Industrial Networking Enabling IIoT Communication

| September 4, 2018

article image
Industrial networking is a collection of technologies at the Internet Protocol (IP) layer and below that enable the transformation of industries. There are many choices in technologies, both existing and emerging. What are the networking needs, what applications to support on the industrial network, and what is the deployment situation and conditions? These are key questions to answer when defining a strategy for technology selection and reaching a concrete deployment solution

Spotlight

VERISIGN

Verisign, a global leader in domain names and Internet security, enables Internet navigation for many of the world’s most recognized domain names and provides protection for websites and enterprises around the world. Verisign ensures the security, stability and resiliency of key Internet infrastructure and services, including the .com and .net domains and two of the Internet’s root servers, as well as performs the root-zone maintainer functions for the core of the Internet’s Domain Name System (DNS).

OTHER ARTICLES

Black Hat 2020: Session Highlights and a Look Ahead

Article | August 14, 2020

Last week concluded another valuable Black Hat USA event – although held entirely virtually this year, the impact of the research, trends, and knowledge shared was as strong as ever. From new industry trends such as extended detection and response (XDR) to current event security considerations and best practices to detect and mitigate some of the most prevalent and challenging threats – the content did not disappoint! In case you missed them, below are a couple sessions that grabbed headlines and high audience engagement:

Read More

Heuristics in Tech Writers Training

Article | August 14, 2020

Cognitive pathway and heuristic evaluation are two methods used to assess systems’ usability based on cognitive engineering, which uses cognitive psychology knowledge to understand the human mind’s skills and limitations to develop user-friendly systems. The cognitive pathway is the evaluation of a system's ease of learning by exploring its interface in which the user's tasks are broken down into actions necessary to perform a given task, and heuristic evaluation is the evaluation of the usability level of the user interfaces through basic rules. Although these two methods are part of the UX discipline, we Tech Writers also use them. Not ipsis litteris, obviously, but abstractly because of what originates them: cognition and heuristics. Cognition is the psychological function that acts in the acquisition of knowledge through logical associations. Heuristic is the human capacity characterized as discovery and/or invention focused on solving problems through experience and creativity. The documentation requests we receive do not always come with in-depth technical and functional specifications. It is not uncommon for us to venture into the system alone to learn and discover how, when, where and why certain functionality is being launched. In our learning and discovery process, we put ourselves in the user's shoes and decompose the necessary actions to carry out their tasks. We test patterns, experiment with basic (and alternative) flows using our experience and creativity to produce complete and detailed documentation. As we develop knowledge in the system we document, we mainly use the recognition heuristic based on the uptake of memories and the recognition of alternatives. We start having dèja-vu when we perceive similarities between the functionalities we already documented. Even if our recognition process becomes more organic and fluid, we still smell rats: why does this form have an extra field? What happens if I fill this field with another value? Tech Writers need to be partly laymen, as there has to be a certain lack of recognition for further inferences to exist. That is why having no background in systems technology can, contrary to popular belief, be extraordinarily favorable for Tech Writers’ training.

Read More

What Is an Intelligent Virtual Assistant and How Can It Help Your Business?

Article | August 14, 2020

This article was originally published in Smart Selling Tools and is reprinted with permission by the author. The piece has since been updated to match advances in our technology. The fourth industrial revolution is upon us. Connectivity, data, and processing power have come together to make disruptive technologies like Artificial Intelligence (AI) possible. While we are just scratching the surface on what we can do with AI, we’re seeing more and more companies – from fledgling startups to large corporations – begin to offer specialized AI applications.

Read More

How to monitor etcd

Article | August 14, 2020

Learning how to monitor etcd is of vital importance when running Kubernetes in production. Monitoring etcd will let you validate that the service performs as expected, while detecting and troubleshooting issues that could take your entire infrastructure down. Keep reading to learn how you can collect the most important metrics from etcd and use them to monitor this service. etcd is a foundational component of the Kubernetes control plane. It stores your cluster desired state (pods, secrets, deployments, etc.), among other things. If this service isn’t running, you won’t be able to deploy anything and the cluster can’t self-heal.

Read More

Spotlight

VERISIGN

Verisign, a global leader in domain names and Internet security, enables Internet navigation for many of the world’s most recognized domain names and provides protection for websites and enterprises around the world. Verisign ensures the security, stability and resiliency of key Internet infrastructure and services, including the .com and .net domains and two of the Internet’s root servers, as well as performs the root-zone maintainer functions for the core of the Internet’s Domain Name System (DNS).

Events