Some controllers and network devices have one port, while others have two. Why is there a difference, and what advantages does having two network ports actually provide?
Some controllers and network devices have one port, while others have two. Why is there a difference, and what advantages does having two network ports actually provide?
Designing a control system is a difficult task in itself, but designing the graphical interface for an everyday user can…
Designing a control system is a difficult task in itself, but designing the graphical interface for an everyday user can be a very different kind of challenge that involves mental and physical considerations.
Understanding the building blocks of s-domain analysis and magnitude response theory can go a long way in helping…
Understanding the building blocks of s-domain analysis and magnitude response theory can go a long way in helping engineers predict how and why some system design choices are made over others.
User-defined data types (UDTs) are a powerful and useful tool when applied to their full advantage. However, misused,…
User-defined data types (UDTs) are a powerful and useful tool when applied to their full advantage. However, misused, they can become problematic and introduce roadblocks to troubleshooting and upgrading PLC programs.
What are these terms, PLC, PAC, RTU, DCS, SCADA? Why are they so important to industrial robotics and automation? Explore…
What are these terms, PLC, PAC, RTU, DCS, SCADA? Why are they so important to industrial robotics and automation? Explore how each different piece functions to build a comprehensive automated system.
Virtual networks can connect or isolate various local control networks through configuration of a managed switch. Why…
Virtual networks can connect or isolate various local control networks through configuration of a managed switch. Why would we use VLANs, and how can you segment a network switch to create a VLAN?
An introduction to the various tag types used within one of the leading supervisory control and data acquisition (SCADA)…
An introduction to the various tag types used within one of the leading supervisory control and data acquisition (SCADA) software powering IIoT, HMI, and I4.0 applications: Ignition by Inductive Automation.
We see smoke detectors on a daily basis in every house and building we visit, but the same sensor elements, and others,…
We see smoke detectors on a daily basis in every house and building we visit, but the same sensor elements, and others, can be used to detect the presence of harmful gasses and heat in all industries.
Designing, installing, and maintaining control systems involves a lot of wires. Each wire has a purpose, often indicated…
Designing, installing, and maintaining control systems involves a lot of wires. Each wire has a purpose, often indicated by the color of the insulation. But what are the common colors, and what do they mean?
Radiation, despite its reputation in pop culture as a harmful emission resulting from a natural disaster, is a property…
Radiation, despite its reputation in pop culture as a harmful emission resulting from a natural disaster, is a property of many materials and processes and must be carefully monitored for quality and safety.
Vibration sensors measure the mechanical vibration of an object, making it possible to monitor machines for early signs…
Vibration sensors measure the mechanical vibration of an object, making it possible to monitor machines for early signs of failure to prevent costly and dangerous breakdowns.
Failures are never the goal of any industrial operation. But when disaster strikes, it’s always better to have a…
Failures are never the goal of any industrial operation. But when disaster strikes, it’s always better to have a mitigation plan in place well in advance of the event to ensure timely recovery.
There are many different kinds of electric motors used for industrial power transfer, but there are also hydraulic and…
There are many different kinds of electric motors used for industrial power transfer, but there are also hydraulic and pneumatic motors that can lend advantages in some situations.
Converting thermal energy into electrical signals, temperature sensors such as RTDs and thermocouples are fundamental in…
Converting thermal energy into electrical signals, temperature sensors such as RTDs and thermocouples are fundamental in the maintenance and operation of industrial environments and equipment.
Operating just outside the visible light spectrum, infrared energy emits from anything with heat stored in it. Detecting…
Operating just outside the visible light spectrum, infrared energy emits from anything with heat stored in it. Detecting this energy, infrared sensors find use in applications from proximity detection to temperature measurement.
Arduino’s Opta mini PLC platform is supported by the new PLC IDE. Learn to create and download your first program and…
Arduino’s Opta mini PLC platform is supported by the new PLC IDE. Learn to create and download your first program and take advantage of built-in I/O for an easy introduction to the platform.
No more IIoT buzzwords! This article aims to walk through an implementation of MQTT using the paho-mqtt library using…
No more IIoT buzzwords! This article aims to walk through an implementation of MQTT using the paho-mqtt library using nothing more than your local machine and some simple Python programming.
Cybersecurity is all about processes and people. A lot of threats can be mitigated through technology, but only if people…
Cybersecurity is all about processes and people. A lot of threats can be mitigated through technology, but only if people understand how cybersecurity affects control systems and related technology.
Industrial sensors can be found in nearly every modern industrial process, regardless of complexity. Learn the history,…
Industrial sensors can be found in nearly every modern industrial process, regardless of complexity. Learn the history, evolution, and variety of sensors that make manufacturing the modern marvel we see today.
Addressing cybersecurity threats introduced by IIoT technology and devices can quickly seem overwhelming. However, an…
Addressing cybersecurity threats introduced by IIoT technology and devices can quickly seem overwhelming. However, an understanding of the risks can lead to some straightforward countermeasures.