Tag "Safety"

Optimisation? Of course! – Part 3 of 3

The potential for innovation through digitalisation and its digital technologies is infinite – especially with regard to Synaptic Business Automation. With the entrepreneurial innovation mindset and methodologies like the SBA, many ideas can be found and implemented. Against this background, it is of course indispensable that the security foundation is laid in digital terms – keyword: Plant Security.

Read More

Topic IA2IA – new column by Dr. Andreas Helget is online

Self-propelled cars are well known. In other areas of application, however, “autonomy” is also a major (future) topic, for example in the process industry. But what do we actually understand by “autonomous systems” at present and where is the journey heading? In his latest column “Zur Sache, bitte” (To the point, please), Dr. Andreas Helget, Managing Director of Yokogawa Deutschland GmbH, deals with the topic of IA2IA.

Read More

Optimisation? Of course! – Part 2 of 3

In the first part of this series we have dealt with the question of what is meant by “optimizing” in this context and whether it is worthwhile to “optimize”. If one has come to a positive result for oneself, the question now arises, which possibilities there are. The following presentation of possibilities in the second of a total of three articles in this series certainly does not claim to be complete, but is intended as an incentive and source of ideas.

Read More

Optimisation? Of course! – Part 1 of 3

With regard to optimization, it is often a matter of finding a consensus as to what optimization can actually be. This three-part article will also take a look at the resources available for this. Whether it is worthwhile to optimize and if and what the whole thing has to do with Industry 4.0.

Read More

FIDO: Across how many user accounts is your digital identity distributed?

How do you currently register and log in for Internet / Web services? Use a password that at least meets the complexity requirements – keyword: the golden password rules. Or do you already use FIDO-Key? FIDO means “Fast IDentity Online”.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 3 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the third and last part here about Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 2 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and Plant Network Security Monitoring Service before part three deals with the Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies 1 / 3

Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the first part here before part two and three deal with the Simple visualization of existing plant network architecture, Customer Satisfaction and an interview with Hideyuki Nakaya of the Facilities Department’s Electricity Section, who led the project, and Satoshi Ikawa of the General Affairs Section., among other things.

Read More

Verification of Request- The Guardian of NOA(h)’s Ark

This is not the first post on this blog dealing with change in the process industry and its automation. The changes not only affect individual technologies but also their interaction with each other. At the same time, they open up

Read More

Where to store your passwords and how

Whether banking, shopping, mailing, streaming music or TV, forums or social networks – passwords are in demand almost everywhere. As secure as possible, of course. And in order to guarantee the highest possible level of confidence, i.e. confidentiality of your data, you should not only choose a password that is as secure as possible, but also a password that is as individual as possible for each individual account. But be careful! One thing should be clear to everyone: there is no one hundred percent guarantee of security. However, one can and should try to make the security layers around one’s own sensitive data as impenetrable as possible in order to get as close as possible to the optimal protection. Fortunately, there are a number of ways to do this.

Read More