Security Management

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

The right way to choose an LV electrical distribution panel

This series of posts presents what the authors consider as the right way to choose an LV electrical distribution (ED) panel. We will refer only to LV ED panels for… Read more »

4 Comments

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

The Next Age: The 20,000 Ft. View from the Schneider Influencer Summit

In today’s world, it’s easy to focus on the immediate challenges we see before us. Troubles in the Middle East. Tensions rising in Eastern Europe. Viruses we thought we had… Read more »

1 Comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Sustainability Embedded in Electrical Equipment

Our planet’s population growth is accelerating.  Its inhabitants are hungry for resources—and electricity is high on the list. Sustainability will be one of the major challenges of our future, and… Read more »

1 Comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

Data Transparency is Vital to World-class Hospitals

In speaking with hospital stakeholders around the world, from C-level executives to operational managers, we find one of the biggest challenges to improving operational efficiency is the sheer complexity of… Read more »

1 Comment

How mobility, big data, and social media impact the mining and metals industry

I’ve always liked to write articles about trends and their applications in the heavy / process industries. Most of the time, I’ve focused on trends related to automation, process control,… Read more »

1 Comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

An e-House Substation that Ushers in New Technology and Rethinks Standards

Prefabricated E-house (HV/LV) substations are a booming, fiercely competitive business. I’m talking about applications that range from PV or wind farm boxes to shore connections and data centres. I’m also… Read more »

5 Comments

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Security lessons learned from Boston’s hospitals

The International Association for Healthcare Security & Safety (IAHSS) gathered in Myrtle Beach, South Carolina on May 4th through May 8th for their 45th Annual General Meeting and Conference with… Read more »

Leave a comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment