Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Network, computer

Computer assisted operations (CAO) involves the use of computer technology to support operations, with functions ranging from collection of data using simple calculators and PCs to integrated computer networks for automatic operation of a field. In the extreme case CAO can be used for totally unmanned offshore production operations with remote... [Pg.280]

Palais J C 1992 Fiber Optic Communication 3rd edn (Englewood Cliffs, NJ Prentice Hall) Tanenbaum AS 1996 Computer Networks 3rd edn (Upper Saddle River, NJ Prentice Hall)... [Pg.2875]

A laboratory information management system (LIMS) is a computer or computer network used to automate the acquisition and management of raw analytical data. In its simplest form, it tracks samples and test results through analytical laboratories and provides summaries of the status of these samples and tests. In its most advanced form, the system is interfaced to the laboratory s instmmentation and communication network to allow automation of data gathering, compilation, and reporting. [Pg.516]

In order to demonstrate the achievement of quality and the effectiveness of the quality system, records will need to be gathered in from the locations where they were produced. This is more than a convenience because you will be unable to analyze all the data efficiently unless you need it in front of you. If you are lucky enough to operate a computer network and all the data is available on the network, data collection is a simple affair. However, many organizations still rely on paper records and therefore you will need a means of enabling such records to be either submitted to the analysis points or collected from source. To facilitate the collection of records you will need to insert submission or collection instructions in the relevant procedures which specify the records. [Pg.496]

As the use of computer networks become more widespread, auditing the practice against procedure will be possible without leaving your desk and can be carried out without the auditee knowing. [Pg.518]

Over the years, many instruments have been developed for and used in the scientific laboratory. Today, the computer is used as a major tool in the scientific laboratory for the capture, manipulation, transfer, and storage of data. Consequently, the concern for data quality has shifted from the instruments that are used in the generation of the data to these electronic systems, often neglecting the fact that the data are only as accurate as the instrument measurements. For instance, many electronic systems can be used in chromatography analysis, from the electronic log book where the test substance inventory is kept, throughout data capture in the instrument, to the digitized electronic signal that is the raw data on the computer network. For crop residue samples, the... [Pg.1039]

Laboratory Computer Networks", S. A. Borman, Analytical Chemistry. 56, 413A (1984). [Pg.5]

Sharp and Dohme, RS/1 is used at several different laboratories in the U.S., Canada, the U.K. and continental Europe to share data. A large VAX installation supports users in different sites through a computer network. Collaborative projects between different laboratories, using data shared through the central system, have become common. [Pg.29]

Since the data base for this Instrument resides on the host HP 1000 computer, the experiment setup files must first be transferred from the local computer to the HOST computer. This 1s done using the Dowell Schlumberger local laboratory computer network and the Hewlett Packard DS/1000-IV networking software. The programmatic user interface to the network Is again accessed through the main menu program for the instrument. [Pg.121]

To examine the accuracy of solvation free energies, first one needs to achieve a sufficient precision to compare with experiment. This was recently done extensively by Shirts et al. [101], where the Folding0Home distributed computing network... [Pg.486]

Control access to computer networks and control systems, and change the passwords frequently. [Pg.93]

Analyze each SCADA device to determine whether security features are present. Additionally, factory default security settings (such as in computer network firewalls) are often set to provide maximum usability, but minimal security. Set all security features to provide the maximum level of security. Allow settings below maximum security only after a thorough risk assessment of the consequences of reducing the security level. [Pg.130]

Any location that has a connection to the SCADA network is a target, especially unmanned or unguarded remote sites. Conduct a physical security survey and inventory access points at each facility that has a connection to the SCADA system. Identify and assess any source of information including remote telephone/ computer network/fiber optic cables that could be tapped radio and microwave links that are exploitable computer terminals that could be accessed and wireless local area network access points. Identify and eliminate single points of failure. The security of the site must be adequate to detect or prevent unauthorized access. Do not allow live network access points at remote, unguarded sites simply for convenience. [Pg.131]

