News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

How to Ensure Useful Data Extraction from a PI Historian System 

Data is an ever-present and growing benchmark in all industries. However, sometimes it may feel like it’s cloaked in mystery. There’s often a question of, why is collecting process data important? You then start to go down the rabbit hole trying to answer…..How do you get data out of your equipment? How do you decide what to collect? After assessing the previous questions, how do you test, and if necessary, validate that all of that data is being collected as expected? Understanding a holistic approach to data collection and validation from an AVEVA PI Historian System can help provide a high-level, big picture understanding to the importance of process data. With more than 10 years’ experience as a group engineering manager, Matt Martin has a depth of experience with integrating AVEVA PI Systems within sites of various sizes – here’s what I’ve learned: Why is the Importance of Data Increasing?  The “why” question is the easiest one to answer. Everyone can agree that in the era of modern manufacturing, extracting data from your manufacturing processes is critical to a business’s success and ability to grow. This includes every level of production and management: Provides the operator at the plant floor level the ability to adjust and better control the manufacturing process on the fly Allows engineers better insight into trends and behaviors of the overall process to improve designs from both a throughput and efficiency standpoint Produces KPIs (key performance indicators) for managers and executives to assist in their decision making Having large representative data sets is becoming even more important with the advent of AI and more specifically machine learning. Allowing these technologies access to your systems data helps identify patterns, overall system behavior, and correlations that were previously near impossible for the human eye to uncover.  Now, How … Continued

Read More

Kate Van Kirk Promoted to Director of Business Process

Congratulations to Kate Van Kirk. Kate was recently promoted to Director of Business Process. Kate has been with E Tech Group since 2017.  In 2020, she moved from Life Sciences to Corporate and played a significant role in several company initiatives including the migration to Zoho-Intacct booking synchronization, the Project Forecast Tool, and the implementation of the Resource Management Tool. “Kate will continue to play a major part in working collaboratively with stakeholders across the Company to bring additional tools to E Tech Group, improve existing tools, streamline workflow processes, and implement best practices,” said Vice President of Operations Gary Powell. Congratulations to Kate on a well-deserved promotion and thank you for the dedication to E Tech Group and our operations team!

Read More

Cyberattacks: What’s in Your Wallet?

The original version of this article was pulled from Food Engineering featuring Kevin Romer, Principal Engineering and Matt Smith, network architect IT/ICS for E Tech Group. Click here to read the original article. Cybercriminals Custom-Tailor Their Ransom Demands To Your Budget. According to the FBI, the three most common IT/OT (operational technology) infection vectors are email phishing campaigns (aka BEC or business email compromise), remote desktop protocol (RDP) and software vulnerabilities. While some hackers may intentionally want to bring down your production systems using the second and third vectors, “we’re only in it for the money” is a far better motive for breaking into your IT/OT systems—and what better way to do it than through the phishing emails scattered among the zillions of emails you get every day. Accidentally clicking on one email link can quickly connect you with ransomware—which can not only shut down your business system, but also your production systems, if they’re not protected. The Role Subpar Control Systems Play in Cyber Attacks “Once inside an organization, ransomware groups and affiliates will often take advantage of the misconfigurations within an organization’s Active Directory security posture,” says Marty Edwards, Tenable deputy CTO of OT/IoT. “Gaining domain privileges provides attackers with the necessary capabilities to distribute their ransomware payloads across the entire network.” According to the IBM “X-Force Threat Intelligence Index 2022,” ransomware was the number one attack type in 2021, accounting for 21% of all attacks. According to a 2022 SANS Institute survey, 40.8% of OT/industrial control systems (ICS) compromises came down from business IT systems. To safeguard production systems, manufacturers need to isolate OT from IT systems—or at the very least be able to have a quick disconnect when IT systems are infected. Secure Automated Systems Require IT/OT Separation In this article, we look at IT attacks and … Continued

Read More

Are You Applying Edge Computing Technologies Properly?

The original version of this article originally appeared on ControlEngineering.com. In the Control Engineering webcast, “Edge series: Edge Computing Applications,” Jeffrey Allen, applications engineering manager at E Tech Group, and Nate Kay, control systems engineer at MartinCSI, explained how edge computing applications can be used for mission-critical, high-reliability automation and control applications. The webcast is archived for a year from the July 19, 2023, broadcast date. Edge Computing Insights: Edge computing can help enterprise resource planning (ERP) and supervisory control and data acquisition (SCADA) applications. Edge computing, as applied in a chemical plant, is providing benefits that can be replicated in other industrial edge computing applications. Challenges and some other considerations related to edge computing were covered in a July 19, 2023, Control Engineering webcast, archived for a year. Edge Computing Can Be a Valuable Asset Edge computing is increasingly proving itself to be a powerful asset in enabling mission-critical, high-reliability automation and control applications. By allowing data to be processed as close as possible to where it is generated, edge computing enables faster processing, empowering operators to respond to changing production conditions in real-time. Moreover, it allows sensitive data to remain onsite, rather than being sent to the cloud for further analysis, thus increasing security while saving on wide area network (WAN) costs. These topics and others were discussed in a July 19 Control Engineering webcast, “Edge series: Edge computing applications.”  The webcast featured Jeffrey Allen, applications engineering manager at E Tech Group, and Nate Kay, control systems engineer at MartinCSI, as speakers. A preview of some of the information covered is provided below. Edge computing: ERP to SCADA Applications A common scenario in industrial facilities is for plant level operators to be required to input data from a business level Enterprise Resource Planning (ERP) into a Supervisory Control and Data Acquisition (SCADA) system that is … Continued

Read More