Articles and News
3,207 Results Found
-
Securing SCADA and Control Networks
Automation.com, June 2010 By Scott Howard, Byres Security Although Trusted Network Connect (TNC) was originally conceived for protection of IT networks, it addresses many security issues that are also encountered in industrial control and SCADA systems. -
Everything you always wanted to know about slab resolvers
Automation.com, April 2012 By Zettlex This article explains what slab resolvers are; how they work; where to use them; and suggests some lower cost options. -
Three Ways Instrumentation Engineers Strengthen Digital Transformation Projects
Get the most from what exists currently and take advantage of new methods. This article comes from the March 2021 Ebook InTech Focus: Temperature and Pressure. -
The Burden of Proof in Cybersecurity: Inside Eaton and Underwriters Laboratories (UL) Strategic Collaboration
By Bill Lydon, Editor, Automation.com Recent security breaches have demonstrated the continued dynamic evolution of cybersecurity as vulnerabilities in both software and hardware continue to be identified. Consequently, it is increasingly imperative that cybersecurity is designed into the system components and overall design…and people will want proof of that. -
Asia-Pacific Leads Fragmented Global Battery Recycling Equipment Market
The market may see the integration of different metallurgical techniques, leading to more efficient and environmentally friendly battery recycling solutions. -
Integrating Renewable Sources into a Reliable Power Ecosystem
Efficient control hardware combined with the management and optimization offered by virtual power plants provides an opportunity to meet that challenge today. This article provides a practical overview of how virtual power plants can provide the answer. -
Eighty-Two Percent of Organizations are Embracing IT/OT Collaboration, But Still Falling Short on OT Visibility
By Andrea Carcano, Nozomi Networks Critical infrastructure and industrial environments were once thought to be immune to cyber threats and attacks because of their “air gapped” nature. But the truth is that they are extremely vulnerable and are typically under persistent attack -
Micro VFDs Gain Macro Features
Although basic small VFDs still exist, there are several compelling reasons for OEMs, hobbyists, and other end users to use newer and extremely capable micro VFDs. This feature originally appeared in the June 2022 issue of InTech magazine. -
Smart Manufacturing Extends to Digital Sales Enablement
Configure, price, quote (CPQ) software tools that take full advantage of the digital plant can provide benefits to manufacturing companies. Some key factors influence go-to-market digitization success. -
A Stronger Link for I/O
IO-Link modules and field devices are widely available, and they are the smart choice for advanced machine and factory automation data connectivity and integration. -
Future-Proofing Controls Programming for the Edge
There remains a fundamental need for creating traditional deterministic control solutions suitable for new and retrofit automation projects. This feature originally appeared in the June 2022 issue of InTech magazine. -
Five ERP Updates for Navigating Today's Biggest Risks to Manufacturing
With backlogs of up to 70 weeks for new machinery, it is more important than ever to look at resources already in place to mitigate risk, ensure business continuity and optimize operations. -
When it Comes to Process Safety Audits, External Auditors Maximize Safety. Here’s How.
It’s crucial for companies in high hazard industries to build the right team to assess and verify compliance with regulatory standards because completion and follow-up on findings from audits are important elements of continuous improvement and regulatory compliance. -
Modular 5G Cells Enable Real-time Communications
The COM-HPC server standard for developing real-time capable 5G cells with integrated edge servers is key for industrial companies’ digital transformation. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Top Three Advantages of Integrated Explosion Protection Functionality
With recent technology advances, intrinsic safety now offers the safest, most cost effective and easiest way to deploy solutions that safeguard your process operations. -
Bridging On-Premise and Cloud Data
With the right hybrid architecture, manufacturers can analyze data in its native locations and formats, avoiding the complexities of data transfer or replication. This feature originally appeared in the June 2022 issue of InTech magazine. -
Wiegand Wire Enables Energy Harvesting, Motion Sensing
By manipulating the magnetic properties of Vicalloy wire, devices that can harvest energy and sense motion have been created. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Getting Started with Digital Transformation
Smart manufacturing can optimize performance across a network, adapt to and learn from new conditions in real time, and autonomously run production processes. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Five Ways to Combat Cybersecurity Risk in Digital Manufacturing
With digital advancements in AI, IoT and automation becoming increasingly critical to manufacturing success, organizations face growing threats from bad actors who wreak digital havoc via ransomware, theft of sensitive data, disruption of critical national and international infrastructure and more. -
Attack Surface Management: Six Steps for Success in OT/ICS
Most attack surface management tools and approaches do not understand the technical complexities and operational requirements of these OT systems. But there is a way to effectively and efficiently conduct ASM in OT. -
Three Lessons Learned at Automate 2022
Claudia Jarrett, US country manager at automation parts supplier, EU Automation, examines the three biggest trends from Automate 2022. -
Condition Monitoring Using Vibration Transmitters and PLCs
Vibration monitoring is a good application for the Industrial Internet of Things (IIoT) because of its analytics potential. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Five Keys to Powering Remote Wireless Devices
Consider environment, energy demands, self-discharge rate and energy density when selecting batteries for remote wireless devices. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Pandemic Era Lessons Bolster Global Snack Food Maker
