Security Management

Matriculating Healthcare Team members into Healthcare Facilities Directors

Matriculating Healthcare Team members into Healthcare Facilities Directors. How do you fill that gap? There is no doubt the past 20 years has seen several orders of change when it… Read more »

2 Comments

LV installation systems: internal organisation (2/2)

As promised in our previous article, it is time now to make a focus on Wall-Mounted panels. Wall-Mounted (WM) Panels We have to take in consideration the following elements which… Read more »

2 Comments

LV installation systems: internal organisation (1/2)

Let’s go one step forward on our way to choose a Low Voltage Electrical Distribution (LV ED) panel for our small or medium size building. Until now we concentrated on… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

LV installation systems: access rules

In our previous post we saw that an LV Functional Panel doesn’t have just electrical Distribution functions (which are its raison d’être), but also some functions related to its Installation… Read more »

2 Comments

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

The right way to choose an LV electrical distribution panel

This series of posts presents what the authors consider as the right way to choose an LV electrical distribution (ED) panel. We will refer only to LV ED panels for… Read more »

4 Comments

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

The best hospitals are safe hospitals

By far, clinical excellence lies at the core of world-class hospitals; however patient safety and hospital reputation also plays an important role, as indicated in U.S. News’ recent ranking of… Read more »

2 Comments

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Sustainability Embedded in Electrical Equipment

Our planet’s population growth is accelerating.  Its inhabitants are hungry for resources—and electricity is high on the list. Sustainability will be one of the major challenges of our future, and… Read more »

1 Comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments

Data Transparency is Vital to World-class Hospitals

In speaking with hospital stakeholders around the world, from C-level executives to operational managers, we find one of the biggest challenges to improving operational efficiency is the sheer complexity of… Read more »

1 Comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Security lessons learned from Boston’s hospitals

The International Association for Healthcare Security & Safety (IAHSS) gathered in Myrtle Beach, South Carolina on May 4th through May 8th for their 45th Annual General Meeting and Conference with… Read more »

Leave a comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment