Top 5 Control Engineering articles, July 14 to August 13: Future of oil prices, robot trends and types, SCADA cyber security, more
Control Engineering Top 5 most read articles online, for Jul. 14 to Aug. 13, covered the future of oil prices, industrial robot trends and types, SCADA cyber security, IIoT at the I/O level, and process modeling and feedback controllers. Link to each article below.
The price of oil may not have hit the nadir yet, supply is almost double that of demand, and the Iran deal may slash oil prices to new lows.
Diversity of robotic trends, types, and programming advances make the use of robots attractive to consider in more applications and industries, and resulting innovations should benefit manufacturing. See 10 robotic software trends and 9 robot types.
Securing control systems with supervisory control and data acquisition (SCADA): SCADA software, part of many industrial control systems, can use the U.S. National Institute of Standards and Technology (NIST) framework for cyber security.
Really look at the Industrial Internet of Things (IIoT): How will device-level communication work using this developing technology? What is IIoT? Learn four IIoT misconceptions, five ways IIoT is new, and six reasons why the disruptive technology of IIoT will be slow to catch on.
Feedback controllers assume that their control efforts will have some effect on the process variable. Advanced process control (APC) and advanced regulatory control (ARC) can help a controller choose its control efforts more effectively by modeling the process.
More popular stories on Control Engineering
As an online-only feature, we’re featuring the stories that finished 6-10.
We are living in an increasingly connected world and this connectivity poses the question: “How will it affect the oilfield?” The implications from this are profound and will affect all industries over the next few years.
As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up. Fortunately, the tools are getting better.
Although the field of computer security and its relation to ICS security is extensive and highly technical, these recommendations can help mitigate many of the most common and easily exploitable security holes.
Linking operations technology (OT) systems, such as SCADA and sensors to IT-level big data analytics is possible, but begs for the right asset-centric and event-driven view of OT-level trends so the IT-level analytics can find relevant patterns.
Cyber security: Exploring some of the technical concepts will help an end user understand and prevent security flaws when creating SCADA and HMI software applications and the underlying networks architectures.
The list was developed using CFE Media’s web analytics for stories viewed on controleng.com, July 14 to August 13, for articles published within the last two months.
– Chris Vavra, production editor, CFE Media, email@example.com.
Control Engineering has a monthly newsletter that emails this information to recipients. See and subscribe to Control Engineering newsletters here.