Difference between revisions of "Digital Twin"
From MgmtWiki
(→Solutions) |
m (→Problems) |
||
(6 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
==Context== | ==Context== | ||
− | * The concept of Digital Twin was created as an avatar that could be used as a model for one particular [[Entity]]’s behavior. | + | * The concept of [[Digital Twin]] was created as an avatar that could be used as a model for one particular [[Entity]]’s behavior. |
* It can also be used as an agent used to perform actions for a human operating independently in the digital regime. | * It can also be used as an agent used to perform actions for a human operating independently in the digital regime. | ||
+ | |||
+ | ==Value Proposition== | ||
+ | [[Digital Twin]]s can run practical simulations to study multiple real-time processes, such as predicting failure, improving response times, and informing customers about maintenance information to prolong a product's functioning life. With simple controlling mechanisms built into the devices, we can monitor responses, inform product customers, and remotely solve issues before they happen, enabling automated self-healing functionality. Digital twins can fully control a device without unnecessarily burdening the consumer, allowing a more seamless user experience. | ||
==Problems== | ==Problems== | ||
− | https://humancolossus.foundation/blog/nbspai-governance-starts-with-data-governancenbsp-atttk | + | * In one view, the [[Digital Twin]] is created to contain all possible [[Attribute]]s and [[Behavior]]s of a real human being. This rather dystopian view creates a [[Existential Threat]] to the real human's privacy.<ref>Robert Mitwiki ''Self Actioning System, a preferred systemic embodiment of “Digital Self”'' Human Colossus Foundations (2023-07-27) https://humancolossus.foundation/blog/nbspai-governance-starts-with-data-governancenbsp-atttk</ref> unless the real human has full control of the twin, or trusts it to control the shared privacy, |
==Solutions== | ==Solutions== | ||
Line 15: | Line 18: | ||
==Reference== | ==Reference== | ||
+ | <references /> | ||
+ | ===Other Material=== | ||
+ | * See wiki page on [[Being Digital]] which takes a bit different view where the process is a treated differently. | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
+ | [[Category: Model]] |
Latest revision as of 10:22, 11 June 2024
Contents
Full Title or Meme
A computer model of a real-world object for purposes of prediction or explaination of the actions of real-world object.
Context
- The concept of Digital Twin was created as an avatar that could be used as a model for one particular Entity’s behavior.
- It can also be used as an agent used to perform actions for a human operating independently in the digital regime.
Value Proposition
Digital Twins can run practical simulations to study multiple real-time processes, such as predicting failure, improving response times, and informing customers about maintenance information to prolong a product's functioning life. With simple controlling mechanisms built into the devices, we can monitor responses, inform product customers, and remotely solve issues before they happen, enabling automated self-healing functionality. Digital twins can fully control a device without unnecessarily burdening the consumer, allowing a more seamless user experience.
Problems
- In one view, the Digital Twin is created to contain all possible Attributes and Behaviors of a real human being. This rather dystopian view creates a Existential Threat to the real human's privacy.[1] unless the real human has full control of the twin, or trusts it to control the shared privacy,
Solutions
- How Digital Twins Could Protect Manufacturers from Cyberattacks[2]
At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.
- How Digital Twins can improve manufacturing productivity by 20-30%.[3]
Reference
- ↑ Robert Mitwiki Self Actioning System, a preferred systemic embodiment of “Digital Self” Human Colossus Foundations (2023-07-27) https://humancolossus.foundation/blog/nbspai-governance-starts-with-data-governancenbsp-atttk
- ↑ NIST How Digital Twins Could Protect Manufacturers from Cyberattacks NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks
- ↑ Demitrious Georgakopoulos + 1, Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing CACM 66 No. 7 (2023-07) p. 87ff
Other Material
- See wiki page on Being Digital which takes a bit different view where the process is a treated differently.