10 Factors Warehouse Managers Should Consider for Goods-to-Person Fulfilment
In this article, let's dive deeper into how it works and what factors you should consider if you are thinking to switch to using the Goods-to-Person fulfillment model.
Access Control Key to Cybersecurity in B2B eCommerce
Using Access Control Lists (ACLs) to establish rules that grant or deny access to different data types includes sensitive data. Every user in an application has a role, and every role has a set of permissions configured to perform or restrict actions to entities and system capabilities.
What Security Privileges Should We Give to AI?
In a survey, some 80% of telecommunications executives stated they believe their organization cannot respond appropriately to cyberattacks without AI. What's more, 69% of all senior executives agree they would not be able to respond without AI on their side.
Could Your Robot Be Spying on You? - Cybersecurity Tips for Manufacturers Employing Robotics
Whether it is smart phone manufacturing, car-making or the food and beverage sector, factories around the world are already equipped with robots and other automated technologies. So how much of a threat is the possibility of these robots being hacked?
Ways to Optimize Manufacturing Cybersecurity
Manufacturing facilities are at an increasingly high risk of cyberattacks, especially as they feature more connected, advanced machines that play vital roles in operations.
Surviving a Global Cyberattack - Company Culture Plays a Pivotal Role
Pilz was hit with a ransomware cyberattack on October 13, 2019. In the following article, written by Mike Beerman, CEO, Pilz USA, discusses how Pilz not only survived the attack, but is coming back stronger than ever.
Robot Network Security
RAD solutions are used in a variety of markets for critical infrastructure like corporate headquarters, healthcare campuses, higher education campuses, event venues and government facilities.
Securing The Robots
There is no magic bullet for robot security. They are simply devices executing code, which are just as likely to be compromised as any other device in an organisation.
Report: Cyberattacks on Industrial Robots
Trend Micro recently released the first in-depth, hands-on research that demonstrates the extent to which industrial robots can be compromised.
Amazon patents system to defend drones against hackers, jammers … and arrows
Alan Boyle for GeekWire: If there are any Robin Hoods out there who are thinking about shooting down drones while they’re making deliveries, Amazon has a patented plan to stop you. The patent, filed in 2014 but published just last week, lays out countermeasures for potential threats ranging from computer hacking to lightning flashes to bows and arrows. If nothing else, the 33-page application illustrates how many things could possibly go wrong with an autonomous navigation system for unmanned aerial vehicles, or UAVs. The “compromise system” that Amazon’s engineers propose relies on an array of sensors to orient the drone based on the sun’s position in the sky, if need be. That’s in case the drone gets confused by, say, lightning or a muzzle flash. Cont'd.. .
Records 1 to 10 of 10
Parker LORD MicroStrain Sensing System
The new complete inertial navigation solution comes with GNSS/INS 3DMGQ7 sensor, 3DMRTK correction modem and real time SensorCloud RTK correction network. The sensor comes with Dual antenna GNSS, tactical grade IMU with centimeter-level accuracy with RTK. Low profile and light weight at 78 grams, this sensor is The sensor is optimized for size and weight in Unmanned Ground Vehicles, mobile robots and autonomous vehicles. The network interface 3DMRTK modem is seamlessly integrated into the 3DMGQ7 sensor supports industry-standard NMEA and RTCM 3.1 protocols. The network RTK support comes with cellular data plan. The SensorCloud RTK is a cloud-based RTK correction system with private encrypted data stream. Check out our G Series and C Series OEM products.