Security Management

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

Matriculating Healthcare Team members into Healthcare Facilities Directors

Matriculating Healthcare Team members into Healthcare Facilities Directors. How do you fill that gap? There is no doubt the past 20 years has seen several orders of change when it… Read more »

2 Comments

LV installation systems: internal organisation (2/2)

As promised in our previous article, it is time now to make a focus on Wall-Mounted panels. Wall-Mounted (WM) Panels We have to take in consideration the following elements which… Read more »

2 Comments

LV installation systems: internal organisation (1/2)

Let’s go one step forward on our way to choose a Low Voltage Electrical Distribution (LV ED) panel for our small or medium size building. Until now we concentrated on… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

LV installation systems: access rules

In our previous post we saw that an LV Functional Panel doesn’t have just electrical Distribution functions (which are its raison d’être), but also some functions related to its Installation… Read more »

2 Comments

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

The right way to choose an LV electrical distribution panel

This series of posts presents what the authors consider as the right way to choose an LV electrical distribution (ED) panel. We will refer only to LV ED panels for… Read more »

4 Comments

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

The best hospitals are safe hospitals

By far, clinical excellence lies at the core of world-class hospitals; however patient safety and hospital reputation also plays an important role, as indicated in U.S. News’ recent ranking of… Read more »

2 Comments

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Sustainability Embedded in Electrical Equipment

Our planet’s population growth is accelerating.  Its inhabitants are hungry for resources—and electricity is high on the list. Sustainability will be one of the major challenges of our future, and… Read more »

1 Comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

Data Transparency is Vital to World-class Hospitals

In speaking with hospital stakeholders around the world, from C-level executives to operational managers, we find one of the biggest challenges to improving operational efficiency is the sheer complexity of… Read more »

1 Comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Sustainability Embedded in Electrical Equipment

Our planet’s population growth is accelerating.  Its inhabitants are hungry for resources—and electricity is high on the list. Sustainability will be one of the major challenges of our future, and… Read more »

1 Comment

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

The Mill of the Future and Technology Enablers

Lately, there have been numerous technical evolutions related to new metallurgical process, equipment, and software technologies. The idea of this blog is not to tackle such technologies, but try to… Read more »

Leave a comment

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

WEBCAST: Pinpoints Key Facts about the Secure Power Opportunity

In a new audio webcast presentation, Carsten Baumann, a consulting engineering specialist with Schneider Electric, raises two salient points about Secure Power for industry and infrastructure. As moderator for the… Read more »

Leave a comment

Where to Start When Addressing Healthcare Facility Data Security Issues

Cyberattacks, whether generated from a single individual or a politically-motivated group, have emerged as a bigger threat to the healthcare industry security in recent years. Tight regulations and the growing… Read more »

Leave a comment

Micro data centers: The Perfect Choice for Edge Computing

With the explosion of connected devices and data applications, bandwidth, latency and processing speed are becoming big concerns. It’s hard to keep up with the fast pace of business if… Read more »

Leave a comment

Security Systems ROI: the Data Center Perspective

The growing concern about data breaches and theft of intellectual property has elevated the need for security of data centers around the globe, but at the same time, the long… Read more »

Leave a comment