But before we move off to cover the annual Honeywell bake-off (it is expected to be 105 degrees Fahrenheit or roughly 40 degrees Celsius all week in Phoenix), I'll talk a little about my experiences in China.
Well, I'm back from a whirlwind tour of Rockwell Automation's process automation customers in China, and I've managed to mostly dig out from under all the accumulated desk-coverings. That said, we are off to Phoenix on Sunday for the Honeywell User Group Americas for 2010.
Spent the morning on a couple of conference calls relating to Rockwell Automation’s release of its financials for the second quarter of its fiscal year 2010. The bottom line: Pretty good, all things considered—and way better than 2009.
It's interesting to watch an idea come of age. I've been covering manufacturing of one sort or another for more years than I'm usually prepared to admit to, and from the beginning, about once a year, someone would come up and say, "You know, you really oughta do a story...
At Rockwell Automation's Automation Fair in 2009, we were treated to a little bit of live theater. Several RA product managers put on a show about the features and usability of PlantPAx, the version of FactoryTalk and Integrated Architecture that RA has optimized for process, batch and hybrid automation.
I recently posted a vulnerability in several models of the Rockwell Automation MicroLogix product line, and noted that, per the security researcher, Eyal Udassin of C4, Rockwell had been completely cooperative with the security researcher in working out a solution to the problem.
The following was posted, among other places, on the SCADASEC listserv. Eyal Udassin, a well-known and well respected security researcher with significant experience with control system functional security has discovered a vulnerability in some of Rockwell's products, and he and Rockwell have moved quickly to fix the vulnerability.