Security Management

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

2014 ASHE Annual Conference Recap

Last week’s ASHE Annual Conference hit a new high. The presentations were well-attended and provided attendees with food for thought on everything from hospital emergency power to sustainability to progressing… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

Your Hospital’s Survival Depends on the Ability to Signal and Adjust

For the human body to develop properly and stay healthy, many processes must work together at many different levels – from organs to cells to genes. Cells are constantly receiving… Read more »

15 Comments

LV installation systems: access rules

In our previous post we saw that an LV Functional Panel doesn’t have just electrical Distribution functions (which are its raison d’être), but also some functions related to its Installation… Read more »

2 Comments

An e-House Substation that Ushers in New Technology and Rethinks Standards

Prefabricated E-house (HV/LV) substations are a booming, fiercely competitive business. I’m talking about applications that range from PV or wind farm boxes to shore connections and data centres. I’m also… Read more »

5 Comments

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

LV installation systems: internal organisation (1/2)

Let’s go one step forward on our way to choose a Low Voltage Electrical Distribution (LV ED) panel for our small or medium size building. Until now we concentrated on… Read more »

Leave a comment

LV installation systems: internal organisation (2/2)

As promised in our previous article, it is time now to make a focus on Wall-Mounted panels. Wall-Mounted (WM) Panels We have to take in consideration the following elements which… Read more »

2 Comments

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Safety First: Leon County/Tallahassee Join Forces and Up Power Protection

Today we’ll feature guest blogger Carl Morgan, construction manager for Leon County, Florida. Carl details below his data center installation within the Tallahassee/Leon County Public Safety Complex. Not every business needs… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

The Mill of the Future and Technology Enablers

Lately, there have been numerous technical evolutions related to new metallurgical process, equipment, and software technologies. The idea of this blog is not to tackle such technologies, but try to… Read more »

Leave a comment

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment