The extreme automation of our factories is necessary in order to face the Fourth Industrial Revolution. This new industrial paradigm will force our industries to manufacture much shorter and customized series at increasingly competitive prices, even tackling the manufacture of thousands of different configurations of a single base product. In order to achieve this, our production processes must have a flexibility in their configuration that has never been imagined before. This flexibility and ability to adapt automatically to demand are the essence of the Fourth Industrial Revolution and are part of the Western strategy to recover an industrial sector increasingly threatened by the Eastern production of large series at really competitive prices. Based on our participation in more than a dozen proofs of concept in the automotive, aeronautics, agri-food, or energy sectors, we describe the scenarios in which blockchain technology brings the greatest benefits to Industry 4.0. After finishing different experimentations, we carried out an in-depth analysis of the true added value of blockchain in the industry and contrasted our conclusions through interviews with more than 20 people in charge of innovation from different industries. As a result, we have obtained the principal four values of blockchain technology applied to Industry 4.0.
Part of the book: Computer Security Threats
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems.
Part of the book: Computer Security Threats