Saturday, September 22, 2018
Control Systems Process Manufacturing Discrete Manufacturing System Integration Networking & Security Info Management
Featured Item
Self-organizing versus managed industrial wireless networks
Self-organizing versus managed industrial wireless networks

ISA 100.11a and WirelessHART standards reflect contrasting attitudes toward network management and these standards impact operational effectiveness.Read More

More Headlines
Digital advantages for design, automation
Digital advantages for design, automation

Digitalization benefits include speed to market, flexibility, efficiency, consistent quality, cybersecurity, and lower lifecycle costs.Read More

Understand network security: public key encryption and industrial automation
Understand network security: public key encryption and industrial automation

Remove unnecessary fear, take a proactive approach to network security as the Internet of Things (IoT) continues to rapidly expand.Read More

Sponsorship
Upcoming Webcast: How to Build a Cyber Risk Mitigation Plan
for Today’s Connected Plant

This webcast will teach viewers how to build a cyber risk mitigation plan for today’s connected plant using IEC 62443 to address risks and validate effectiveness through testing and assessment and securing your supply chain's assets, facilities, systems and data.
Sponsored by: UL. Register now.
How much control goes to the cloud?
How much control goes to the cloud?

Cloud computing is gaining ground as industrial plants become more efficient, but it’s important to recognize where computing is needed and where it should be taking place.Read More

Cloud-based software solutions for industrial applications
Cloud-based software solutions for industrial applications

Choosing cloud-based software or a combined approach with an on-site strategy may result in cost savings, improved operational efficiencies, and enhanced security.Read More

Linked In Twitter Facebook Google+ Rss
Featured Item
E-magazine
Read, search, download, and share the digital edition of Control Engineering. Topics this month include: Optimizing cloud controls, ladder logic, autotuning controls, and industrial wireless best practices. Read it on your computer or tablet now.
Click to view.
Sponsorship
2018 Engineering Leaders Under 40
The Engineering Leaders Under 40 are in a class by themselves, but they also have plenty of experience in a class. These 30 manufacturing professionals are by far the best educated group we've recognized since the program began almost a decade ago. Learn more about these individuals and their unique accomplishments.
Featured Item
CFE Media’s Global System Integrator Database
The newest version of the online database is even easier to use! Through this database you will be able to connect with System Integrators by searching their corporate profiles which highlight: industries served, engineering specialties, product experience, geography, and other pertinent data. Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database.
Learn more.
Featured Products
IoT communicator for PLCs, mobile devices
IoT communicator for PLCs, mobile devices

Beckhoff's TwinCAT IoT Communicator makes it easy for PLCs to communicate with mobile devices by... Read More

Host bus adapter for style storage devices
Host bus adapter for style storage devices

VadaTech's AMC640 and AMC641 M.2 Host Bus Adapter (HBA) supports up to four M.2 type 2280 and/or... Read More

Process safety controller for extreme, hazardous environments
Process safety controller for extreme, hazardous environments

Schneider Electric's Tricon CX version 11.3 is a dual-certified process safety controller that is... Read More

Signal splitter carrier
Signal splitter carrier

Acromag's uBSP carrier is used with plug-in microBlox (uB) input modules to build a flexible signal... Read More

Related Content
Sponsorship
Edge Computing Digital Report
Today’s technologies heap benefits onto an edge-computing architecture. These benefits include faster computing, better networking, more memory, smarter analytics, cloud-based intelligence and applications, tighter security with more access, easier setup, and lower costs. Learn more.