Remove author mark-t-hoske
article thumbnail

Industrial motor communications: Optimization

Control Engineering

There are many cybersecurity best practices to protect motor-drive communications and include identification and authentication control, authorization and use control, system integrity and data confidentiality, among others. Edited by Mark T. KEYWORDS: Industrial motor-drive communications, networks. CONSIDER THIS.

article thumbnail

More answers about how next-generation automation will help in 2023

Control Engineering

18, 2022, archived for a year, “Automation Series: How next-generation automation will help in 2023,” award winning control system integrators Eosys, George T. Courtesy: Eosys, George T. Security doesn’t have to be the reciprocal of convenience. Edited by Mark T. In a Control Engineering webcast, Jan.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five pillars to improve operational cybersecurity: Do you need essential help?

Control Engineering

Courtesy: Control Engineering video, Schneider Electric Mark T. Hoske is content manager, Control Engineering, CFE Media and Technology, mhoske@cfemedia.com. Learn which components are right for your implementation: Use at least one from every pillar. At minimum, he advises using one from each.

article thumbnail

How to optimize industrial motor communications, Part 4, cybersecurity

Control Engineering

Cybersecurity best practices with motor and drive communications Bob Trask: We really don’t want motor and drives to worry about cybersecurity practices. Our feeling is that I don’t want to have to worry about my motor drive getting affected by the overall system. This has been edited for clarity. Thank you very much.

article thumbnail

Are you applying a PID control to non-linear processes correctly?

Control Engineering

Courtesy: ControlSoft Matt Petras is senior control application engineer and author, with contributions from Alireza Haji-Valizadeh Ph.D., Edited by Mark T. Hoske, content manager, Control Engineering, CFE Media and Technology , mhoske@cfemedia.com. Graph 6 is updated with this added information.

article thumbnail

More answers on how to digitalize an OT-data infrastructure

Control Engineering

Security concepts that come into play here are: authentication for establishing trust between entities (both software and users) and authorization (determining who can see what and do what with it). – Edited by Mark T. Hoske, content manager, Control Engineering, CFE Media and Technology , mhoske@cfemedia.com.