Wireless
Figure 3: As the name implies, these wireless pressure transmitters require no wiring connections to the PLC, thus eliminating issues often encountered when disconnecting and reconnecting wired instruments during a workover. Courtesy: Emerson Wireless
Wireless May 29, 2019

Wireless monitoring saves hours on each well workover

Requirement for I&E tech to be onsite for well workovers reduced from five hours to 15 minutes.

By Keith Ellis
Scientists at the Army Research Lab (ARL) and Towson University may have identified a way to improve the cybersecurity of distributed network intrusion detection. Courtesy: U.S. Army Illustration/ISSSource
Wireless May 25, 2019

Method developed to detect cyber attacks with compressed network traffic

Researchers at the U.S. Army Research Laboratory (ARL) and Towson University are developing a method on compressing network traffic as much as possible without losing the ability to detect and investigate malicious activity.

By Gregory Hale
Courtesy: Chris Vavra, CFE Media
Wireless May 24, 2019

Research examines computer software code understanding and documentation

A team of researchers at Texas A&M University looked at the best way to document computer code by using samples and found that good naming, and comment were more important than good documentation.

By Lorian Dusek
Courtesy: FieldComm Group
Wireless May 24, 2019

Nominees being accepted for Plant of the Year award

The FieldComm Group is seeking qualified end users and manufacturers for the 17th annual Plant of the Year Award. Nominations will be accepted until May 31, 2019.

By FieldComm Group
Model-less multivariable control (XMC) automates the way operating teams have always carried out multivariable constraint control and optimizaton manually. Notably, this method does not require detailed models or embedded optimizers. XMC uses patented rate-predictive control (RPC) internally. Courtesy: APC Performance LLC
Wireless May 13, 2019

Top 5 Control Engineering articles May 6-12

Articles about multivariable control benefits, control network standards, human-robot interaction, data historians, and IIoT benefits for manufacturers were Control Engineering’s five most clicked articles from May 6-12. Miss something? You can catch up here.

By Chris Vavra
Industrial cybersecurity needs to be a plant-wide initiative involving collaboration on design and framework, a gap assessment, implementation, and audits. Courtesy: Control Engineering with information from Intech Process Automation
Wireless May 12, 2019

Industrial control system (ICS) cybersecurity advice, best practices

Catastrophic disaster can be the result of insecure industrial cybersecurity practices. See six common entry points for attacks, eight cybersecurity precautions for attacks by type, and four steps to improve.

By Osman Ahmed, Asad Rehman, Ahmed Habib
The user is provided a view of the system that allows for the configuration of the I/O and control devices as well as for the layout of the topology and the infrastructure devices. Courtesy: Avnu Alliance
Wireless May 10, 2019

Time-sensitive networking benefits for industrial systems

Time-sensitive networking (TSN) can simplify industrial systems and reduce system and hardware costs, an appealing choice for companies looking to harness data in the Industrie 4.0 and Industrial Internet of Things (IIoT) era.

By Anil Kumar, Denzil Roberts, Ph.D., Steve Zuponcic
Courtesy: Open Eye Consortium
Wireless May 8, 2019

Multi-source agreement formed to target high-speed optical connectivity applications

The Open Eye Consortium announced the establishment of its multi-source agreement (MSA) outlining its mission to standardize advanced specifications for lower latency.

By Open Eye Consortium
Wireless May 4, 2019

Tales from the engineering department

Forgotten documents conceal ancient wisdom of lasting value.

By Kevin Parker
Courtesy: CFE Media
Wireless May 2, 2019

Safety and security need to be the backbone for manufacturing

Safety and security have become more interconnected as systems once immune to cyber attacks are now becoming vulnerable in an increasingly interactive world.

By Gregory Hale