Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Broadcast AV

Posted by: Steve Lampen on October 21, 2014

First of all, I need to apologize. A few blogs ago, I wrote my usual piece about where I will be travelling. I suppose I should always add "the best laid plans of mice or men" because, as I also believe, "this too shall change". That is the motto I go by. So if something good is happening, you'd better enjoy it because "this too shall change". And if something bad is happening, just hunker down because "this too shall change". Since I am on a quotation kick here, "There is nothing constant except change...except from a vending machine."

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Ethernet

Posted by: Heather MacKenzie on October 15, 2014

If you are a controls or process engineer you will have noticed the direct involvement of IT while designing and deploying industrial Ethernet. While the networks and technologies come together easily, the language, culture and standard practices used by IT are very different. Indeed, they often pose a significant problem in a production environment.

If you are an IT professional working in a production environment you’ve probably run into a ton of resistance and anxiety from others based on perceived differences. Take heart, your skills are still valuable and may just require a few new twists and tweaks.

In today’s article I hope to bring some understanding to both sides so that you can work together to better meet your company’s common goals.

Read More >>


Comments (2)
Post a Comment

Blog Category: Data Centers

Posted by: Michael Salvador on October 09, 2014

Understanding and determining data center redundancy, availability and reliability is a critical part of the holistic design process, and one that can significantly impact cost. However, there is often confusion surrounding these three factors.

Some believe that redundancy, availability and reliability are one in the same, but that is not the case at all. Let’s take a closer look.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Heather MacKenzie on October 08, 2014

My previous article covered part of Scott Howard’s presentation on ICS Security for Oil and Gas applications from this year’s Design Seminar. In that article we reviewed some of the cyber security fundamentals discussed by Scott.

For example, we examined the fact that most cyber threats are unintentional and originate from within the control network. We also looked at the fact that a perimeter defense is not sufficient and that IT solutions are not appropriate on the plant floor.

Instead what’s needed Defense in Depth, that is, multiple layers of defense that work together to prevent network incidents or contain them if they do occur. A key best practice for Defense in Depth is to implement the zone and conduits model as defined in the ISA IEC 62443 standard. While not a regulation, this standard provides practical guidance that leads to more robust cyber security.

Today we will take a closer look at zones and conduits and then review how they might be implemented in three oil and gas applications.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Ethernet

Posted by: Brian Oulton on October 01, 2014

No matter where your organization is on the path of adopting industrial Ethernet, it is likely that unmanaged switches play a role in directing traffic on your network. Perhaps your team waited for the early adopters of Ethernet to iron the kinks out or you recently invested in your first system because of supplier or management demands.

On the other hand, you may have a robust industrial Ethernet infrastructure that has unmanaged switches on its fringes or in smaller networks.

In any of these scenarios, ease-of-use and low cost were likely the factors that led to the selection of unmanaged switches.

I am writing today to let you know about a new category of industrial Ethernet switches, lightly managed switches. These devices offer the same simplicity as unmanaged switches and are very reasonably priced – but with additional features that make sure your networks are running at peak performance.

Read More >>


Comments (0) Post a Comment

Blog Category: Broadcast AV

Posted by: Steve Lampen on September 30, 2014

I'm an old Belden guy. As I mentioned in an earlier blog, this is my 50th year as a Belden customer. And every one of those years I had a Belden catalog. In fact, one of the first things I did when I joined Belden as an employee in 1991 was start to collect old Belden catalogs. I now go back to 1964 in original, complete catalogs. I have bits and pieces of older catalogs, back to 1939....with rubber video cable!! In fact, if you have a Belden catalog before 1964, I would LOVE to have it. Tell me what you have and what you want for it.

Read More >>


Comments (0) Post a Comment

Blog Category: Data Centers

Posted by: Greg Funk on September 25, 2014

As a follow-up to the blog on the reasons why UTP cables should not be painted, let's talk about cables that have been exposed to water or other liquids.

While the jacketing on indoor riser- and plenum-rated UTP cables may seem impervious to liquids, let me remind you again that it is actually porous. In fact, any cable rated for indoor use only, whether copper or fiber, should not be exposed to liquids for any length of time.

Let’s take a look at why.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Heather MacKenzie on September 24, 2014

This year the Belden Industrial Ethernet Infrastructure Design Seminar is being held in Houston and thus a number of the sessions are focusing on applications for the oil and gas sector. I had the privilege of attending Scott Howard’s session on cyber security. In it he reviewed the primary goals of cyber security measures in industrial networks:

• To improve safety
• To reduce downtime
• To increase productivity

In other words the goals of cyber security are the same as the core goals of most manufacturing teams.

This article reviews the cyber security fundamentals that Scott described and also explains how Belden’s products fit into industrial networking solutions.

Read More >>


Comments (0) Post a Comment

Follow Us

Subscribe
Blog Home
RSS Feed
Blog Home
Email Notifications

Search
All Belden Blogs


Stay Informed