Courtesy: Ondas Networks
Wireless July 28, 2019

The network the oil & gas industry needs

The case for private wireless, mission-critical communications networks.

By Kathy Nelson, P.E.
Courtesy: Daniel E. Capano
Wireless July 11, 2019

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

By Daniel E. Capano
Figure 3: Three eXtended Reality (XR) technologies, such as augmented reality (AR), mixed reality (MR) and virtual reality (VR), and digital twin models can add value to manufacturer applications. Courtesy: Industrial Internet Consortium
Wireless July 10, 2019

Benefits of digitizing reality for workers in manufacturing

Digitizing reality is now possible for workers thanks to technology advances such as the Internet of Things (IoT). This new reality allows workers to benefit from augmented reality (AR), mixed reality (MR) and virtual reality (VR) to solve old problems in new and better ways.

By Michael D. Thomas
Figure 3: An HTTP instruction, such as this HTTPCMD block in an AutomationDirect BRX PLC, enables a PLC to initiate a request to an internet website API to obtain data. AutomationDirect Do-more Designer Software has the necessary instructions. Courtesy: AutomationDirect
Wireless July 1, 2019

Benefits of connecting a PLC to the internet

Programmable logic controllers (PLCs) are now gaining information technology (IT) abilities to interact directly with the internet, creating new automation and information possibilities.

By Bill Dehner
In industrial automation, the edge is found where the action is, at or near the industrial process. Courtesy: CFE Media
Wireless June 26, 2019

Your questions answered: IIoT/Cloud series, Part 2: Edge, Fog and Cloud

Webinar participants outline evolving nature of Industrial Internet of Things (IIoT) elements and how users are applying the edge, fog and cloud in their manufacturing operations.

By Charles (Chuck) C. Byers, Ed Kuzemchak, and Steve Hilton
“Fiat Cryptography,” a system developed by MIT researchers, automatically generates — and simultaneously verifies — cryptographic algorithms optimized across all hardware platforms. Courtesy: Chelsea Turner, MIT
Wireless June 22, 2019

Automated cryptocode generator developed to secure web browsers

An MIT-developed cryptographic system, Fiat Cryptography, is helping better protect a user's data and better secure websites by automatically generating optimized cryptography code that’s usually written by hand.

By Rob Matheson
Courtesy: Chris Vavra, CFE Media
Wireless June 17, 2019

Organizations struggling to understand, realize potential IoT benefits

A survey by Longview IoT and Informa Engage finds that companies are still struggling to understand the benefits the Internet of Things (IoT) can provide to their company.

By Longview IoT
Older architectures for mobile access present problems, but newer implementations provide greatly simplified solutions. Courtesy: Opto 22
Wireless June 13, 2019

Finding common ground between industrial automation and mobile technology

Mobile technologies are challenging traditional data handling practices as they move into the industrial arena.

By Benson Hougland
Figure: Comparison of transactional data extraction to the more sophisticated requirements of industrial data extraction across a number of factors. Courtesy: HighByte
Wireless June 12, 2019

Improve industrial data integration with ETL software

Extract, transform, load (ETL) software can help improve data gathering for operations technology (OT) applications, but there are major challenges with data integration that companies need to overcome.

By John Harrington
To take advantage of the cloud’s flexible computing power without exposing proprietary or location information, the Argonne team essentially warps, or “perturbs,” the model and data being sent for calculations, changing key variables and equations. A disguised version of the problem goes to a cloud-based “solver” computer, and the answer is returned to a local, secure server for decoding. Courtesy: Argonne National Laboratory/ISSSource
Wireless June 2, 2019

Electrical grid data cloaked in the cloud

A framework is being developed at the Department of Energy’s (DOE) Argonne National Laboratory that cloaks sensitive data, which allows grid operators to securely perform complex calculations in the cloud.

By Gregory Hale