Sensorex has expanded its water quality and online process transmitters with four models that are designed for applications such as water quality, chemical, electronics, food production, environmental, and wastewater treatment.
Inside Process: While historians and manufacturing execution systems (MES) have been around for a long time, knowing which one to use and how to maximize the benefit of each for particular situations is key.
Electric Torque Machines' (ETM) M-Series direct drive motors is designed to reduce energy costs and uses electromagnetic motor technology for increased efficiency and are designed for conveyors, fans, pumps, packaging equipment,...
Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have developed a chip design called Swarm, that is designed to make parallel programs more efficient but easier to write.
Engineering and IT Insight: MESA International’s Manufacturing Operations Management Capability Maturity Model (MOM-CMM) is designed to improve operational processes by evaluating how the people involved in operations handle...
Lanner's LEC-3231 is an industrial-grade, rackmount box PC designed for power substation deployment and is configured with multiple I/O ports with isolated protection to fulfill industrial control system requirements.
Physical security is now intersecting with cybersecurity in information technology (IT) and operational technology (OT) environments and there is a greater need for cybersecurity awareness as interconnectivity increases.
Top 5 Control Engineering articles, May 9-15: Salary and career survey, ladder logic, neural network training, more
Articles about the 2016 Salary and Career Survey, ladder logic, neural network training, data acquisition and analysis, and managing automation upgrades were Control Engineering’s five most clicked articles from May 9-15. Miss...
Westermo's WeConfig 1.4 is a network configuration management designed to configure large and complex industrial data communication networks and features enhanced functionality to bolster cybersecurity.