• New Technologies for Cyber Security(1)

    The days where you could put your server in a back room and it was protected are gone. Blacklisting technologies like Antivirus/Anti-malware products are no longer effective protection measures against today’s quickly evolving threats. Come hear about using application and ...
    Year: 2013

    JumpStarting PI AF – How OSIsoft Can Help you Get More Value From Your PI System

    Many customers may want to get value from the asset-based PI System including the integrated tools based on PI Asset Framework (PI Notifications, PI Event Frames, and PI OLEDB Enterprise), but they are not sure how to get started. Martin ...
    Year: 2013

    Enterprise wide adoption - Is it for me? How do I make it happen?

    Attendees at this session will learn the strategies used by leaders at Alcoa, SunCoke Energy and Sacramento Municipal Utility District (SMUD) that helped them get approval for an Enterprise Wide approach to implementing the PI System Infrastructure across their organizations.
    Year: 2013

    Entora: PREPA's Road to Omnipresence in Operational Data

    Today’s business world waits for no one. Administrators need to make informed decisions on a moment’s notice using accurate and real time data. This presents a challenge to all enterprises when data is stored and managed on different databases and ...
    Year: 2013

    WECC Reliability Coordination Security Baselines and Configuration Management

    The Western Electricity Coordinating Council (WECC) Reliability Coordination (RC) utilizes a large and complex PI System implementation to provide data collection and visualization services to monitor the Western Interconnection. This PI System infrastructure consists of over 60 servers and 1.7PB ...
    Year: 2013