Latest Data Storage Articles

Categories

Startup ThinkIQ Partners with UST to Enhance Supply Chain Operations for Smart Manufacturing

Startup ThinkIQ Partners with UST to Enhance Supply Chain Operations for Smart Manufacturing

ThinkIQ and UST partner to streamline supply chain and manufacturing processes through cloud-based software that provides materials visibility and traceability.


News Feb 22, 2021 by Stephanie Leonida
Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


AVEVA and Microsoft Expand Collaboration on Cloud and AI for Industrial Manufacturing

AVEVA and Microsoft Expand Collaboration on Cloud and AI for Industrial Manufacturing

Engineering and industrial software provider AVEVA announced an extension of its partnership with Microsoft, focusing on digital transformation in the industrial sector.


How Object Detection Works in Machine Vision Applications

How Object Detection Works in Machine Vision Applications

The following will introduce how machine vision and object recognition works and how developers are working on making it easier to integrate for more extensive market adoption. 


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.


Digital Twinning: Leaders in the Emerging Technology

Digital Twinning: Leaders in the Emerging Technology

As digital twinning technology continues to advance, industry leaders are stepping up their innovation efforts to bring together the physical and virtual world.


Volkswagen Opens Industrial Cloud Platform to Amazon Web Services and Other Manufacturing Companies

Volkswagen Opens Industrial Cloud Platform to Amazon Web Services and Other Manufacturing Companies

Volkswagen and Amazon Web Services extend the Volkswagen Industrial Cloud Network to include more companies for optimizing software development and business growth.


News Jul 30, 2020 by Stephanie Leonida
Utilizing Edge Computing and Cloud Computing in Industrial Automation

Utilizing Edge Computing and Cloud Computing in Industrial Automation

Edge computing and cloud computing both have their place in industrial automation and control systems. Learn about the uses and how far the two technologies have to go before they're universally adopted.


Securing SCADA Systems from Cyber Attacks

Securing SCADA Systems from Cyber Attacks

Learn about the many ways cyber-attacks threaten SCADA systems, and what can be done to keep manufacturing and utility plants protected.


Digital Twinning and its Use in SCADA Systems

Digital Twinning and its Use in SCADA Systems

Learn all about Digital Twinning, and how this new technique can change the way we do a number of industrial operations!


Microsoft Acquires CyberX to Enhance Security in Azure IoT business

Microsoft Acquires CyberX to Enhance Security in Azure IoT business

The CyberX platform comprises a series of tools, ranging from perimeter firewalls and conventional ICS/SCADA defenses to IoT-specific features to provide continuous monitoring and real-time alerting.


How is Industrial Machine Vision Transforming the Industry?

How is Industrial Machine Vision Transforming the Industry?

Liquid lens and multi-spectral lighting solutions are advancing the manufacturer’s production lines.


Building Cyber Resilience In Industrial Control Systems

Building Cyber Resilience In Industrial Control Systems

Industrial control system cybersecurity can be a matter of vital corporate and national interest. What are the operational risks, and how are they assessed?


Cyber Resilience in Industrial Control Systems

Cyber Resilience in Industrial Control Systems

Take a look at the concept of cyber resilience in control systems and how it relates to cybersecurity for critical infrastructure in the age of security vulnerabilities