Blogs

Home / Blogs

Whatsamatta U: 8 Components of Successful Training Courses

I’ve recently been refreshing some internal training content for our Avanceon University and I wanted to share some items that we have found to be key in developing adult learning courses, whether the intended audience is our own staff or our customers. These eight design points help organize an effective training course and provide a framework for how to train and evaluate individuals.
read more…

#PlantLife – To Beard, or Not to Beard

There comes a time in every man’s life when he must grow a beard. Within Avanceon I primarily work within the food and beverage business unit, but since Good Manufacturing Processes frown upon exposed body hair, a conflict with the aforementioned call to the wild presents itself.
read more…

How I Learned to Stop Worrying and Love InBatch

Do you remember the now classic scene in The Lion King where a group of hyenas are saying the name of the king, “Mufasa,” to each other and the mere mention makes them shudder? “Ooooh! Do it again!” In my experience, there is an automation product that has the same effect on engineers and customers alike. What product is that? Wonderware’s  InBatch! No other software product has made my friends and colleagues shiver and shrink.
read more…

Reduce & Manage Unscheduled Downtime

Throughout my years working in systems integration – technician, engineering, management and owner since 1976, I have experienced the many downfalls of downtime and the snowball effect it causes for everybody involved. I have worked extensively in the Life Sciences industry providing validated designs and installations, unscheduled downtime no matter what industry can be frustrating and expensive.
read more…

Just How Important is Cyber Security in Control Systems?

NERC (North American Electric Reliability Corporation) held its second grid security exercise, or GridEx, over a two day span. During this exercise, nearly 10,000 electrical engineers, cybersecurity specialists, utility executives and F.B.I. agents wrestled with an unseen, virtual “enemy” trying to disrupt the electrical infrastructure in the U.S. It included simulated computer viruses, line and equipment damage and even first-responder deaths in an effort to understand and evaluate participants abilities to understand, communicate and neutralize a multitude of simultaneous threats.
read more…