Hi [[ session.user.profile.firstName ]]
Sort by:
    • Advanced sensors and smart control systems for coal-fired power plants Advanced sensors and smart control systems for coal-fired power plants Toby Lockwood Recorded: May 13 2015 11:00 am UTC 26 mins
    • Coal power plant control systems have progressively evolved to meet the growing demand for efficient and flexible power generation whilst maintaining low emissions. In particular, optimisation of the combustion process has required increased use of online monitoring technologies and the replacement of standard control loops with more advanced algorithms
      capable of handling multivariable systems. Improved stoichiometric control can be achieved with
      coal and air flow sensors or imaging and spectral analysis of the flame itself, whilst in-situ laser absorption spectroscopy provides a means of mapping CO and O2 distribution in hot regions of the furnace. Modern plant control systems are able to draw on a range of computational
      techniques to determine the appropriate control response, including artificial intelligence which
      mimics the actions of expert operators and complex empirical models built from operational data.
      New sensor technologies are also being researched to further improve control and to withstand the high temperature and corrosive environments of advanced coal plant and gasifiers. Increased use of optical technologies is of particular interest, with sensors based on optical fibres able to perform low noise, highly sensitive, and distributed measurements at high temperatures.
      Microelectronic fabrication techniques and newly developed high temperature materials are also being combined to develop miniaturised devices which provide a robust and low cost solution for in-situ monitoring of gases and other parameters. These new sensors can be integrated with wireless communication technology and self-powering systems to facilitate the deployment of distributed sensor networks and monitoring of inaccessible locations. Using principles of self-organisation to optimise their output, such networks may play a growing role in future control systems.

      Read more >
    • Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise? Welcome to the Age of Weaponized Malware. What Does it Mean to Your Enterprise? Roundtable Presentation By: Richard Stiennon, Paul Henry and Paul Zimski Recorded: Jun 26 2012 4:00 pm UTC 61 mins
    • The U.S. has not denied their role in the use of weaponized malware and already, other countries are jumping on board. India recently announced they are empowering government agencies to carry out similar such actions.

      State sponsored malware attacks are officially out of the shadows and mainstream for organizations and end users alike. In fact, Google recently announced an alert service for gmail users for “state sponsored attacks”. How exactly did we get to this point and what are the factors and threats that you need to be aware of?

      Join this complimentary webcast during this roundtable discussion by IT security industry experts as they answer the following questions:
      *How did we get to this point?
      *Why should the enterprise care?
      *What should the enterprise do?

      Walk away from this webcast with the knowledge and approach to help defend your enterprise against weaponized malware.

      Read more >
    • Women in Woodworking: Breaking Down the Barriers Women in Woodworking: Breaking Down the Barriers Ann Jackson (Rockler Woodworking and Hardware), RH Lee (Offerman Woodshop) Recorded: Jul 9 2015 6:00 pm UTC 44 mins
    • The woodworking industry has long been composed of a predominantly male demographic, but over the past 30 years an increasing number of women have become interested in the woodworking field and how they can become a part of it - whether that be by adopting it as a hobby, working in the professional production of wood and wood products or entering into management and ownership. The recent explosion of DIY and Maker Culture in American society has begun to motivate its people to go back and work with their hands again like those that came before us did, and we can clearly see that having an impact on the industry today.

      In addition to - or possibly because of - the aforementioned cultural movements that have been growing their reach for more than a decade in the United States, we've begun to see woodworking collectives and community woodshops popping up everywhere. These organizations allow for woodworkers to sharpen their talents and use larger and more expensive equipment when it might otherwise not be available to them. Some, like Offerman Wood Shop, employ independent contractors to create custom furniture pieces for private clients as well as items that are sold in other avenues and other, smaller shops may simply provide a place for DIY'ers to try their hand at woodworking projects.

      After several years of struggling, the woodworking industry is again starting to grow and with that growth comes new technologies, new ideas and new kinds of employees. The future of woodworking will likely depend on intelligence, creativity and motivation as primary character traits rather than the more purely physical ones that were required before machinery and automation became as advanced as they are today and will be tomorrow. How can we continue to fan the flames and attract more women to the industry? This conversation between several intelligent, creative and motivated women that work in the industry will touch upon that and many other points of discussion.

      Read more >
    • Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Phil Lin, Director, Product Marketing, FireEye Recorded: Dec 12 2012 5:00 pm UTC 48 mins
    • Recent IT security reports show that targeted spear phishing attacks are dramatically increasing. The news of the recent Flame malware has shown that advanced targeted attacks are growing in intensity and are quickly becoming the new ‘normal’.

      Spear phishing has become a successful tactic that hackers use to exploit your network and trigger an attack which can lead to catastrophic financial, operational, and reputation risks. Discover how to keep your network secure – by learning more about today’s targeted spear phishing attacks and how you can close the security gap that sophisticated hackers are exploiting. Key topics include:

      - The growing popularity of spear phishing tactics and how targeted attacks are triggered

      - A real-world example of spear phishing that led to an advanced targeted attack

      - Real-time techniques to help you mitigate the threat of spear phishing

      Read more >
    • Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Phil Lin, Director, Product Marketing, FireEye Recorded: Jun 20 2012 7:00 pm UTC 48 mins
    • Recent IT security reports show that targeted spear phishing attacks are dramatically increasing. The news of the recent Flame malware has shown that advanced targeted attacks are growing in intensity and are quickly becoming the new ‘normal’.

      Spear phishing has become a successful tactic that hackers use to exploit your network and trigger an attack which can lead to catastrophic financial, operational, and reputation risks. Discover how to keep your network secure – by learning more about today’s targeted spear phishing attacks and how you can close the security gap that sophisticated hackers are exploiting. Key topics include:

      - The growing popularity of spear phishing tactics and how targeted attacks are triggered

      - A real-world example of spear phishing that led to an advanced targeted attack

      - Real-time techniques to help you mitigate the threat of spear phishing

      Read more >