Skip to content Skip to footer
DCR Logo White 2024

Tag: EU Automation

Hybrid cloud storage: Risk vs opportunity

Modern manufacturing has become very data intensive, which has made choosing where to store data critically important. Here Neil Ballinger, head of EMEA at EU Automation, explains the trade-offs and opportunities of hybrid cloud storage.

Fieldbus: Sharing is caring, right?

A general rule of thumb is that we are often stronger together, but will competing Fieldbus ever evolve into an open-source architecture? Here, Neil Ballinger head of EMEA at EU Automation considers the facts.

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

The secret to defending a cyberattack is having courage

As fans of the TV drama Scandal will know, the first mistake that people make in a crisis is not knowing they’re in one. While there is only so much preventative action a company can take to defend itself against a cyberattack,

Stay In The Know

Get the Data Centre Review Newsletter direct to your inbox.