Skip to content

President’s Welcome – March 2024

    Good morning, good afternoon, good evening – wherever you are in the world! This latest newsletter is addressing EU regulations like Cyber Resilience Act (CRA) and the OPC UA Security Conference to provide lots of answers. But please learn more about the new demo on the Digital Battery Passport (DBP), news about Digital Twins and DataSpaces and other topics like upcoming working groups like AI.

    Compliance Corner – March 2024

      In this article: successful InterOp Workshop held in March in Phoenix, AZ plus the Open Process Automation Forum gears up to commence certification activities related to the O-PAS standard –mandating OPC UA certification.

      Field Level Communications Corner – Mar 2024

        The FLC (Field Level Communications) Initiative is in the process of launching a second project phase as completion of the Controller-to-Controller (C2C) Minimum Viable System (MVS) approaches. The FLC Initiative’s Project Phase 2 will focus on the Controller-to-Device (C2D) use-case, and will operate for a term of 4 years.

        OPC UA Security Summit 2024 | Jun 5+6

          Join us for the newest event of the OPC Foundation: the OPC UA Security Summit, where we address the pressing need within our community to openly discuss and exchange insights on critical cybersecurity requirements.

          OPC Day 2024 – International | Jun 17-21

            The OPC Foundation will host its fifth iteration of the annual digital event from June 17-21, 2024 with 3 hours per day. Each session will be held twice, in different time zones to serve Europe, Asia, and the Americas.

            NAONWORKS Enhances Industrial Security with Gateway and OPC UA SDKs from Softing

              A power plant faced a critical need for a secure and reliable gateway to facilitate data acquisition between a real-time database and nine different DCS’s. NAONWORKS’ Gateway with Softing’s SDK was the solution. Crucially, it ensures individual access control and configuration rights as well as user authentication and implements effective data encryption.