Articles Directory: Explore Our Publications Page 35

NEC 2017 – Meeting Room Outlet Requirements

In 2017, NEC began requiring Electrical Receptacles in Meeting Rooms to look a certain way to prevent hazards: Before 2017 – Unregulated 2017 NEC – Required. Section, 210.71 To…
Read More

Some EnOcean Security Concerns

From the SEC Consult Vulnerability Lab, here are the following security concerns surrounding EnOcean.    …
Read More

Part 1 – Special Feature – Automation, You & the Future

There is a hint of the smell of fear when you talk about automation now in 2017. Its become blatantly obvious to everyone that huge changes to our world are coming. The most obvious of which are Amazo…
Read More

K9 Pulleez Bunny Squeak Toy

  Hi. Ever wondered how they make these little stuffed mammals? The easiest way to learn is to take one to pieces. Many humans call this ripping, chewing and destroying. They cannot…
Read More

Exterior Temperature Sensor – Solar Harvesting

Exterior Temperature Sensor – Solar Harvesting The sensors 02LINE 10020076 are designed to measure the outside ambient temperature and transmit it wirelessly to a matched receiver. As the senso…
Read More

Harvesting Energy From Temp Differences

Harvesting Energy From Temp Differences A temperature difference of only 2 °C delivers enough energy for electronic devices, enabled by the combination of a DC/DC converter and a Pelt…
Read More

EnOcean Security Model

EnOcean Security Model All EnOcean modules have a  unique 32-bit identification number (ID),  which cannot be changed or copied and therefore protects against duplication. This authen…
Read More

Security Comparison – BACnet vs EnOcean

As you can see from the images below, BACnet has a lot of ICS certifications whereas EnOcean has none. So for the security comparison of BACnet vs. EnOcean, BACnet wins.…
Read More

Part 2 – Special Feature – Cyber Attack – The Looming Automation Crisis

Ask us for an article to introduce the cyber attack series!!! This is the launch of a ongoing series. We will focus on Cyber attacks as related to the automation industry.…
Read More

Why Is BACnet Vulnerable?

Why Is BACnet Vulnerable? The following19services & 5 features provided by the BACnet protocol offer significant vulnerabilities to atta…
Read More

5 Features of BACNet That are Vulnerable

BACNet Vulnerabilities are real. Here are the features to be aware of. UDP Vulnerability BACnet uses the UDP Protocol for Transport Layer of i…
Read More

How Can BACnet Attacks Cause Harm?

If your system is attacked what's the worst that can happen? How easy is it to cause? To stop? Cyber attacks can cause harm. The harm can be extreme such as when permanent damage is caused to…
Read More

Contact Us

Contact us via phone (+1 866-383-1657) or leave a detailed message below for sales, support, or any other needs

*Required Field
*Required Field
I'd like to receive the newsletter. *Check email for confirmation.
*Required Field
8:00am - 12:00pm 12:00pm - 5:00pm
Message Sent Successfully