Security Management

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

6 Tips for Ensuring Optimal IT Environments at SMBs and Branch Offices

Raise your hand if you’ve seen a server stuck in a closet next to cleaning supplies, whirring away as dust gathers around it. It’s an all too common site at… Read more »

2 Comments

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Intelligence, Connectivity, Efficiency – the new ICE Age in Energy Management!

Energy is needed everywhere – be it industry, agriculture, homes, buildings, infrastructure or services. Even as we grapple with the twin-headed monster of rising energy demand and ravaging carbon emission,… Read more »

4 Comments

Data Transparency is Vital to World-class Hospitals

In speaking with hospital stakeholders around the world, from C-level executives to operational managers, we find one of the biggest challenges to improving operational efficiency is the sheer complexity of… Read more »

1 Comment

The Top Five Challenges Facing Today’s Hospitals

Healthcare organizations are continually battling conflicting priorities. Our customers tell us they need to focus on delivering high quality patient care, preventing infections, maintaining hospital security, and ensuring patient safety… Read more »

5 Comments

IBM and Schneider Electric Partner on Video Solution to Make Our Cities Safer

I live in the Boston area so was following with great interest the case of the Boston Marathon bombings last April. Like others across the country, and indeed the world,… Read more »

1 Comment

WEBCAST: Pinpoints Key Facts about the Secure Power Opportunity

In a new audio webcast presentation, Carsten Baumann, a consulting engineering specialist with Schneider Electric, raises two salient points about Secure Power for industry and infrastructure. As moderator for the… Read more »

Leave a comment

Functional division of LV installation systems and their architecture: general principles

Once we have clearly identified the main differences between Universal and Functional LV Panels, we will concentrate on the Functional ones. Since we decided that we want an LV Functional Panel,… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

If You’ve Got a Cloud, We’ve Got a Box For It

As businesses migrate their IT to the Cloud, and as virtualization takes hold, physical IT on the business premises is shrinking, particularly in remote, branch and SME offices. This poses… Read more »

Leave a comment

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

2014 ASHE Annual Conference Recap

Last week’s ASHE Annual Conference hit a new high. The presentations were well-attended and provided attendees with food for thought on everything from hospital emergency power to sustainability to progressing… Read more »

Leave a comment

Security lessons learned from Boston’s hospitals

The International Association for Healthcare Security & Safety (IAHSS) gathered in Myrtle Beach, South Carolina on May 4th through May 8th for their 45th Annual General Meeting and Conference with… Read more »

Leave a comment

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Strategies for Defending our Healthcare Heroes from Terrorist Attacks

Coauthored by Steve Nibbelink In light of the recent events that have plagued our cities, I would first and foremost like to extend my condolences to the victims and families of… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

The Mill of the Future and Technology Enablers

Lately, there have been numerous technical evolutions related to new metallurgical process, equipment, and software technologies. The idea of this blog is not to tackle such technologies, but try to… Read more »

Leave a comment

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment