Security Management

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

The Next Age: The 20,000 Ft. View from the Schneider Influencer Summit

In today’s world, it’s easy to focus on the immediate challenges we see before us. Troubles in the Middle East. Tensions rising in Eastern Europe. Viruses we thought we had… Read more »

1 Comment

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

2014 ASHE Annual Conference Recap

Last week’s ASHE Annual Conference hit a new high. The presentations were well-attended and provided attendees with food for thought on everything from hospital emergency power to sustainability to progressing… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

How mobility, big data, and social media impact the mining and metals industry

I’ve always liked to write articles about trends and their applications in the heavy / process industries. Most of the time, I’ve focused on trends related to automation, process control,… Read more »

1 Comment

LV installation systems: access rules

In our previous post we saw that an LV Functional Panel doesn’t have just electrical Distribution functions (which are its raison d’être), but also some functions related to its Installation… Read more »

2 Comments

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

LV installation systems: internal organisation (1/2)

Let’s go one step forward on our way to choose a Low Voltage Electrical Distribution (LV ED) panel for our small or medium size building. Until now we concentrated on… Read more »

Leave a comment

LV installation systems: internal organisation (2/2)

As promised in our previous article, it is time now to make a focus on Wall-Mounted panels. Wall-Mounted (WM) Panels We have to take in consideration the following elements which… Read more »

2 Comments

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment