Cool Trick with Log Viewer
So I learned a neat trick from a support guy yesterday while troubleshooting an issue on one of my Dev systems. By the way.. do NOT rename what you think is an abandoned galaxy database even after...
View ArticleAssociate Graphics Fixes a Pesky Issue
So my esteemed colleague David wrote an article earlier this year that discussed an issue he was having with popup graphics. http://archestranaut.avidsolutionsinc.com/2013/01/recent-gotchas/ See item...
View ArticleaaBackupConsole Ready for Testing
So this is one I promised a long time ago. I even had it substantially done but just didn’t have a few final items pulled together. While I have more ideas for features to add I wanted to get this out...
View ArticleSource for aaEncryption
If you would like to contribute or just peak under the covers for aaEncryption here is the GitHub link. https://github.com/aaOpenSource/aaEncryption -andy The post Source for aaEncryption appeared...
View ArticleVirtualization – Safe and Effective
If you haven’t already installed a virtual process control system, the chances are that you will soon. Virtualization, particularly platform virtualization, has swept through process control at a speed...
View ArticleAvid in the News
Automation World Magazine has selected a column by Avid engineer James Cage for their print edition. The column (3 Tips for Safe and Effective Virtualization) was originally published online as a...
View ArticleMigration to Virtual Systems
“My first impression? I thought it wasn’t a good plan to put all your eggs in one basket. I still get that a lot from potential users. It represents a misunderstanding of what virtualization is all...
View ArticleThoughts from the User Conference and Opening Up
Hello to all my junior Archestranauts! Apologies in advance for my lack of posts for this long duration. I’ve been knee deep in alligators with my new project in Taiwan and unfortunately working on...
View ArticleBook Review: Industrial Network Security
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Paperback by: Eric d. Knapp and Joel Thomas Langill...
View ArticleJustifying Cyber Security
“SIs are responsible for system designs, and like it or not, security is a part of every system.” – Jeff Shearer, Principal Security Architect for Rockwell Automation. For the last several months, I’ve...
View Article