Security Management

Lessons from Biology: Why Your Hospital Needs an Autonomic Nervous System

Hospitals are unique environments where we care for our most vulnerable population: patients. We are relatively successful at creating hospital structures that protect patients from powerful forces of nature such… Read more »

1 Comment

8 ways hospitals can benefit from an “intelligent infrastructure”

The United Nations predicts that the number of people who are 60 or older today – 841,000,000 – will increase to 2 billion by 2050. The sheer number of patients… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

6 Tips for Ensuring Optimal IT Environments at SMBs and Branch Offices

Raise your hand if you’ve seen a server stuck in a closet next to cleaning supplies, whirring away as dust gathers around it. It’s an all too common site at… Read more »

2 Comments

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Intelligence, Connectivity, Efficiency – the new ICE Age in Energy Management!

Energy is needed everywhere – be it industry, agriculture, homes, buildings, infrastructure or services. Even as we grapple with the twin-headed monster of rising energy demand and ravaging carbon emission,… Read more »

4 Comments

Safety First: Leon County/Tallahassee Join Forces and Up Power Protection

Today we’ll feature guest blogger Carl Morgan, construction manager for Leon County, Florida. Carl details below his data center installation within the Tallahassee/Leon County Public Safety Complex. Not every business needs… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Matriculating Healthcare Team members into Healthcare Facilities Directors

Matriculating Healthcare Team members into Healthcare Facilities Directors. How do you fill that gap? There is no doubt the past 20 years has seen several orders of change when it… Read more »

2 Comments

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

3 Benefits of Using Safety Embedded Drives in Industrial Machines

Machine safety in the factories has evolved in recent years. Safety components and systems are no longer installed only to satisfy the minimum requirements and laws. Today the companies have… Read more »

4 Comments

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

The Mill of the Future and Technology Enablers

Lately, there have been numerous technical evolutions related to new metallurgical process, equipment, and software technologies. The idea of this blog is not to tackle such technologies, but try to… Read more »

Leave a comment

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

WEBCAST: Pinpoints Key Facts about the Secure Power Opportunity

In a new audio webcast presentation, Carsten Baumann, a consulting engineering specialist with Schneider Electric, raises two salient points about Secure Power for industry and infrastructure. As moderator for the… Read more »

Leave a comment

Micro data centers: The Perfect Choice for Edge Computing

With the explosion of connected devices and data applications, bandwidth, latency and processing speed are becoming big concerns. It’s hard to keep up with the fast pace of business if… Read more »

Leave a comment