Controlling Interests Editors' Blog

Unlocking the Secrets of Uranium Dioxide’s Thermal Conductivity

Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance. 

Cybersecurity: SWAMP Helps Find Software Vulnerabilities

The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities. 

The Internet of (Insecure) Things

BYOD security issues raise important questions core to cyber security.

Massive Oil Spills: Are Drilling Rigs Still at Risk from Blowouts?

Even after the disastrous 2010 BP oil spill, blowouts from underwater oil wells continue to pose a dangerous risk for drilling rigs. 

Nanopower Magnetic Sensors Work Across Large Air Gaps

Needing only tiny amounts of power, anisotropic magnetoresistive (AMR) sensor ICs can detect  magnetic fields as weak as 7 Gauss. 

Hacker Helps Forestall Cyberattacks on the U.S. Military, Congress and NASA

A hacker helped authorities  disrupt at least 300 cyberattacks.

Microsoft XP Falls Victim to the Cybersecurity Wars

Hackers are exploiting an Internet Explorer vulnerability that was recently left unpatched in Windows XP. Microsoft doesn't plan on doing anything about the problem. 

U.S. Indicts Five for Cyber Spying. Now Are You Worried About Cybersecurity?

A U.S. grand jury has indicted five Chinese for stealing industrial secrets via computer from U. S. companies

Worried About Cybersecurity?

The ISA Cybersecurity Conference 2014, Detroit, June 9 - 12, 2014,  will help help attendees learn how they can protect their industrial networks and controls systems against cyber threats.

Managing Capital Projects in the Cloud

Capital projects need to scale up and down quickly, making cloud-based project management solutions a good fit