By Roger Yue, Antaira
Having a redundant Ethernet network is important to W&WW management, because many plants are still legacy, meaning they were either built with a stand-alone station or have a traditional star topology Ethernet network.
By John Southcott and Chris Mathews, Brock Solutions
Organizations who use technology for applications that are not fit-for-purpose often find themselves starting, stopping, re-grouping and re-starting projects. This article demystifies what goes where (ERP, MES/MOM, Controls) and provides practical examples to guide companies through the decision making process.
Most safety standards provide guidance for the entire lifecycle of machinery to enable them to remain safe. There is no one ‘right’ choice for every organization when selecting standards to follow for implementing safeguarding measures. There are, however, choices which are clearly wrong – such as not doing anything.
By Jonas Persson, Comsys
Harmonics is a major concern in many applications today. The increased use of variable frequency drives introduce more energy efficient systems but also an increased harmonic loading. In this paper a number of compensation techniques are discussed.
By Bruce Jacquemard, One Network Enterprises
An electronic workforce of process robots can count your inventory items in real time, on demand, with no mistakes made. You pay them nothing, and they never complain. They even alert you to any issues related to orders, inventory levels, or shipments, taking action to reorder items when they drop below minimum thresholds.
By Cormac Garvey, HAL Software
Enterprise Automation & IT has been run for decades by professional IT and Automation managers that understand basic IT security. However, guidance from the industrial automation industry is fragmented and scant in regard to improving cyber security of control systems. lndustrial cyber security experts are peddling their rehashed wares, trying to cash in on clients fears, ‘Y2K’ style. Here’s a look at the standards, efforts and problems with industrial cybersecurity.
By West Control Solutions
Limit devices provide vital protection for temperature controlled process systems, ensuring product quality and the safety of both the workforce and the plant itself. This paper takes a closer look at why limit devices are required, describes how they work and explains why they reduce risk, providing a useful summary to anyone who is
considering specification of limit devices.
Built to Last: Maintaining Reliability and Uptime of Critical Connected Systems in Industrial Settings
By Tim Senkbeil, Lumberg Automation
Businesses in industrial settings require cabling components that are built to last, and can be depended upon. This white paper outlines the specific challenges connected systems face in extreme industrial settings, the benefits of new solutions that help maintain uptime, and steps and strategies for finding the best products.
Manufacturers are integrating commercial PC technologies to provide the customized solutions that users demand.
By Manny Menchaca, Parsec
Overall Equipment Effectiveness shows where operational losses are and should be used in lieu of an
incremental-only budget. OEE information indicates every place that product value can be found, and therefore sheds light on where to apply precious resources.
Expansion of engineering materials is a common issue, but not much is known about how expansion affects the repeatability of positioning equipment. This white paper discusses and tests that effect.
By Lenny Filipkowski, AutomationDirect
White Paper describes how one or more multi-function safety relays can often be used to replace many basic single-function safety relays, simplifying installations and saving money. In many cases, multi-function safety relays can be used instead of a safety-rated PLC, resulting in substantial savings while streamlining implementation and maintenance.
Every motion controller will have its own command protocol, or series of rules for communication, that dictates how you interact it. Zaber's devices use two command protocols: an ASCII protocol and a 6-byte binary protocol.
By Mahesh Subrmaniam, HCL
Paper provides an overview of cyber security standards, procedures and design considerations to be made during embedded device development--specifically embedded devices that are networked, so the device is compliant with standards on cyber security.
By Michael Roman, IFS
When an ERP implementation goes wrong, the damage extends beyond the user who does not know how to run a report or input a transaction, because the problem can escalate and spiral out of control until it makes its way to an unhappy customer. Fortunately, there are ERP selection and implementation best practices than can guard against such risks.
This white paper discusses cycling applications for actuators and stages, including their characteristics, limitations, and best practices for optimal results.
Whitepaper and video from Real Time Automation describes the five options EtherNet/IP vendors can employ to obtain enhanced connectivity with Rockwell Automation’s ControlLogix and CompactLogix programmable Controllers.
By John Maher and Rick Denison, Synchrono
This paper looks at the competitive edge that manufacturers gain by being not only devoted to driving flow and eliminating waste, but also enabling their organizations to become best-in-class by using Pull and eKanban technology.
By Stewart Thompson, CAS Data Loggers
Need a monitoring and/or alarming system but aren’t sure how to purchase or use one? This whitepaper helps users better understand the difference between the types of temperature monitoring systems, so that they can identify which system is best for their application.
By Brent Purdy, AutomationDirect
Group motor protection provides numerous benefits. It’s economical because one protection device handles multiple motors. Here’s how to satisfy the NEC requirements for group motor installations.