Friday, April 19, 2013
Control Systems Process Manufacturing Discrete Manufacturing System Integration Networking & Security Info Management
Featured Item
Cyber security: Understanding spear phishing and defense techniques
Single Article

Spear phishing is a social engineering tactic used to prey upon individuals who have access to resources that a hacker has targeted. It has a high success rate and has become a preferred method where the hacker entices a victim to click on a link, open a spreadsheet, or access some other document. This simple click... Read More

More Headlines
Embedded systems in a connected world
Single Article

Developing embedded systems in an Ethernet connected world adds complexity to an already complex task. We are a long way from the days when the primary problem in an embedded system was to determine... Read More

Multi-touch technology comes to HMI/SCADA systems
Single Article

Multi-touch screens have become an everyday part of life, starting with smartphones and progressing to tablets. With smartphones, multi-touch allows designers to eliminate the keypad, freeing limited... Read More

Sponsorship
Honeywell introduces a new Premium Platform for Experion Virtualization Solutions, leveraging blade server technology. It delivers advanced virtualization capabilities and superior lifecycle benefits. Learn More.
Commercial tablets get industrial enclosures
Single Article

Apple iPads, Google Android, and Microsoft OS tablets are finding their way into industrial applications but are ill-suited for rugged environments. Options to protect those assets are available... Read More

Rugged and powerful panel PCs
Single Article

Maple Systems, a provider of human machine interfaces (HMIs), has introduced three Panel PC models. The new PC400C Series Panel PCs have many hardware features including an Intel 2.3 GHz dual core... Read More

Linked In Twitter Facebook Google+ Rss
Featured video
Industrial Cyber Security Video Training Series
Learn the basics of industrial cyber security in this 13-part Control Engineering video series with Matt Luallen, consultant, trainer, and author.
Watch one cyber security video segment as a free sample.
Sponsorship
Learn to define the best practices to secure an industrial system by registering to download this eGuide, The Rocky Relationship between Safety and Security.
Featured Item
Case Study Database
Control Engineering’s case study database will allow end-users to identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects. Users will be able to search the case study database based on industry, engineering specialties and systems.
Visit Control Engineering's Case Study Database
Products
Temperature sensor calibrator
Temperature sensor calibrator

Fluke's 1586A Super-DAQ Precision Temperature Scanner helps calibrate temperature sensors more... Read More

Integrated software for oil and gas industry
Integrated software for oil and gas industry

Honeywell (NYSE: HON) Process Solutions' Digital Suites for Oil and Gas is... Read More

Barcode scanner designed to read mobile phone screens
Barcode scanner designed to read mobile phone screens

Denso ADC's QK30 barcode scanner is designed to read 1‑D and 2-D barcodes displayed on the LCD... Read More

In-line viscometer providing on-location measurement
In-line viscometer providing on-location measurement

The Model 3330 In-Line Viscometer from Chandler Engineering provides real-time, on-location... Read More

Related Content
Sponsorship
The Control Engineering Leaders Under 40 is a recognition program designed to identify and give recognition to young engineers who have made significant contributions toward the control engineering profession. Nominate someone for the 2013 program today!