Friday, April 19, 2013
Control Systems Process Manufacturing Discrete Manufacturing System Integration Networking & Security Info Management
Featured Item
Cyber security: Understanding spear phishing and defense techniques
Single Article

Spear phishing is a social engineering tactic used to prey upon individuals who have access to resources that a hacker has targeted. It has a high success rate and has become a preferred method where the hacker entices a victim to click on a link, open a spreadsheet, or access some other document. This simple click... Read More

More Headlines
Embedded systems in a connected world
Single Article

Developing embedded systems in an Ethernet connected world adds complexity to an already complex task. We are a long way from the days when the primary problem in an embedded system was to determine... Read More

Multi-touch technology comes to HMI/SCADA systems
Single Article

Multi-touch screens have become an everyday part of life, starting with smartphones and progressing to tablets. With smartphones, multi-touch allows designers to eliminate the keypad, freeing limited... Read More

Sponsorship
Honeywell introduces a new Premium Platform for Experion Virtualization Solutions, leveraging blade server technology. It delivers advanced virtualization capabilities and superior lifecycle benefits. Learn More.
Commercial tablets get industrial enclosures
Single Article

Apple iPads, Google Android, and Microsoft OS tablets are finding their way into industrial applications but are ill-suited for rugged environments. Options to protect those assets are available... Read More

Rugged and powerful panel PCs
Single Article

Maple Systems, a provider of human machine interfaces (HMIs), has introduced three Panel PC models. The new PC400C Series Panel PCs have many hardware features including an Intel 2.3 GHz dual core... Read More

Linked In Twitter Facebook Google+ Rss
Featured video
Industrial Cyber Security Video Training Series
Learn the basics of industrial cyber security in this 13-part Control Engineering video series with Matt Luallen, consultant, trainer, and author.
Watch one cyber security video segment as a free sample.
Sponsorship
Learn to define the best practices to secure an industrial system by registering to download this eGuide, The Rocky Relationship between Safety and Security.
Featured Item
Case Study Database
Control Engineering’s case study database will allow end-users to identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects. Users will be able to search the case study database based on industry, engineering specialties and systems.
Visit Control Engineering's Case Study Database
Products
Gantry handling system for assembly and medical automation
Gantry handling system for assembly and medical automation

Festo's EXCM mini-H gantry is a handling system designed for small parts assembly and... Read More

Desktop robot for focused plasma treatment
Desktop robot for focused plasma treatment

The JOT400 Plasma Cell by JOT Automation is a desktop robot designed for focused plasma... Read More

Stationary panel computers have 21.5 inch screens, multitouch, IP66 rating
Stationary panel computers have 21.5 inch screens, multitouch, IP66 rating

Advantech's SPC-2140WP is a 21.5 in. widescreen multitouch panel PC designed to provide easier... Read More

Control design toolbox has additional control algorithms
Control design toolbox has additional control algorithms

Maplesoft's MapleSim Control Design Toolbox allows engineers to take advantage of the... Read More

Related Content
Sponsorship
The Control Engineering Leaders Under 40 is a recognition program designed to identify and give recognition to young engineers who have made significant contributions toward the control engineering profession. Nominate someone for the 2013 program today!