Security Management

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

8 ways hospitals can benefit from an “intelligent infrastructure”

The United Nations predicts that the number of people who are 60 or older today – 841,000,000 – will increase to 2 billion by 2050. The sheer number of patients… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

6 Tips for Ensuring Optimal IT Environments at SMBs and Branch Offices

Raise your hand if you’ve seen a server stuck in a closet next to cleaning supplies, whirring away as dust gathers around it. It’s an all too common site at… Read more »

2 Comments

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Intelligence, Connectivity, Efficiency – the new ICE Age in Energy Management!

Energy is needed everywhere – be it industry, agriculture, homes, buildings, infrastructure or services. Even as we grapple with the twin-headed monster of rising energy demand and ravaging carbon emission,… Read more »

4 Comments

Safety First: Leon County/Tallahassee Join Forces and Up Power Protection

Today we’ll feature guest blogger Carl Morgan, construction manager for Leon County, Florida. Carl details below his data center installation within the Tallahassee/Leon County Public Safety Complex. Not every business needs… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Matriculating Healthcare Team members into Healthcare Facilities Directors

Matriculating Healthcare Team members into Healthcare Facilities Directors. How do you fill that gap? There is no doubt the past 20 years has seen several orders of change when it… Read more »

2 Comments

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

3 Benefits of Using Safety Embedded Drives in Industrial Machines

Machine safety in the factories has evolved in recent years. Safety components and systems are no longer installed only to satisfy the minimum requirements and laws. Today the companies have… Read more »

4 Comments

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment