scada

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name
By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
     Aditi
By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern
     Progress Software Corporation CEP
By: Stratus Technologies     Published Date: Jan 31, 2017
Download this white paper to learn how plants can make strides in modern technology to get the most of their current systems investments and future-proof their operations for the IIoT.
Tags : stratus, cross-sector, scada, operations, iiot, downtime
     Stratus Technologies
By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : stratus, operations, total cost of downtime, downtime, scada downtime
     Stratus Technologies
By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : eset, virus, scada, plcs, stuxnet, malware, siemens, code
     ESET
By: CyberX     Published Date: Feb 03, 2017
Arm yourself against the powerful cyberweapons and methods cyberattackers are using to compromise electrical grids, manufacturing, oil and gas, pharmaceuticals, and other critical infrastructure industries.
Tags : cyberx, ics hacking, hacking, cyberweapons, cyberattacks, production operations, ics, scada
     CyberX
By: Ciena     Published Date: Nov 15, 2016
"Demand for more energy continues to increase, putting a lot of pressure on utility companies to upgrade their aging supply infrastructure. This white paper addresses: >The current status of the electric grid >Explains why upgrading to a Smart Grid is necessary >Discusses the importance of the communication network’s role in this migration >Offers prescriptions for success in a smooth evolutionary path. Explore ""The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure"" by downloading it today. "
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Ciena     Published Date: Jun 12, 2017
In this whitepaper, you will see the smart city models and the keys to obtaining a smart city with SDN and NFV.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
     Ciena
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: Cambium Networks     Published Date: Oct 03, 2016
Cambium Networks’ fixed wireless broadband solutions provide an attractive ROI for electric utilities when replacing leased-lines for: Redundant backbone IP network rings Smart meter and distribution automation aggregation transport Transport for substation and distribution SCADA data Remote office connectivity Mobile WiFi connectivity in substations and operation centers Download this white paper to learn more.
Tags : wireless broadband, roi, mobile wi-fi connectivity, smart meter
     Cambium Networks
By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     LookingGlass Cyber Solutions
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
     Globalscape
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com