Wireless
Courtesy: CFE Media
Wireless May 18, 2019

Securing electric substations

Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.

By Gregory Hale
Mitsubishi Electric Corp. announced its acquisition of Foxborough, Massachusetts-based Iconics Inc., in an opportunity to enhance their automation Industrial Internet of Things (IIoT) offerings. Courtesy: Mitsubishi Electric
Wireless May 17, 2019

Mitsubishi Electric acquires Iconics to advance IIoT offerings

Manufacturing, building automation products strengthened by deal, company officials say.

By Bob Vavra
Rice’s new design for creating security keys with a physically unclonable function (PUF) proved more reliable, more energy efficient and smaller than previously published PUF technologies. Courtesy: Jeff Fitlow/Rice University
Wireless May 16, 2019

Unclonable digital fingerprints developed for IoT devices

Rice University integrated circuit (IC) designers have developed unclonable digital fingerprints for Internet of Things (IoT) devices that allows their PUF to be more energy efficient than previously published versions.

By Jade Boyd
Bruce Wesner, senior director of engineering services at PGT, said there are two keys to a successful implementation of CMMS. “You have to have executive support to make it important, and partnerships within the organization to make it move.” Courtesy: PGT Custom Windows and Doors
Wireless May 14, 2019

The human factor in change management

Earn trust and show the benefits in building a case for CMMS.

By Kevin Clark, CMRP
Analytics together with connectivity allow for smarter IoT-enabled factories and products, which is vital for the fourth Industrial Revolution and for future changes in manufacturing. Courtesy: CFE Media, IoTCo
Wireless May 8, 2019

IIoT series, Part 1: Five ways to use cloud and IIoT to improve productivity: Your questions answered

Webcast presenters Alan Griffiths and Mohamed (Mo) Abuali, Ph.D. answered additional questions about topics such as augmented reality, 5G technology, and predictive analytics.

By Alan Griffiths, Mohamed (Mo) Abuali
Utilities and other organizations need to revise and update cybersecurity policies, procedures and how they perform vulnerability assessments to include the Industrial Internet of Things (IIoT). Courtesy: MG Strategy+
Wireless May 8, 2019

Utility sector strengthens security posture with rise of IIoT

Cybersecurity: Improving evaluation and certification methods, security audits, and testing provide a foundation for evaluating Industrial Internet of Things (IIoT) devices.

By Anil Gosine
Apple CEO Tim Cook (left) and SAP CEO Bill McDermott discuss an expanded collaboration between the two companies around enterprise resource management. Image courtesy: SAP
Wireless May 7, 2019

Apple, SAP to expand enterprise partnership

CEOs Tim Cook, Bill McDermott discuss move to Mac functionality, data security.

By Bob Vavra
Wireless May 4, 2019

Tales from the engineering department

Forgotten documents conceal ancient wisdom of lasting value.

By Kevin Parker
Figure 1: Two variants of mesh technology. Courtesy: Behr Technologies
Wireless April 30, 2019

Wireless low-power IIoT sensor networks differentiated

Mesh networks and low-power WANs are for different IIoT use cases and installation settings.

By Albert Behr
Companies reliant on DCS technology realize migration is difficult and the process delicate, but it's worth it because the costs of losing control of a process is much higher. Courtesy: Maverick Technologies
Wireless April 29, 2019

Some best practices recommended for DCS migration

A proven process control solution enters the 21st century.

By Jake Henn