Network security and real-time collaboration supported by advanced technologies ensures productivity. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Smaller Workforce, Larger Demand: Vision Picking Proves the Automation Answer
Vision picking provides a modern user automation experience familiar to the generation of new employees with an ROI calculated in months. -
How to Mitigate Three Common Industrial Network Vulnerabilities
The following scenarios summarize some common system vulnerabilities in industrial networks that may be exploited during the three main stages of a cyberattack: exploration, utilization and attack. -
Understanding Git-Based Version Control for Industrial Automation
When a robust version control system is implemented correctly, teams can focus more on the development activities instead of searching for and investigating code changes. This feature originally appeared in the ebook Automation 2022: IIoT and Industry 4.0 (Volume 3). -
Examining the Good, the Bad and the Ugly of Current OT Security
Organizations recognize the importance of OT security but are still struggling to build a strategy that can counter today’s mounting threats. Fortinet recently conducted research on this topic, culminating in the 2022 State of Operational Technology and Cybersecurity Report. -
Eight Key Trends for the Industrial IoT
Antaira has identified eight key trends making their way through networked factories that have embraced the principles of IIoT. Evolution is the natural course for technology, and the IIoT is no exception. -
Overcoming the Challenges of Automated Bin Picking
More advanced 3D vision systems are key to wider adoption of robots. -
Removing IT Bottlenecks: Simplicity Is Key
How low code platforms can reduce the workload. -
Industrial Robots Push Into New Applications and Industries
The industrial robot market is embarking on a new phase of development. Robot vendors are widening the scope of their offer, targeting new application scenarios by offering machines of increased versatility. -
Safeguard Industrial Networks from Cyberattacks with S.M.A.R.T
Jesse Ku, an industrial control system cybersecurity expert at Moxa who is also IEC 62443 certified, has proposed a five point "S.M.A.R.T.” cybersecurity strategy. -
Interview: ExxonMobil Striving to Achieve Open Automation Joins UniversalAutomation.Org
Bill Lydon talks with Ryan Smeltzer, OPA program manager for ExxonMobil Research and Engineering Company, about the company’s commitment to open automation. -
Industrial Robots Have Moved From Maturity Into A Fast-Growth Phase
The industrial robot market has, as a result of COVID, done something highly unusual–it has moved from a mature and conservative phase into an exciting, fast-growth, almost start-up-like phase. -
Demonstrating the Link Between Functional Safety and ICS Security
Let’s look at a physical demonstration that shows the link between functional safety and ICS security, and review what can be done to prevent malware from disrupting production and threatening safety. -
Endress+Hauser Showcases its Digitalization Innovations
In the world of increasing interest in open systems, Endress & Hauser showed its technological openness and innovation in the areas of sensors, edge devices and smart instrumentation. -
Secure Industrial Control Systems with Configuration Control
Ditch the risk of manually managing code and configuration changes. This article comes from the Ebook Automation 2021: OT/ICS Cybersecurity. -
Cybersecurity and Smart Manufacturing
OT data challenges to securely executing a smart manufacturing strategy. -
How Edge Analytics Can Help Manufacturers Overcome Obstacles Associated with More Equipment Data
To help manufacturers understand, and overcome, some of the challenges associated with smart manufacturing, Martin Thunman, CEO and co-founder of leading low-code platform for streaming analytics, automation and integration for industrial IoT, Crosser shares his insight. -
Can a Solution Provider Handle Industrial Cybersecurity?
Consider these key questions to help ensure you choose a qualified solution provider. This article comes from the Ebook Automation 2021: OT/ICS Cybersecurity. -
All About LiDAR and How it Helps During a Robotics Boom
A brief history and overview of LiDAR and how the it has evolved and various applications. -
Essential Start to Securing OT Systems: Risk Assessment
Here’s how to understand the current situation and develop a cybersecurity strategy. This article comes from the Ebook Automation 2021: OT/ICS Cybersecurity. -
Digital Twins: The Great Enablers of Our Times
More industry sectors now recognize that by drawing on complementary tech and resources such as AI, the Internet of Things and Big Data, they can use Digital Twins to build new products and get them right the first time, says Kiran Raj, principal disruptive tech analyst at GlobalData. -
Fostering Future Net Zero with Sustainable Food Manufacturing
Here, James Sopwith, group strategic account director at multi-disciplinary engineering firm, adi Group, discusses engineering’s part in supporting a smarter, healthier and altogether more sustainable food manufacturing operation. -
Open Secure Remote Operations: A Vision Fulfilled
Improving efficiency through real-time monitoring and control of distributed equipment. This article is from the Ebook Automation 2021: OT/ICS Cybersecurity. -
Case Study: From Warehouse to Enterprise with Edge Computing
New hand sanitizer packaging plant uses unique automation architecture to run at the pace of modern business. This article is from the Ebook Automation 2021: OT/ICS Cybersecurity. -
Changes to DTM Certification with FDT 3.0
Modern developer tools, comprehensive testing and new online repository streamline certification process for manufacturers and improves DTM access for end users. -
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
Nozomi Networks Labs has studied the internals of the DarkSide executable and today we’re sharing our findings to reveal the techniques used by its machine code in three areas: the selection of victims and files, ensuring anonymity and anti-detection, and preventing data restoration. We also provide IoCs and decryption script to help you detect DarkSide. -
The Future of Lean: Advanced Analytics Breathe New Life into Aging Six Sigma Initiatives
A new generation of analytics is being used to improve upon traditional continuous improvement efforts.