Articles and News
3,207 Results Found
-
The Data Lineage Challenge and What to Do About It
Data contextualization is the key to understanding and preventing the implications of bad factory floor data in downstream applications. -
The Power of AI and Human Collaboration in Supply Chain Decision Making
In the evolving landscape of supply chain management, AI is shifting from theory to tangible applications. -
Powering Through Geopolitical Storms With Local Supply Chains That Have Safety Built In
All eyes are on localization; 68% of top management executives believe localized supply chains are a key strategy this year. -
Making Outbound Connections for OT Data Security
Secure access to data from a production system means making outbound connections. -
Best Practices to Maximize Precision and Cost-Efficiency With Photo-Chemical Etching
Let's explore best practices for designing with PCE, highlighting how the process encourages new thinking in product development. -
The Quiet Revolution in Mobile Computing: Why Rugged Computing Is a Strategic Necessity
It is time to move beyond retrofitting consumer tech and embrace rugged solutions as a core part of your digital strategy. -
What Are Polyglot Files, and What Is Their OT Security Risk?
The severity of a polyglot cyberattack is often driven by a lack of awareness, training and recognition. -
Top 10 Open Source Software Security Risks
Build in security from the design phase and carefully plan the entire supply chain. -
Evolution, State of the Art and Standardization of Virtual PLCs
Let's examine the technological advances, current state of virtual PLCs (vPLCs), challenges faced in industrial automation and standardization efforts. -
How Mini-Load and Pallet-Load ASRS Are Reshaping Warehouse Efficiency
ASRS streamline material handling, improve space utilization and enhance inventory accuracy. -
AI Complicates ICS Phishing Threats
Artificial intelligence elevates risks for industrial control system operators. -
Established Standards Help Secure the Functional Safety Lifecycle
Embed cybersecurity activities and requirements at every phase using ANSI/ISA-61511 and the ISA/IEC 62443 standards. -
Why Use ISA/IEC 62443 2-1 When ISO/IEC 27001 Exists?
The chief information security officer at Johns Manville compares cybersecurity standards for OT systems. -
Take Proactive Steps to Ensure Supply Chain Cybersecurity
How to safeguard supply chain cybersecurity in the age of AI, geopolitics and quantum threats. -
Securing Manufacturing Lines From the Inside Out
Cybersecurity in manufacturing is no longer a niche IT concern—it’s a core business priority. -
Cryogenic Precision: Measuring Nitrogen Flow With Coriolis Mass Flow Meters
Coriolis mass flow meters measure mass directly and remain accurate regardless of temperature, pressure or state. -
Etching for a Greener Future: Why Energy Innovation Is Converging
Chemical etching can support rapid prototyping, deliver precision without introducing stress and work across a wide range of materials. -
How a Virtual Twin Turns Tariff Turbulence Into a Strategic Advantage for Manufacturers
Let's answer an important question: What is the capital investment required to expand or build new manufacturing capacity? -
What to Look for in Your Motion Control Feedback Device
What do you actually need your feedback device to do, and what’s now possible? -
The Future of Process Automation: Unlocking the Power of Agentic AI
True transformation lies in AI-driven enterprise process automation.