Saturday, September 22, 2018
Control Systems Process Manufacturing Discrete Manufacturing System Integration Networking & Security Info Management
Featured Item
Self-organizing versus managed industrial wireless networks
Self-organizing versus managed industrial wireless networks

ISA 100.11a and WirelessHART standards reflect contrasting attitudes toward network management and these standards impact operational effectiveness.Read More

More Headlines
Digital advantages for design, automation
Digital advantages for design, automation

Digitalization benefits include speed to market, flexibility, efficiency, consistent quality, cybersecurity, and lower lifecycle costs.Read More

Understand network security: public key encryption and industrial automation
Understand network security: public key encryption and industrial automation

Remove unnecessary fear, take a proactive approach to network security as the Internet of Things (IoT) continues to rapidly expand.Read More

Sponsorship
Discover New Solutions
Attending Automation Fair® equips you with innovative strategies to help you become more globally competitive and productive with The Connected Enterprise. Gain in-depth knowledge, experience new technologies, and network with experts. Register!
How much control goes to the cloud?
How much control goes to the cloud?

Cloud computing is gaining ground as industrial plants become more efficient, but it’s important to recognize where computing is needed and where it should be taking place.Read More

Cloud-based software solutions for industrial applications
Cloud-based software solutions for industrial applications

Cover Story: Choosing cloud-based software or a combined approach with an on-site strategy may result in cost savings, improved operational efficiencies, and enhanced security.Read More

Linked In Twitter Facebook Google+ Rss
Featured Item
E-magazine
Read, search, download, and share the digital edition of Control Engineering. Topics this month include: Optimizing cloud controls, ladder logic, autotuning controls, and industrial wireless best practices. Read it on your computer or tablet now.
Click to view.
Sponsorship
Upcoming Webcast: How to Build a Cyber Risk Mitigation Plan for Today’s Connected Plant
This webcast will teach viewers how to build a cyber risk mitigation plan for today’s connected plant using IEC 62443 to address risks and validate effectiveness through testing and assessment and securing your supply chain's assets, facilities, systems and data.
Sponsored by: UL. Register now.
Featured Item
CFE Media’s Global System Integrator Database
The newest version of the online database is even easier to use! Through this database you will be able to connect with System Integrators by searching their corporate profiles which highlight: industries served, engineering specialties, product experience, geography, and other pertinent data. Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database.
Learn more.
Featured Products
Industrial managed PoE switch
Industrial managed PoE switch

Korenix's JetNet industrial managed PoE switch is equipped with 8 Gigabit Ethernet RJ-45 ports and... Read More

IoT interface for climate control solutions
IoT interface for climate control solutions

Rittal's IoT interface can either be mounted on a top hat rail or directly on the cooling unit or... Read More

IoT communicator for PLCs, mobile devices
IoT communicator for PLCs, mobile devices

Beckhoff's TwinCAT IoT Communicator makes it easy for PLCs to communicate with mobile devices by... Read More

Host bus adapter for style storage devices
Host bus adapter for style storage devices

VadaTech's AMC640 and AMC641 M.2 Host Bus Adapter (HBA) supports up to four M.2 type 2280 and/or... Read More

Related Content
Sponsorship
Edge Computing Digital Report
Today’s technologies heap benefits onto an edge-computing architecture. These benefits include faster computing, better networking, more memory, smarter analytics, cloud-based intelligence and applications, tighter security with more access, easier setup, and lower costs. Learn more.