Software Toolbox Technical Blog

How to Seamlessly Connect Your Process Data to Amazon IoT Core

2 min read

By Kyle Persyn on Dec 19, 2024 2:00:00 PM

IoT, IIoT, MQTT, Big Data, and The Cloud—these tools and technologies are shaping the future of various industries. But how do you actually bring your critical process or control data into the cloud for real-time analytics, predictive maintenance, or smart manufacturing? That’s the most critical part, because in today’s connected world, data is power. Organizations are leveraging IoT and IIoT to optimize operations, predict maintenance issues before they happen, and unlock insights through advanced analytics in the cloud. That’s where Amazon AWS IoT Core and Cogent DataHub IoT Gateway come in.

Continue Reading

How to Simplify OPC Server Redundancy with Cogent DataHub

4 min read

By Kyle Persyn on Dec 5, 2024 2:00:00 PM

Redundancy is a broad concept, as explored in our Demystifying Redundancy Blog. In this post, we narrow the focus on how to manage redundant OPC servers—a critical topic for ensuring reliable process communications to your HMI, SCADA, MES, Historian, etc. Redundancy is crucial because it ensures continuous operation and data integrity in the event of system failures, minimizing downtime and potential losses.

Simply deploying two OPC servers connected to your PLCs doesn’t make them redundant. We're sometimes asked about having the two OPC servers communicate and decide when to failover. That sounds good but has a flaw. If the client loses network connection to one OPC server but the two OPC servers are still communicating, and the HMI/SCADA doesn’t have any internal failover mechanism, then no failover will occur.

Continue Reading

4 Ways to Address Security Challenges with DataHub Tunneling

5 min read

By Connor Mason on Nov 14, 2024 2:00:00 PM

Secure data transmission between the Operational Technology (OT) and Information Technology (IT) layers is a critical concern in industrial automation. Traditional methods often expose critical systems to vulnerabilities by opening ports on the OT level when leveraging standard OPC deployments. While OPC UA has streamlined industrial communications by eliminating the complexities of DCOM configuration and its associated security risks, the continued use of open ports still leaves potential vulnerabilities for attackers to exploit.

DataHub Tunneling has often been viewed as just another way to bypass DCOM or an alternative to OPC UA, but it is much more than that. In this blog post we’ll explore four ways Cogent DataHub, a versatile middleware software solution, can address these security challenges by leveraging its advanced tunneling capabilities and more.

Continue Reading

Data Integration with AVEVA PI System and CONNECT Data Services

5 min read

By John Gonzalez on Oct 31, 2024 2:00:00 PM

Welcome back to our Data Storage Deep Dive Series, where we continue to explore innovative ways to integrate our industrial automation software solutions with enterprise-level historians. In one of our previous posts of this series, Software Toolbox Helps You Fly Higher with Canary Historian, we demonstrated how data from diverse sources could be collected using TOP Server, OmniServer and Cogent DataHub, and subsequently funneled into Canary Historian for advanced trend analysis.

Today, we’re shifting our focus to AVEVA PI System (formerly known as OSIsoft PI), a widely used data repository, and how it can be used alongside AVEVA CONNECT to gain even more value from your industrial data. This blog will showcase how you can leverage the Cogent DataHub to seamlessly integrate data into your PI System, and from there, to CONNECT Data Services, unlocking cloud-based capabilities such as visualization and advanced analytics options for your organization.

Continue Reading

Security Learning Resources: Staying Safe in the World of IIoT

8 min read

By Zachary Parham on Oct 24, 2024 2:00:00 PM

Risk is often defined as the likelihood that something will occur multiplied by the impact it would have. In the world of automation, some of those possible impacts are unexpected downtime, loss of data, theft of information, damage to people and products, and inaccurate data – not to mention the fines and penalties when government regulations are not met.

At Software Toolbox, we understand that data availability, integrity, and confidentiality are of the utmost importance. As the adoption of IIoT grows, so does network exposure, increasing the likelihood of potential security issues. Implementing safe protocols and practices are essential to mitigating these risks.

Continue Reading

Software Toolbox Helps You Fly Higher with Canary Historian

6 min read

By Connor Mason on Sep 19, 2024 2:00:00 PM

Welcome to the next installment of our Data Storage Deep Dive series! For years, Software Toolbox has been synonymous with terms like “device connectivity” and “data integration” thanks to our variety of connectivity solutions that help collect real-time data for all your industrial automation operations. Beyond just real-time data, our team recognizes the value of historical data within the industry, and we aim to help businesses make larger data backed decisions over time.

Continue Reading

Data Storage Deep Dive: Your Intro to Unlocking Historical Data

8 min read

By Ryan Royse on Sep 12, 2024 2:00:00 PM

Welcome to the kickoff post of our Data Storage Deep Dive blog series! In this series, we will explore the crucial role of data storage solutions and Historians in industrial automation. Over the coming weeks, we’ll be looking into how solutions delivered by Software Toolbox can be utilized with Historians, helping you make the most of your industrial data.

Continue Reading

DataHub V11: Enhancing Remote Config Access Security with MFA/TOTP

6 min read

By John Gonzalez on Aug 29, 2024 2:00:00 PM

Building on last week’s Cogent DataHub v11 Security Enhancements Deep Dive blog, this post dives into a practical application of these security enhancement by focusing on the implementation of multifactor authentication (MFA) using a TOTP (Time-based One-time Password) key to secure a Remote Config connection to the DataHub. We will guide you through the process of setting up a built-in user with the “RemoteConfig” role, ensuring that remote access is equipped with the necessary permissions. To further strengthen security, we’ll integrate a TOTP key with an authentication app and define an IP pattern Principal to restrict access to specific source network locations. We’ll conclude by performing a successful login from a different system, thus verifying the effectiveness of our secure setup.

Continue Reading

About this Blog

We're engineers like you, so this blog focuses on "How to" appnotes, videos, tech team tips, product update announcements, user case studies, and other technical updates.  Subscribe to updates below. Your feedback and questions on posts are always welcomed - just use the area at the bottom of any post.

Subscribe to our Blog

Recent Posts

Posts by Topic

See all