The top ten articles of the first half of 2020
If the year 2020 were a football match, it would be halftime long ago. Reason enough to look back on the first half of 2020. Because a lot has happened in the first half of the year – including, of…
If the year 2020 were a football match, it would be halftime long ago. Reason enough to look back on the first half of 2020. Because a lot has happened in the first half of the year – including, of…
SOP – Standard Operation Procedures – play an important role, especially in regulated companies such as the pharmaceutical or food industry. Due to the high relevance of the processes to the environment, health and safety, the share of SOPs in…
Keep Standard Operating Procedures (SOP) up to date – secure implicit knowledge Read More »
In the first part of this series we have dealt with the question of what is meant by “optimizing” in this context and whether it is worthwhile to “optimize”. If one has come to a positive result for oneself, the…
With regard to optimization, it is often a matter of finding a consensus as to what optimization can actually be. This three-part article will also take a look at the resources available for this. Whether it is worthwhile to optimize…
How do you currently register and log in for Internet / Web services? Use a password that at least meets the complexity requirements – keyword: the golden password rules. Or do you already use FIDO-Key? FIDO means “Fast IDentity Online”.
FIDO: Across how many user accounts is your digital identity distributed? Read More »
Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the third and last part here about Customer Satisfaction and an interview with Hideyuki Nakaya…
Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the second part here about Simple visualization of existing plant network architecture, Virtual Network and…
Our new three-part blog article deals with the topic “Converging and Securing OT-IT – Enabling Industrial Network Security Solutions for Use With Key Technologies”. Read the first part here before part two and three deal with the Simple visualization of…
This is not the first post on this blog dealing with change in the process industry and its automation. The changes not only affect individual technologies but also their interaction with each other. At the same time, they open up…
Verification of Request- The Guardian of NOA(h)’s Ark Read More »