the simulation” scenario often seen in science-fiction films, where a possible scenario is proven within the digital environment.

With additional software and data analytics, Digital Twins can often optimise an IoT deployment for maximum efficiency, as well as help designers figure out where things should go or how they operate before they are physically deployed.

The more that a Digital Twin can duplicate the physical object, the more likely that efficiencies and other benefits can be found. In this August 2017 article for Network World, contributor Dean Hamilton says digital-twin technology will change the face of manufacturing.

“The more highly instrumented a device is, the more accurately its digital twin will represent its actual historical performance, leading to better analysis and simulation of its future performance,” Hamilton writes.

Digital Twin Skills

Creating Digital Twins with this much data, however, can require additional skill sets such as expertise in machine learning, artificial intelligence, predictive analytics and other data-science capabilities.

Gartner warns that Digital Twins aren’t always called for, and can unnecessarily increase complexity. “[Digital twins] could be technology overkill for a particular business problem. There are also concerns about cost, security, privacy, and integration.”

Major companies such as Microsoft, Oracle and GE have Digital Twin technology offerings for companies looking to create and deploy Digital Twins within their own IoT environments.

Digital Twin vs. Predictive Twin

In a November 2017 article for Network World, contributor Deepak Puri outlined an example of an Oracle digital-twin tool that provides users with two options, a Digital Twin and a predictive twin.

The Digital Twin “can include a description of the devices, a 3D rendering and details on all the sensors in the device. It continuously generates sensor readings that simulate real life options.”

The predictive twin “models the future state and behavior of the device,” Puri writes. “This is based on historical data from other devices, which can simulate breakdowns and other situations that need attention.”

Microsoft is taking the Digital Twin concept and applying it to processes in addition to physical products. In this whitepaper, Microsoft proposes the idea of the digital process twin:

“The Process Digital Twin is the next level of digital transformation, compounding Product Digital Twin benefits throughout the factory and supply chain,” Microsoft states. The associated whitepaper highlights some advanced manufacturing scenarios that product digital twins don’t support, but that process digital twins would.

Digital Twin History

Several articles (from sources such as GE, Gartner, and Innovation Enterprise) have cited NASA as an example of using the basic twinning idea during the space program of the 1960s, only it would create duplicate physical systems on the ground that matched the systems in the spaceships. Eventually those duplicate physical systems became computer simulations.

In 2016, the term really took off after Gartner named Digital Twins as one of its “Top 10 Strategic Technology Trends for 2017” saying that within three to five years, “billions of things will be represented by digital twins, a dynamic software model of a physical thing or system.”

“The rise of IoT-styled sensors that could provide data within the physical world of how that object operated and reacted to environmental factors is also driving Digital-Twin usage. The Gartner report stated that “a digital twin can be used to analyse and simulate real world conditions, respond to changes, improve operations and add value.”

A year later, Gartner once again named digital twins as a top trend for 2018, saying that “with an estimated 21 billion connected sensors and endpoints by 2020, Digital Twins will exist for billions of things in the near future.”

Network World

You Might Also Read:

IoT For Business & Creating 'Digital Twins':

 

 

« Maintaining GDPR Compliance
The Cyber Security Intelligence Network »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.