This blog describes key features of the protocol and pitches in with some subjective opinions.
Articles by Peter Humaj
Using redundancy is a way to increase overall system availability even when one or more components fail.
Freshly discovered Intel Spoiler vulnerability is yet another issue found in Intel microprocessors. How dangerous is this vulnerability to SCADA and MES servers?
The GPIO protocol is hot news in the D2000 KOM process and has been implemented last summer. How does it work, what does it require and what does it offer?