Hazardous locations, or HazLoc, are classified areas that contain gases, vapors, dust or fibers that create a risk of fire or explosions. Examples of these…
HazLoc Certifications & Compliance: Part I
Compliance with hazardous location regulations and standards is necessary to prevent serious accidents in environments including oil rigs, health care facilities and power generation plants.…
The Last of the JEDI and the Rise of the JWCC
The Pentagon identified a desire to acquire a “worldwide, highly available, exponentially elastic, secure, resilient cloud computing and storage environment that seamlessly extends from the…
The Difference an “I” Makes: IIoT vs. IoT
Consumers utilize the Internet of Things (IoT) to automate and simplify everyday tasks while manufacturers use the Industrial Internet of Things (IIoT) to increase operational…
Responding to New Demands: The Unmanned Campaign Plan
The global security environment is shifting towards great power competition: when two or more countries have amassed enough military, political and economic power to compete.…
The What & Why of Industrial USB Hubs
USB hubs, specifically those used in industrial applications, are valuable in a variety of settings. High current USB peripherals may include phones, vision systems for…
Achieving Interoperability: BACN, BFTN and the ACC-188
Communications truly are mission-critical within the defense arena. However, lack of interoperability across devices, platforms and communication channels presents one of the biggest threats to…
What Makes an Industrial PC Rugged?
Rugged PCs are computers designed to operate in harsh environments like those found in military, oil & gas and industrial applications. How are Rugged PCs…
Dual – or Greater – Ethernet Ports for Efficiency & Security
Consumer computers are often built with at least two Ethernet ports, and industrial computers may contain four or more. Multiple Ethernet ports allow for improved…