Other Networks
To take advantage of the cloud’s flexible computing power without exposing proprietary or location information, the Argonne team essentially warps, or “perturbs,” the model and data being sent for calculations, changing key variables and equations. A disguised version of the problem goes to a cloud-based “solver” computer, and the answer is returned to a local, secure server for decoding. Courtesy: Argonne National Laboratory/ISSSource
Other Networks June 2, 2019

Electrical grid data cloaked in the cloud

A framework is being developed at the Department of Energy’s (DOE) Argonne National Laboratory that cloaks sensitive data, which allows grid operators to securely perform complex calculations in the cloud.

By Gregory Hale
Courtesy: CFE Media
Other Networks June 1, 2019

Effective cybersecurity needs compliance and dedication

Cybersecurity regulations are deliberately written to be forward looking and encourage best behaviors and companies should be vigilant in their compliance to prevent potential cyber attacks.

By Anne Klebsch
Figure 1. Bypass and configured packages include a replaceable variable frequency drive. Courtesy: Yaskawa
Other Networks June 1, 2019

Control Engineering hot topics, May 2019

Control Engineering's most clicked articles in May 2019 included stories about VFDs, safe human-robot interaction, sustainable cybersecurity, object-oriented programming, the Career and Salary Survey, and more. Miss something? You can catch up here.

By Chris Vavra
Courtesy: Chris Vavra, CFE Media
Other Networks May 29, 2019

Framework developed to help deep neural network performance

North Carolina State University researchers have developed AOGNets, a framework for building deep neural networks that uses a compositional grammar approach to extract useful information from raw data.

By Matt Shipman
Scientists at the Army Research Lab (ARL) and Towson University may have identified a way to improve the cybersecurity of distributed network intrusion detection. Courtesy: U.S. Army Illustration/ISSSource
Other Networks May 25, 2019

Method developed to detect cyber attacks with compressed network traffic

Researchers at the U.S. Army Research Laboratory (ARL) and Towson University are developing a method on compressing network traffic as much as possible without losing the ability to detect and investigate malicious activity.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Other Networks May 24, 2019

Research examines computer software code understanding and documentation

A team of researchers at Texas A&M University looked at the best way to document computer code by using samples and found that good naming, and comment were more important than good documentation.

By Lorian Dusek
Courtesy: FieldComm Group
Other Networks May 24, 2019

Nominees being accepted for Plant of the Year award

The FieldComm Group is seeking qualified end users and manufacturers for the 17th annual Plant of the Year Award. Nominations will be accepted until May 31, 2019.

By FieldComm Group
Courtesy: Massachusetts Institute of Technology
Other Networks May 23, 2019

Agreement signed to develop AI accelerator for prototyping and research

The MIT-Air Force AI Accelerator, will conduct fundamental research directed at rapid deployment of artificial intelligence (AI) innovations in operations, data management, cybersecurity, and vehicle safety.

By Rob Matheson
Other Networks May 21, 2019

Overcoming Industrie 4.0 challenges to improve connected manufacturing

There are a number of roadblocks preventing manufacturers from achieving true Industrie 4.0 processes, and at the same time, there are a number of emerging solutions bringing production further into the future.

By Robotic Industries Association (RIA)
Clients should assess the capabilities and maturity of the business and its processes with the use of the capability maturity model, which consists of five levels. Courtesy: Ultra Consultants
Other Networks May 21, 2019

Maximizing the investment in manufacturing IT

Getting the most out of an investment in manufacturing IT seldom produces the desired results unless a simultaneous review and redesign of business processes is undertaken.

By Ultra Consultants