Networking and Security
For years, researchers from MIT and Brown University have been developing an interactive system that lets users drag-and-drop and manipulate data on any touchscreen, including smartphones and interactive whiteboards. Now, they’ve included a tool that instantly and automatically generates machine-learning models to run prediction tasks on that data. Courtesy: Melanie Gonick, MIT
Networking and Security June 28, 2019

Drag-and-drop data analytics using machine learning

MIT researchers have developed a system that lets nonspecialists use machine-learning (ML) models to make predictions for medical research, sales, and more.

By Rob Matheson
Networking and Security June 25, 2019

12 benefits of using standards in design, implementation for iMOM projects

Integrated manufacturing operations management (iMOM) is designed to increase and sustain business benefits for users such as improved accuracy and thorough implementation.

By Stan DeVries
Cybersecurity
Karthik Pattabiraman, an associate professor of electrical and computer engineering at the University of British Columbia, is trying to make smart meters hackproof. Courtesy: University of British Columbia/ISSSource
Cybersecurity July 19, 2019

Researchers trying to make smart meters hackproof

Researchers at the University of British Columbia are developing an automated program in development aimed at improving the security of these devices and boosting security in the smart grid.

By Gregory Hale
Ethernet
Integrated safety can extend beyond I/O terminals and implement safety logic directly in servo drives and other components in the field. Courtesy: Beckhoff Automation
Ethernet July 2, 2019

Converging safety, non-safety systems increases scalability, flexibility

Integrating safety systems into a machine’s standard control platform simplifies operations, increases diagnostic capabilities and creates safer work environments for engineers and end users.

By Sree Swarna Gutta
Wireless
Courtesy: Daniel E. Capano
Wireless July 11, 2019

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

By Daniel E. Capano
Other Networks
Users need to consider value, design flexibility, and potential modifications when choosing an enclosure for a manufacturing application. Courtesy: Rittal
Other Networks July 15, 2019

Top 5 Control Engineering articles July 8-14

Articles about selecting an enclosure, using context with the IIoT, cybersecurity best practices, digitalization advantages, and connecting a PLC were Control Engineering’s five most clicked articles from July 8-14. Miss something? You can catch up here.

By Chris Vavra
I/O Systems, I/O Modules
Courtesy: CFE Media
I/O Systems, I/O Modules July 8, 2019

Specification for networks, IO-Link released

CAN in Automation (CiA) has released the CiA 463 series standardizing the gateway between CANopen responsible for CANopen FD networks and input/output (I/O)-Link.

By CAN in Automation