Ingeniøren Insights

Få styr på vandkvaliteten gennem kontinuerlig online analyseTILMELD

Kontinuerlig online aanalyse ved automatisering

Er du tryg ved kvaliteten på det vand du drikker, eller det vand, du bruger i din industriproces?
I dette webinar vil Lars Christiansen Warncke fra Bürkert gøre dig klogere på, hvordan kontinuerlig online analyse af vand kan sørge for, at vandkvalitet og tryghed går hånd i hånd.

Vandeksperterne fra Bürkert vil gerne bidrage til, at vi til enhver tid kan føle os trygge ved kvaliteten på vores vand.
Derfor har Bürkert udviklet et online system, der kan analysere dit vand og levere de vigtige data, således du hele tiden er velinformeret om vandets kvalitet, og derudover til enhver tid vil kunne dokumentere, hvornår en eventuel afvigelse startede.

Det får du ud af webinaret:
- Hvorfor er kontinuerlig vandanalyse en god ide?
- Hvordan får du online analyse og data på din vandkvalitet?
- Hvad kan du bruge data til?
- Hvordan fungerer det daglige vedligehold og hvordan kan systemet spare dig for både tid og ressourcer?

På webinaret vil du møde:
Lars Christiansen Warncke, Field Segment Manager med mere end 13 års erfaring indenfor automatiseringsløsninger til industrien.
Lars Mathiasen, vært, Ingeniøren.

Læs også

Protecting Personal Data While Enhancing Customer Engagement: How To Manage PII and Boost Loyalty And Retention

Retailers need to develop ever-closer relationships with their customers in order to win their spend and improve loyalty. Many are increasing investment in personalised retail efforts and structured loyalty programmes to help to achieve these goals. By better identifying their customers, as well as their individual needs, retailers are able to target them more specifically, boosting their propensity to spend in the process. Yet it’s become harder than ever to meet these goals.

Akamai Edge Security Solutions

Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your business connected. Protecting those connections can be critical in a world of evolving security threats and changing business requirements. Mobile. Cloud. DevOps. Akamai can help. We understand the Internet and how you use it to drive your business forward.

Application Access Redefined: Managing the Modern Workforce

The paradigm shift sweeping enterprise technology and business gets more palpable by the day. The transition to cloud computing is near its tipping point. Mergers and acquisitions have burgeoned. And with a growing number of end users outside the corporate environment, IT departments need to serve an increasingly diverse, distributed, and demanding user ecosystem. Providing secure, application-specific access to enterprise systems and data has become more important than ever. And more challenging.

Sikkerhed – det usynlige internet

Når vi taler om ”Det usynlige internet”, så handler det måske i virkeligheden mere om ”usynligt indhold”, og om at effektiviteten af traditionelle IPS/IDS-systemer og firewalls er faldende på grund af den stigende brug af kryptering. Når næsten al datatrafik til internettet er krypteret, er det svært at se og analysere den reelle trafik mellem applikationerne. Dette har været en kendt udvikling i lang tid, men det er stadig noget, som mange har valgt ikke at forholde sig til. Problemet er på sin vis selvskabt, da det selvfølgelig er en god idé at benytte sig af kryptering.

Understanding the benefits of a hybrid-cloud SD-WAN strategy

Flexible, secure branch-to-internet connectivity has become a business imperative. Nearly every organization, distributed or otherwise, now relies on cloud-based technology, including software-as-a-service applications, cloud storage, or other cloud infrastructure, for mission-critical business activities.

Security Analytics

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know that you are protected? Most of us have firewalls, end point clients and authentication solutions, but do you know what they do? What threats they detect? What actions you should take to further improve your security? Security is complex and how do you know that you have proper protection if you’re not aware of what is happening in your network and to your users.

Secure business continuity and reduce cost with Elastic Secure SD-WAN

Today, most businesses are highly dependent that their offices, employees—and even vehicles—are connected at all times and that resources can be accessed easily. And not simply accessed but connected to securely, with a high degree of protection to ensure business continuity.

10 Questions for Assessing Data Security in the Enterprise

It’s hard to imagine an organization today that does not rely on file servers, SharePoint or Office 365 for storing data, including valuable and sensitive information such as intellectual property and personal data. This makes these systems particularly attractive targets for all sort of attackers, from external hackers to disgruntled employees. To protect data from both external and internal threats, businesses must regularly conduct thorough data security assessments as part of their broader cyber security assessments.

Architecture & Engineering Industry Report: Trends and benchmarks in the Nordic region

The Deltek Clarity Architecture & Engineering Report identifies the key issues impacting the A&E market in the Nordics, uncovers how A&E firms are using technology to drive competitive advantage and helps you to benchmark your own firm’s performance against other Nordic firms along with competitors and peers in the wider EMEA region.

Secure Remote Working with the Zero-Trust Approach

Ever since COVID-19, remote working went into overdrive. This shift has also increased the usage of privately owned and unmanaged devices. This, in turn, has increased the demand for security tools that protect company data. The big question is: how to (really) secure remote working? In our new white paper, we introduce you to the zero-trust approach: a mindset that will help you make remote working safe- wherever your co-workers are and no matter which device they use. In the white paper, you’ll learn about:
• The downsides to VPN
• The meaning of zero-trust