LoginJoin
You must be an ISA member to view the Connectivity and Cybersecurity topics in this community. Please login or join to view and contribute to these conversations.
See a preview of all conversations below.
Carlos, There can be many factors that need to be considered when designing the backup capacity. Some examples that come to mind are: 1) What codes and standards are you intending or required to meet?, for example, if NFPA72 is desired or required, there are specific requirements ...
Hello Giorgio Welcome to ISA! You are in the right place if you want to complement your IT experience with OT, and develop your knowledge in this area. IC32 is a great start and I do recommend doing all four to become an ISA/IEC 62443 Expert. ISA has many books on industrial ...
There is no doubt that GPS spoofing is being carried out in regions of the middle east and in other territories involved in conflicts. There are some asset owners making modifications to their current set up away from GPS .... an example is below. Also, companies such as ...
Muhammad, It is not common in my experience that line monitoring components are used in Digital Output loops, to qualify that, I only say is is not common because in my 40+ years in the Process Industry (35 specifically in SIS design), I have never seen them used. I agree ...
While technically different, auto-logout and session lock serve effectively the same purpose, in my opinion. After a certain time period of inactivity, credentials must be re-entered in order to have access. The difference comes mainly down to the software and how it handles ...
The International Society of AutomationPO Box 12277 Research Triangle Park, NC 27709E-Mail: info@isa.orgPhone: (919) 549-8411Fax: (919) 549-8288
© International Society of Automation