Release data related to the SCADA network only on a strict, need-to-know basis, and only to persons explicitly authorized to receive such information. Social engineering, the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks. The more information revealed about a computer or computer network, the more vulnerable the computer/network is. Never divulge data revealed to a SCADA network, including the names and contact information about the system operators/administrators, computer operating systems, and/or physical and logical locations of computers and network systems over telephones or to personnel unless they are explicitly authorized to receive such information. Any requests for information by unknown persons need to be sent to a central network security location for verification and fulfillment. People can be a weak link in an otherwise secure network. Conduct training and information awareness... [Pg.134]

Wireless data communications devices are used to enable transmission of data between computer systems and/or between a SCADA server and its sensing devices, without individual components being physically linked together via wires or cables. In industrial chemical processing systems, these devices are often used to link remote monitoring stations (i.e., SCADA components) or portable computers (i.e., laptops) to computer networks without using physical wiring connections. [Pg.205]

Network intrusion detection and prevention systems are software- and hardware-based programs designed to detect unauthorized attacks on a computer network system. [Pg.211]

Wilson, K. R. In Computer Networking and Chemistry, Lykos, P., Ed. American Chemical Society Washington, D. C., 1975 ACS Symposium Series No. 19. [Pg.192]

Purpose of the Nervous System. Overall, in the most simplistic analysis, the nervons system performs three tasks sensation, processing, and execution. These are the tasks of any information management system. In this respect, your nervous system serves purposes similar to a computer network. In your nervous system, each of these three tasks can occnr voluntarily within yonr full awareness or involuntarily ontside yonr conscionsness. [Pg.15]

For these and other reasons, the policy of disseminating the CIS via networked PDP-10 computers was adopted at the outset and has proved to be quite successful. A typical American network of this sort has something under 100 nodes — i.e. local telephone call access is available in about 100 locations. These are mainly in the U.S., but a substantial number will be found in Europe. Further, some computer networks are now themselves interfaced to the Telex network, thus making their computer systems available worldwide. Irrespective of one s location, the cost of access is somewhere between 7 and 15 per hour, depending upon the transmission speed used and also on the time of day. Networks typically offer 110, 300 and 1200 baud service and the response time of the system is usually negligibly small. [Pg.261]

The only equipment that is required to establish access to a computer network, is a telephone-coupled computer terminal. Typewriter terminals are becoming very common and are also becoming relatively inexpensive. Such a terminal can be purchased from a variety of manufacturers for between 1,000 and 3,000 and in general. [Pg.261]


See other pages where Network, computer is mentioned: [Pg.655]    [Pg.656]    [Pg.656]    [Pg.112]    [Pg.87]    [Pg.565]    [Pg.753]    [Pg.763]    [Pg.472]    [Pg.195]    [Pg.204]    [Pg.290]    [Pg.424]    [Pg.610]    [Pg.34]    [Pg.725]    [Pg.812]    [Pg.198]    [Pg.297]    [Pg.107]    [Pg.117]    [Pg.330]    [Pg.32]    [Pg.207]    [Pg.209]    [Pg.691]    [Pg.307]    [Pg.309]    [Pg.267]    [Pg.255]    [Pg.261]   
See also in sourсe #XX -- [ Pg.173 , Pg.558 ]

See also in sourсe #XX -- [ Pg.578 ]




SEARCH



Biochemical Network Integrated Computational

Biochemical Network Integrated Computational Explorer

Biological computation networks)

Computational artificial neural networks

Computational methods network analysis

Computational methods topological network analysis

Computational modeling network

Computational network

Computational network

Computational neural network

Computational neural network applications

Computational neural network methodology

Computational neural network predictive modeling

Computer hardware technologies network requirements

Computer networking

Computer simulations elastomeric networks

Eukaryotic chemosensing, signaling networks computational model

Important guidelines for using computers and networks

Massively parallel computer networks

Natural computation artificial neural networks

Network Digital Computer

Networking of computers

Networks/networking, computer

Networks/networking, computer

Neural network algorithm computer time

Neural network computed mapping

Neural network computing

Neural network computing approach

Neural networks feed-forward computational

Sources and Computational Approaches for Generating Models of Gene Regulatory Networks

Statistical network analysis computation times

© 2024 chempedia.info