Friday, April 19, 2013
Control Systems Process Manufacturing Discrete Manufacturing System Integration Networking & Security Info Management
Featured Item
Cyber security: Understanding spear phishing and defense techniques
Single Article

Spear phishing is a social engineering tactic used to prey upon individuals who have access to resources that a hacker has targeted. It has a high success rate and has become a preferred method where the hacker entices a victim to click on a link, open a spreadsheet, or access some other document. This simple click... Read More

More Headlines
Embedded systems in a connected world
Single Article

Developing embedded systems in an Ethernet connected world adds complexity to an already complex task. We are a long way from the days when the primary problem in an embedded system was to determine... Read More

Multi-touch technology comes to HMI/SCADA systems
Single Article

Multi-touch screens have become an everyday part of life, starting with smartphones and progressing to tablets. With smartphones, multi-touch allows designers to eliminate the keypad, freeing limited... Read More

Sponsorship
Honeywell introduces a new Premium Platform for Experion Virtualization Solutions, leveraging blade server technology. It delivers advanced virtualization capabilities and superior lifecycle benefits. Learn More.
Commercial tablets get industrial enclosures
Single Article

Apple iPads, Google Android, and Microsoft OS tablets are finding their way into industrial applications but are ill-suited for rugged environments. Options to protect those assets are available... Read More

Rugged and powerful panel PCs
Single Article

Maple Systems, a provider of human machine interfaces (HMIs), has introduced three Panel PC models. The new PC400C Series Panel PCs have many hardware features including an Intel 2.3 GHz dual core... Read More

Linked In Twitter Facebook Google+ Rss
Featured video
Industrial Cyber Security Video Training Series
Learn the basics of industrial cyber security in this 13-part Control Engineering video series with Matt Luallen, consultant, trainer, and author.
Watch one cyber security video segment as a free sample.
Sponsorship
Learn to define the best practices to secure an industrial system by registering to download this eGuide, The Rocky Relationship between Safety and Security.
Featured Item
Case Study Database
Control Engineering’s case study database will allow end-users to identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects. Users will be able to search the case study database based on industry, engineering specialties and systems.
Visit Control Engineering's Case Study Database
Products
Pneumatic series with solenoid valves
Pneumatic series with solenoid valves

AutomationDirect’s Nitra AVS-series of pneumatics now includes additional directional... Read More

Robotic series for processing large parts
Robotic series for processing large parts

The MH50 II-series robots by Yaskawa Motoman have a flexible design and are... Read More

Linear piezo nanopositioner series
Linear piezo nanopositioner series

Aerotech's QNP-L series of linear piezo nanopositioning stages give nanometer-level... Read More

Current transducer combines current transformer, signal conditioner
Current transducer combines current transformer, signal conditioner

NK Technologies' AT/ATR-LS Current Transducer combines a current transformer and signal... Read More

Related Content
Sponsorship
The Control Engineering Leaders Under 40 is a recognition program designed to identify and give recognition to young engineers who have made significant contributions toward the control engineering profession. Nominate someone for the 2013 program today!