security system Articles

  • Should energy managers worry about energy data security?

    Ah, 2016 – the year of fake news, celebrity deaths and cyber attacks, namely to the electricity grids of several countries. The biggest story came out of the United States, where the Washington Post (falsely)  ...


    By DEXMA

  • Case study - Remote water quality monitoring in South Africa

    Situated in the Mpumalanga province of South Africa, the Xstrata Coal South Africa (XCSA) runs several open cut and underground mining operations producing thermal coal. To ensure their mining operations do not affect the surrounding natural water bodies, the company employs Hydrolab and OTT water quality monitoring equipment with remote data transmission options: the OTT ecoLog 800 water level ...

  • Flow Rate Measurement in Full Pipes Using the Transit Time Method

    Particularly in large diameters the relevance of water volume measurement is growing. The challenge with cooling water or fresh water processes is to generate accurate flow recordings or to document and to control individual consumptions and withdrawal quantities. Flow detection, however, particularly in large diameters is highly demanding. In such cases the transit time measurement thanks to its ...


    By NIVUS GmbH

  • The climb to the top

    Back in the late 1980’s when market drivers created the cost-effective option of using above-ground circular tanks for industrial activated sludge processes, there were some early valuable lessons for both aeration equipment manufacturers and plant operators. As production plants got away from in-ground basins, one of the more simple innate operational checks became more challenging; ...


    By KLa Systems, Inc.

  • Technical and safety practices

    Safety is absolutely paramount in the medical industry, with lives literally at stake if something were o go wrong. Regrettably, this was more than reinforced recently following the tragic news of a death of a newborn at a hospital in Sydney, Australia, after it was mistakenly administered nitrous oxide (N2O) instead of oxygen (O2) in July this ...


    By Geotech

  • Odour Control at Pesticide Facilities: Eliminating volatile compounds

    Chemical formulation plants are susceptible to emissions of unpleasant and malodorous volatile compounds, a fact which makes the implementation of efficient odour control measures essential. North-western Spain is home to one of the country's oldest industrial sites for the manufacture of phytosanitary products, with some facilities located relatively close to populated areas. Recently, the ...


    By Bioconservacion SA

  • Top 10 Compliance Storylines from 2016

    For the compliance sector, 2016 was a critical year. It was a year in which regional government bodies around the globe took on greater responsibility as gatekeepers of environmental and human rights standards in the corporate sector. It was also the year of the investor, where corporate decision makers became more concerned with transparency and accountability in supply chains. ...


    By Assent Compliance Inc.

  • Securability for system of systems

    As the Department of Defense (DoD) pursues methods within the systems engineering process to combat potential information assurance (IA) vulnerabilities, a new paradigm is required. This paper introduces the concept of securability as a new ility to be considered within the systems life cycle. Alongside the traditional system ilities (i.e., reliability, maintainability, supportability, etc.), ...


    By Inderscience Publishers

  • 10 Reasons why you should continuously monitor low temperature and liquid chemical sterilants for worker safety

    1. Sterilant chemicals are highly toxic Low temperature and liquid chemical sterilants are designed to kill all microorganisms including resistant spores and if they were not toxic, they would not be effective in sufficiently high concentration to destroy all microbial life including the chemically resistant sporicidal forms of certain ...


    By ChemDAQ, Inc.

  • Secure in quality

    ISO 9001 is the most important quality management system in use today. A company that holds ISO 9001 is telling its customers and the world that it has a top quality management system and is totally committed to quality products and services. Companies that go through the process find that profits increase thanks to opening up market opportunities. Also costs reduce due to improving efficiency. ...


    By IMSM Ltd

  • Energy Security

    Renewable & Clean Energy Solutions to Secure Energy Independence from Foreign Oil. FOREIGN OIL: As imports grow and world prices rise, the amount of money we send to foreign nations every year is soaring. At current oil prices, we will send $700 billion dollars out of the country this year alone — that’s four times the annual cost of the ...

  • Water Distribution System Security Monitoring

    A water security instrument essentially needs to be able to detect potential contaminants in drinking water. Since a significant number of potential chemical contaminants are organic in nature, a water security monitoring instrument that can detect organic matter in water is perfect for this application. Real Tech has developed an instrument specifically designed for water security ...


    By Real Tech Inc.

  • Taxonomy of SCADA systems security testbeds

    Considerable research has focused on developing simulation environments to study the effects of cyber–attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the ...


    By Inderscience Publishers

  • Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security

    Electronic Commerce (EC) provides the gateway for an enterprise's employees, managers, customers (clients), and all trusted suppliers and Trading Partners (TPs) to access electronic data applications and all the information they need (Akoh, 2001). Information security can be defined as the means of protecting data and information systems from any unauthorised access, use, disclosure, modification ...


    By Inderscience Publishers

  • Pathogen security: the illusion of security in foreign policy and biodefence

    'Pathogen security' (sometimes called 'biosecurity') is too often seen as the primary strategy to combat bioterrorism. Asserting that materials, technologies and expertise for bioterrorism are available worldwide and that terrorist groups are increasingly able to obtain and disseminate infectious disease pathogens, advocates contend that pathogen security systems and practices are central to ...


    By Inderscience Publishers

  • Designing and evaluating layered security

    Following systems engineering principles, we introduce analytic means to qualitatively judge and quantitatively assess layering of security controls with the aim of optimising risk reduction. The emphasis is on evaluating security controls in real world systems, where complications such as uncertainty, scale, multiple threats, multiple events, and multiple pathways from threat to event to ...


    By Inderscience Publishers

  • GuideKeeper security concept of operation

    GuideKeeper aims at defining the Security Concept of Operation (SECOP) and promoting the deployment in Europe of open architecture platforms for the use of Unmanned Aerial Vehicles (UAVs) for border surveillance. Several UAV system concepts will be considered. Of particular interest to the GuideKeeper project will be a High Altitude Platform Security Surveillance Tower (HAP Tower) with real-time ...


    By Inderscience Publishers

  • Redefining Security for the 21st Century

    By Lester R. Brown One of our legacies from the last century, which was dominated by two world wars and the cold war, is a sense of security that is defined almost exclusively in military terms. It so dominates Washington thinking that the U.S. foreign affairs budget of $701 billion in 2009 consisted of $661 billion for military purposes and $40 billion for foreign assistance and diplomatic ...


    By Earth Policy Institute

  • MacMachinery Secure Partnership with Sennebogen

    Despite the current economic climate Irish Company, Mac Machinery Limited, secures a partnership with German Enterprise Sennebogen (specialist in material handling solutions). The deal had been agreed in late 2009 and all parties are looking forward to working together to provide clients with a cost effective solution. Mac Machinery Marketing Manager, Annemarie Doohan, says that “you cannot stand ...


    By Mac Machinery Limited

  • Food security demands diversity

    The challenge calls for divergent solutions — small-scale, tech-based initiatives as much as long-term research. Last month our Spotlight pages explored sustainable food production — how farmers can grow more food with scarce resources, and within ...


    By SciDev.Net

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you