SCADA (supervisory control and data acquisition) is a comprehensive system of hardware and software designed to enable organizations to control and monitor industrial processes. Widely use across ...
Technology convergence is well-known in nearly every sector. We’ve all seen it happen in the consumer tech sector, most notably as our cell phones transformed into smartphones that allow us to make ...
The ISA-112 Part 1 standard provides a framework for modernizing supervisory control and data acquisition systems and making them easier to design, build, operate and maintain. ISA logo ...
Supervisory Control and Data Acquisition (SCADA) technologies were adopted early by the electric utility industry to assist in the monitoring of the widely distributed grid. Electric utility SCADA has ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Little-known fact: The power plant able to generate the most ...
Utilities of all sizes face the challenge of efficiently monitoring real-time substation performance across their networks. Each substation is or has the potential to be a data-rich environment, with ...
Something is happening at the grid edge that is reshaping what “essential infrastructure” means. Distributed Energy Resource ...
The Internet of Things needs technology to connect people to machines and processes. From the operators on the plant floor to the execs in the C-suites, supervisory control and data acquisition (SCADA ...
The EU's cyber security Agency ENISA released a white paper today, giving recommendations regarding prevention and preparedness for an agile and integrated response to cyber security attacks and ...
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines. During the spring, attackers ...
Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results