Latest Data Storage Technical Articles

Categories

Assessing Buzzwords: Industry 5.0

Assessing Buzzwords: Industry 5.0

American history has undergone several industrial revolutions largely focused on mass production. Are we heading into a fifth revolution focused on human-machine interaction?


Assessing Buzzwords: Digital Transformation

Assessing Buzzwords: Digital Transformation

What does “digital transformation” really mean, and what are the technologies involved in the process? Further, which of these technologies are facilities adopting?


Data Science for Control Systems

Data Science for Control Systems

Data science is a multidisciplinary field crucial to modern automation. In this article, learn about data science concepts and best practices.


What is a Data Lake?

What is a Data Lake?

Learn the fundaments of data lakes and how they are important to digital transformation under Industry 4.0.


What is the Difference Between IoT and Cloud Computing?

What is the Difference Between IoT and Cloud Computing?

IoT infrastructure consists of many factory parts, one being cloud computing. Rather than ask how they’re different, let’s look into how they work together to form industry 4.0.


Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Centralized and decentralized computing have different cybersecurity needs. Let’s review the differences and some best practices.


Combining Machine Vision and Neural Networks in IIoT

Combining Machine Vision and Neural Networks in IIoT

As IIoT and Industry 4.0 continue to grow, so do its technologies. Machine vision is becoming more widely used in the industry, and IIoT pushes it to become more and advanced as time progresses.


A History of Industrial Revolutions and How They’ve Impacted Manufacturing

A History of Industrial Revolutions and How They’ve Impacted Manufacturing

Each industrial revolution has had an impact on factories. Are we going through a fourth revolution?


IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT infrastructure is more susceptible to cyber-attacks than legacy infrastructure due to its cloud-based nature; this article covers attack vectors and best mitigating practices.


The Difference Between HMI and SCADA and How They Work Together

The Difference Between HMI and SCADA and How They Work Together

Learn the differences and similarities between human-machine interface (HMI) and supervisory control and data acquisition (SCADA) and how they work together.


Integrating an HMI Into Existing Control Systems

Integrating an HMI Into Existing Control Systems

What are some considerations and challenges when integrating an HMI into an existing control system? Let’s dive into the benefits and challenges.


Devices and Equipment Used in Industrial Remote Monitoring

Devices and Equipment Used in Industrial Remote Monitoring

This article in our continuing series about remote monitoring covers equipment and devices necessary to establish a remote monitoring mechanism.


Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


How Object Detection Works in Machine Vision Applications

How Object Detection Works in Machine Vision Applications

The following will introduce how machine vision and object recognition works and how developers are working on making it easier to integrate for more extensive market adoption. 


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.


Digital Twinning: Leaders in the Emerging Technology

Digital Twinning: Leaders in the Emerging Technology

As digital twinning technology continues to advance, industry leaders are stepping up their innovation efforts to bring together the physical and virtual world.


Utilizing Edge Computing and Cloud Computing in Industrial Automation

Utilizing Edge Computing and Cloud Computing in Industrial Automation

Edge computing and cloud computing both have their place in industrial automation and control systems. Learn about the uses and how far the two technologies have to go before they're universally adopted.


Securing SCADA Systems from Cyber Attacks

Securing SCADA Systems from Cyber Attacks

Learn about the many ways cyber-attacks threaten SCADA systems, and what can be done to keep manufacturing and utility plants protected.


Digital Twinning and its Use in SCADA Systems

Digital Twinning and its Use in SCADA Systems

Learn all about Digital Twinning, and how this new technique can change the way we do a number of industrial operations!


How is Industrial Machine Vision Transforming the Industry?

How is Industrial Machine Vision Transforming the Industry?

Liquid lens and multi-spectral lighting solutions are advancing the manufacturer’s production lines.