Top 5 Control Engineering articles, June 30 to July 6: PID, cyber security, IOT, more
Articles about tuning PID control loops, U.S. public utility and cyber security, the future of operator terminals, real-time processing automation and control fundamentals, and mobile microrobots were Control Engineering’s five most clicked articles from last week, June 30 to July 6. Were you out last week? Miss something? You can catch up here.
When choosing a tuning strategy for a specific control loop, it is important to match the technique to the needs of that loop and the larger process. It is also important to have more than one approach in your repertoire, and the Cohen-Coon method can be a handy addition in the right situation.
The unidentified utility was vulnerable to a brute-force cyber security attack, where hackers try different combinations of passwords until they find the right one.
Fully integrated and highly functional operator terminals are enticing machine builders and end-user alike to migrate from more basic products.
Almost all automation and control systems are designed, developed and built using data processors, microprocessors, digital signal processors (DSPs) or any other processing device. Part 1 of a series of articles on real-time control systems.
Future robots much smaller than Lincoln's smile on a penny may locate cancer cells, enter, and deliver anti-cancer agents, or self-assemble into a structure, providing science-fiction-like advances in medicine, manufacturing, and other industries.
The list was developed using CFE Media's web analytics for stories viewed on controleng.com, June 30 to July 6, for articles published within the last two months.
- Chris Vavra, content specialist, CFE Media, cvavra(at)cfemedia.com.
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.