Latest SCADA Software Technical Articles

Categories

Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Centralized and decentralized computing have different cybersecurity needs. Let’s review the differences and some best practices.


The Three Levels of a Factory Network

The Three Levels of a Factory Network

What makes a factory network? There are three levels: device, control, and enterprise. What does each level consist of, and how is it used in a factory network?


HVAC Engineering in AutoCAD and Revit

HVAC Engineering in AutoCAD and Revit

Trying to design industrial HVAC systems in AutoCAD? In this article, we explore AutoDesk’s flagship softwares AutoCAD and Revit, and their role in the HVAC designing industry.


IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT infrastructure is more susceptible to cyber-attacks than legacy infrastructure due to its cloud-based nature; this article covers attack vectors and best mitigating practices.


The Difference Between HMI and SCADA and How They Work Together

The Difference Between HMI and SCADA and How They Work Together

Learn the differences and similarities between human-machine interface (HMI) and supervisory control and data acquisition (SCADA) and how they work together.


Protocols for Industrial Remote Monitoring

Protocols for Industrial Remote Monitoring

Dive into why protocols are essential in industrial remote monitoring along with the most common types of open protocols seen in facilities.


Devices and Equipment Used in Industrial Remote Monitoring

Devices and Equipment Used in Industrial Remote Monitoring

This article in our continuing series about remote monitoring covers equipment and devices necessary to establish a remote monitoring mechanism.


Types of Industrial Remote Monitoring Solutions and Processes

Types of Industrial Remote Monitoring Solutions and Processes

Learn about the different types of industrial remote monitoring and some of the various remote monitoring processes used in industry.


Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

This article discusses common implementations of UPS in control systems and important design considerations.


Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


Introduction to Distributed Control Systems (DCS)

Introduction to Distributed Control Systems (DCS)

Distributed control systems (DCS) evolved out of control systems for facilities, but their scope can be difficult to fully understand. This article explores the role of a DCS and how it fits in with PLCs and PACs.


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.


Securing SCADA Systems from Cyber Attacks

Securing SCADA Systems from Cyber Attacks

Learn about the many ways cyber-attacks threaten SCADA systems, and what can be done to keep manufacturing and utility plants protected.


Digital Twinning and its Use in SCADA Systems

Digital Twinning and its Use in SCADA Systems

Learn all about Digital Twinning, and how this new technique can change the way we do a number of industrial operations!


SCADA System Usage in the Daily Life of an Engineer

SCADA System Usage in the Daily Life of an Engineer

Learn how one engineer's real-world experience showed him the importance and power of SCADA systems for control automation.


An Introduction to Supervisory Control and Data Acquisition (SCADA)

An Introduction to Supervisory Control and Data Acquisition (SCADA)

Learn about the supervisory control and data acquisition system used to program PLCs and PIDs. See where, how, and why SCADA systems are so popular.


Connecting Remote Input and Output Devices Using Computer Networking Technologies

Connecting Remote Input and Output Devices Using Computer Networking Technologies

Networked remote I/O allows us to work with a machine center separately from the rest of the system, and drop the solution right in place.


Building Cyber Resilience In Industrial Control Systems

Building Cyber Resilience In Industrial Control Systems

Industrial control system cybersecurity can be a matter of vital corporate and national interest. What are the operational risks, and how are they assessed?


Cyber Resilience in Industrial Control Systems

Cyber Resilience in Industrial Control Systems

Take a look at the concept of cyber resilience in control systems and how it relates to cybersecurity for critical infrastructure in the age of security vulnerabilities