Articles

Smart Energy: What is the Risk?

Morgan Meier, Technical Support Specialist
Plixer International

Smart energy is a cost-effective and sustainable energy system in which renewable energy production, infrastructures, and consumption are integrated and coordinated through energy services, active users, and enabling technologies. Many energy companies are moving over to smart meters, which allow service providers to remotely monitor the consumerís consumption, connect, and even disconnect power. Continue reading

CAN Versus Ethernet: Advantages, Disadvantages and Alternatives for Industrial Automation

Kent Lennartsson, Research Manager
Kvaser AB

In industrial automation settings, like manufacturing plants and assembly lines, computing systems are used to replace the need for human involvement in the decision-making process. For example, rather than having operators at a cola plant use a machine to fill soda bottles with the CO2 levels needed for correct carbonation, the machine itself can be programmed to complete this task. While some lament the limited human involvement, there are several advantages to this method of manufacturing, including: Continue reading

Security Analytics and Visualizations that Could Prevent a Ukraine-like Power Outage

Richard Jones, VP Grid Security – Bridge Energy Group
Shawn Fountain, Principal Consultant – Bridge Energy Group†

Most readers by now have probably heard about the early January announcement of malware found in a Vermont Utility.† To those familiar with the cyberattack induced power outages in the Ukraine in December 2015 that cut power to nearly 230,000 customers for several hours, this was not a surprise.[1] While the Ukraine event is the only publicized power outage from a cyberattack, there have been other successful cyberattacks to SCADA and industrial control systems risking our critical infrastructure that represent a clear warning signal for utility organizations.

Continue reading

Three Critical Uses of Data for Off-Grid Telecom Power

Thomas Rahkonen, Chief Technology Officer & Vice President eCentre
Flexenclosure

Consumers in off-grid areas are rapidly increasing their use of mobile Internet services.†At the same time they not only expect service to become more reliable, but they also want network coverage to expand and prices for mobile data plans to decrease too. This is a big ask for mobile operators struggling to achieve base station profitability when they have no access to a reliable power grid.†So whatís the solution? Continue reading

The Fog is Getting Thicker

Alex Hardie, Principal
SDNNFV.net Labs

“…and Leon is getting larger!Ē

For the pop culture-savvy, this is a bit from†the move “Airplane!”.†For those in the industries of telecom and industrial process and control itís a warning that fog computing has rolled in. Itís a gratuitous segue, but any reference to a line by Johnny is worth the effort, however clumsy. Continue reading

Steps Companies Can Take to Secure IoT Devices Against Hackers

Veikko Ylimartimo, CTO
Tosibox†

The Internet of Things (IoT) is already delivering a variety of operational efficiencies to organizations. This reality also creates the need for improved security to protect these essential business connections. In recent months, we have seen internet-connected devices and systems hacked, hijacked and used for large-scale denial of service attacks around the world. Continue reading

Persistent Tracking Using PTZ Camera Hand-Off

Eric Olson, Vice President of Marketing
PureTech Systems

The protection of remote facilities has many challenges. Facilities that have many remote sites, must maintain surveillance on all these sites simultaneously, while facilities with just one or two sites have the potential issue of long periods of inactivity, followed by a quick flurry of activity that must be address quickly in order to take proactive measures, including the collection of usable video.† As such, the automation of security tasks is always a welcomed tool.† One such tool is PTZ Camera to PTZ Camera Handoff. Continue reading