JAN-FEB 2018

Issue link:

Contents of this Issue


Page 3 of 53

4 INTECH JANUARY/FEBRUARY 2018 WWW.ISA.ORG PROCESS AUTOMATION 14 HART integration supports industrial digitalization By Ted Masters The vision of industrial digitalization, Industry 4.0, and the Industrial Internet of Things requires inte - gration with IT and OT systems to be successful. WirelessHART and HART-IP developments help deliver the benefits of intelligent devices with digital com - munications while preserving existing infrastructure, training, control system, and operational investments. FACTORY AUTOMATION 18 The next generation of MTConnect applications By Russ Waddell The MTConnect standard enables manufacturing equipment to provide data in open structured XML formats for predictive analytics. It facilitates a wide range of new applications for industry, using manu - facturing data sources to support more efficient op- erations, improved production optimization, greater productivity, and increased profits. SYSTEM INTEGRATION 22 At the intersection of alarms and safety systems By Lee Swindler, Ron Carlton, and Richard Slaugenhaupt Some alarms are designed to be part of the larger safety instrumented system. In fact, some become specific layers of protection. These deserve special treatment during the alarm rationalization process to retain the functionality the safety planners envisioned. AUTOMATION IT 26 Remote access to automa- tion system components By Jonathan Griffith Remote access to local automation components can be securely provided by two types of VPNs, each of which this article examines and evaluates. COVER STORY Breaking closed architecture bonds By Bill Lydon The Open Process Automation™ Forum is a new "coali- tion of the willing" of end users and their key suppliers throughout the industries that use process control. They are defining a standards-based, open, secure, multi- vendor, interoperable automation and control architec- ture to leap ahead of today's DCS offerings. January/February 2018 | Vol 65, Issue 1 8 SPECIAL SECTION: CYBERSECURITY 34 Checking cybersecurity vital signs By Lee Neitzel It is difficult to determine how well your ICS is protected against cybersecurity attacks without a full cybersecurity assessment. However, you can gain valuable insights into your ICS's cyber - security readiness through a self-check.

Articles in this issue

Links on this page

Archives of this issue

view archives of InTech - JAN-FEB 2018