Finding the Right Catalyst to Perfect the Project Team

Sep 28, 2016 2:34:16 PM | Posted by Josh Bozeman

A project team looking to reach the end of a project should look for a team member that can serve as a bridge, or a catalyst, between the technical, sales, and management side to ensure that everything goes smoothly. 

Read More →

Cyber security essentials: Part III

Jan 21, 2015 6:11:00 AM | Posted by Josh Bozeman

The third and final installment of the Cyber Security Essentials series identifies best practices for protecting your internal and external networks, components of well-secured networks, and other dangers to be aware of.

In Parts I & II of this article, we outlined some of the most common cyber attacks, and got some great feedback from an ethical hacker on system architecture that can protect your network. In this final section we’ll finish the interview with a discussion about the weakest link in most networks.

Read More →

Cyber security essentials: Part II

Jan 9, 2015 4:22:00 AM | Posted by Josh Bozeman

The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.

In Part I of this series, we outlined some of the most common cyber attacks and some of the simple ways a user can guard against them. I sat down with an ethical hacker to hash out what robust network security looks like.

Read More →

Cyber security essentials: Part I

Jan 7, 2015 11:11:00 AM | Posted by Josh Bozeman

The first installment of the Cyber Security Essentials series introduces the topic of cyber security and outlines the major concepts to be aware of.

Read More →

Distributed control systems: Four things to consider when emulating a third-party application

Apr 9, 2014 8:17:55 AM | Posted by Josh Bozeman

The capabilities of a DCS appear so limitless that we’re sometimes asked to replicate an external third-party application in the existing control system. Keep these four considerations in mind.

The modern distributed control system (DCS) is extremely powerful and highly versatile. The capabilities appear so limitless that we’re sometimes asked about the option to replicate an external third-party application in the existing control system. Typical justifications include saving thousands each year in maintenance costs and product support while streamlining operator training. Though it would appear that this might be a fairly small project, there can be a lot more to consider than meets the eye, especially to someone that's not highly attuned to complex control configuration. Before signing on the dotted line, here are a few things to keep in mind.

Read More →