The company unveiled the first models of its new line of MGE and MLE motors with integrated frequency converters up to and including 2.2 kW at the ISH 2013 trade fair in Frankfurt. The MGE/MLE motors operate above the new IE4 motor ...
Tags: asynchronous motors, motors
Grundfos was a primary supplier for the large-scale project for the refurbishment and expansion of the largest wastewater treatment plant in the Balkans. The Sofia wastewater treatment plant (WWTP) at Kubratovo treats the domestic ...
A new service pack for the SCADA software InduSoft Web Studio v7.1 adds multi-touch development capabilities for touchscreen enabled devices. Unlike traditional touch screen designs, multi-touch systems can recognize the position of several ...
Tags: Multi-Touch, HMI
Xylem Inc. announced that it has acquired MultiTrode Pty Ltd, a privately held Australia-based water and wastewater technology and services company, for approximately $26 million. The actual terms of the transaction were not disclosed. ...
Tags: Xylem, Acquisition, MultiTrode Pty Ltd
The need to meet new environmental standards, the growing demand for water and the need to replace obsolete infrastructure are causing U.S. water utilities to embark on thousands of capital improvement projects. These projects are tracked ...
Tags: environmental standards, US, water utilities
Wesley McGrew, a research assistant at Mississippi State University, may be among the few people thrilled with the latest grim report into a years-long hacking campaign against dozens of U.S. companies and organizations. But McGrew's ...
Wesley McGrew, a research associate at Mississippi State University, may be among the few people thrilled with the latest grim report into a years-long hacking campaign against dozens of U.S. companies and organisations. But ...
Tags: US Students, Malware Code, computer security
Malvern Instruments has added new functionality to its Malvern Link II product, the powerful software package that enables the integration of multiple analysers within an automated control platform. The latest developments extend the ...
Photovoltaic inverter design is now seen as the crucial element in solar power development, writes James Turner, and he discusses some of the challenges that can shape PV inverter design. Over the last few years the photovoltaic (PV) ...
Security watchdogs are now worried about a new attack vendor that cybercriminals could take advantage of – the growing number of devices that routinely use the Internet to function. Machine-to-machine (M2M) security is closely ...
Tags: security watchdogs, attack vendor, cybercriminals, M2M
Regular as clockwork -- just after an election which generated far too many stories of people waiting far too long to vote (and far too many local election officials saying that everything went fine and that there were no problems) -- come ...
Tags: vote, wait, online voting, Internet
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Affinity Automation is excited to announce that it will be adding the eSight Energy Management suite to its line-up of energy information system offerings. SCHAUMBURG, IL, September 29, 2012 /24-7PressRelease/ -- According to Allan Evora, ...
Tags: LLC, Computer Products, Managed Service
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability