Last month JWN and Grant Thornton published a report on service and supply companies within the O&G industry. 372 leading companies providing services to oil and gas production businesses were surveyed, and the report highlights that many of these firms are capitalising on cooperating with each other.
Our blog - IIoT thinking
Despite IoT currently being in the phase of rapid development and growth, there are still gaps and areas that require improvement. Identifying and working on these has been the focus of many researchers who believe IoT could be transformed and bettered.
A journey towards safer operations and reduced losses. By Alastair Maclachlan.
A reoccurring problem with storage-sourced energy is its sustainability. Whilst devices such as batteries and supercapacitors can source their energy from green methods – solar and wind power– it is not always enough to counteract the materials used in producing these devices, which can often be harmful to the environment.
In the last decade, the oil technology has focused on one aspect in particular: efficiency. This has become the end goal of most, if not all companies, and is regarded to be an industry leader for development.
Today, businesses dealing with any data are most likely using a cloud service. This practice enables important files to be stored securely, so they aren’t lost during system reboots or errors, and makes them accessible from anywhere on any device through an online platform.
One of the most prominent challenges that the modern energy market and systems are constantly battling with is storage.
The definition of a digital twin within Wikipedia states; “Digital twins refer to computerized companions of physical assets that can be used for various purposes.
Comparing oil sands with regular oil can highlight challenges that the former faces daily: oil sands can be tougher on the work force and safety measures, as well as present drawbacks financially.
Every person working in or with technology most likely knows about the Mirai attacks of 2016 and the consequences they had on the security standards of any software based technology appliances.