Today's Top Story

Common methods, best practices for IIoT solidify

The only question now is how make IIoT simple, effective and secure in process applications

CT1906 CvrArt4

It always helps when someone else scouts ahead, cuts through the jungle first, and sends back guidance about sought-after destinations and avoiding hazards. And, just as geographical explorers assist travelers who come later, computing/networking pioneers can research, develop and experiment with new and emerging digitalized technologies to help those not as far up the learning curve. This is especially true for information technology (IT) experts, whose know-how is becoming more crucial to users in process control/automation and other operations technology (OT) disciplines as their industries are increasingly overrun by the Internet and its eponymous and unnecessarily…

Full Story

Resources

CT 1906 SOT Temp Press Small compressorTemperature & pressure management

Find the latest trends, technology and implementations on the topic of temperature and pressure management are detailed in this new eBook from the editors of Control. Topics covered include: diagnostics, pressure transmitter problems, and more. Download it here.

 

1906 CT Digital edition thumb compressorOur latest issue: June 2019

It was inevitable the Internet would take over from fieldbuses and their protocols. The only question now is how make it simple, effective and secure in applications and the HMI/SCADA, MES, ERP and other functions that serve them. Read the issue.

 

Voices: Ask The Experts

Natural gas metering mismatch

Why there will be two Volume 2s in the Instrument Engineers' Handbook

Q: We have a problem of production mismatch on the custodian metering system in our natural gas station (Figure 1). There are two trains with two different runs. It is a gas treatment and export station. We export to the LNG station and also to some domestic users. The details:Total production:…

Full Story

Most Recent

  • OGE cybersecurity checklist

    By Jim Montague

    Each process application has its own unique characteristics, and so each has its own vulnerabilities and cybersecurity tasks to perform. Jason Nations, senior enterprise security manager at OGE Energy Corp., Oklahoma City, detailed his cybersecurity to-do list during his presentation at ARC…

    Full Story
  • Do the cybersecurity to-do list

    By Jim Montague

    Well begun truly is half done, but with cybersecurity, it's still hard to progress beyond initial steps like updating passwords and segmenting networks with managed Ethernet switches used as firewalls to monitor network traffic, detecting suspicious behavior, and responding to threats and…

    Full Story
  • Prioritize input to help preserve effective personal performance

    By Jim Montague

    All of the process control and automation engineers and other professionals I know—and I'd bet most of those I don't know—are experts at managing and optimizing the physical fluids, chemicals and combined substances in their applications, remote sites and other facilities. It's no surprise this…

    Full Story
  • Your potential is not just about technical skill

    By R. Russell Rhinehart

    One child is trained to appease their younger sibling. As a result, the younger child just becomes more demanding, making the older child more submissive. But such acquiescence pleases parents, which the older child is seeking to do. The two children learn that playing those different roles is the…

    Full Story
  • Use wireless to monitor thief hatches

    By Vance Ray

    Thief hatches (Figure 1) are installed on the top of low-pressure and atmospheric tanks in the oil & gas, chemical, pharmaceutical, biogas, water treatment and other industries to allow access to the tank. They can be used to take samples of the tank’s contents and determine the level of the…

    Full Story
  • Get into the IIoT mindset

    By Jim Montague

    Gaining operational benefits from the Industrial Internet of Things (IIoT) requires more than adding components and common protocols—it also requires users to shift their personal perspectives."IIoT isn't a switch that's turned on and off or a magical gemstone that's achieved because it evolves…

    Full Story

Latest Products