Latest IPCs (Industrial PCs) Technical Articles

Categories

Understanding PLC Tags: Controller Scope vs. Program Scope

Understanding PLC Tags: Controller Scope vs. Program Scope

Is it best to ‘controller scope’ or ‘program scope’ your tags? This is the question asked by many new PLC programmers, and it often comes down to personal preference.


Connectors Used in Industrial and Robotic Cable Termination

Connectors Used in Industrial and Robotic Cable Termination

Industrial and robotics cabling requires specialized termination strategies. This article introduces connectors involved in automation applications for cable-to-cable or cable-to-device termination.


Developing Standardized Practices for PLC Programming

Developing Standardized Practices for PLC Programming

Any kind of computer programming can be challenging to determine what aspects are truly unique versus what aspects should be standardized across projects and platforms to streamline future development.


Addressing Common Industrial IoT Cybersecurity Risks For Control Systems

Addressing Common Industrial IoT Cybersecurity Risks For Control Systems

Addressing cybersecurity threats introduced by IIoT technology and devices can quickly seem overwhelming. However, an understanding of the risks can lead to some straightforward countermeasures.


Understanding Controller Memory Types and Conservation

Understanding Controller Memory Types and Conservation

Insufficient controller memory can result in reduced HMI and SCADA response speed and longer scan times. Know the differences between RAM, ROM, and removable memory, and how to keep program sizes in check.


Electronic Datasheet (EDS) Files: Why do We Use Them?

Electronic Datasheet (EDS) Files: Why do We Use Them?

Many control product manufacturers offer these downloadable ‘EDS files’ for peripheral equipment, but what exactly is an EDS, and how can they aid in the development of a project?


Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Centralized and decentralized computing have different cybersecurity needs. Let’s review the differences and some best practices.


IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT Cyber Attack Vectors and Best Mitigating Practices

IIoT infrastructure is more susceptible to cyber-attacks than legacy infrastructure due to its cloud-based nature; this article covers attack vectors and best mitigating practices.


Integrating an HMI Into Existing Control Systems

Integrating an HMI Into Existing Control Systems

What are some considerations and challenges when integrating an HMI into an existing control system? Let’s dive into the benefits and challenges.


Devices and Equipment Used in Industrial Remote Monitoring

Devices and Equipment Used in Industrial Remote Monitoring

This article in our continuing series about remote monitoring covers equipment and devices necessary to establish a remote monitoring mechanism.


Types of Industrial Remote Monitoring Solutions and Processes

Types of Industrial Remote Monitoring Solutions and Processes

Learn about the different types of industrial remote monitoring and some of the various remote monitoring processes used in industry.


Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

Cybersecurity Considerations in Uninterruptible Power Supply (UPS)

This article discusses common implementations of UPS in control systems and important design considerations.


Comparing Industrial PCs to PLCs and PACs

Comparing Industrial PCs to PLCs and PACs

A brief overview of controllers through history and an analysis of factors to consider when deciding which one to use.


Comparing Industrial PCs against PLCs and PACs

Comparing Industrial PCs against PLCs and PACs

This article offers a brief review of types of controllers through history and an analysis of factors to consider when deciding what to use.


What is an Industrial PC?

What is an Industrial PC?

Learn about the fundamentals of industrial PCs (IPCs), including their common types and architecture, advantages, and trends happening in their development.


Cybersecurity Resources for Control System Engineers

Cybersecurity Resources for Control System Engineers

What kind of guidance is available to help you defend your industrial control system (ICS)?


NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

NIST Finds Patterns in Cyber Security Behavior Related to Industrial Manufacturing

The latest report from NIST and other government organizations found that tracking behavior may be a new way to track potential security threats.


Cyber Resilience in Industrial Control Systems

Cyber Resilience in Industrial Control Systems

Take a look at the concept of cyber resilience in control systems and how it relates to cybersecurity for critical infrastructure in the age of security vulnerabilities