Top 5 Control Engineering articles, June 30 to July 6: PID, cyber security, IOT, more
When choosing a tuning strategy for a specific control loop, it is important to match the technique to the needs of that loop and the larger process. It is also important to have more than one approach in your repertoire, and the Cohen-Coon method can be a handy addition in the right situation.
The unidentified utility was vulnerable to a brute-force cyber security attack, where hackers try different combinations of passwords until they find the right one.
Fully integrated and highly functional operator terminals are enticing machine builders and end-user alike to migrate from more basic products.
Almost all automation and control systems are designed, developed and built using data processors, microprocessors, digital signal processors (DSPs) or any other processing device. Part 1 of a series of articles on real-time control systems.
Future robots much smaller than Lincoln’s smile on a penny may locate cancer cells, enter, and deliver anti-cancer agents, or self-assemble into a structure, providing science-fiction-like advances in medicine, manufacturing, and other industries.
The list was developed using CFE Media’s web analytics for stories viewed on controleng.com, June 30 to July 6, for articles published within the last two months.
– Chris Vavra, content specialist, CFE Media, firstname.lastname@example.org.