<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AutomaTech</title>
	<atom:link href="https://automatech.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://automatech.com</link>
	<description>We Make Plant Information Flow</description>
	<lastBuildDate>Tue, 10 Mar 2026 16:46:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://automatech.com/wp-content/uploads/Site-icon-1.gif</url>
	<title>AutomaTech</title>
	<link>https://automatech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Exploring the Versatile Capabilities of the Standard Bots RO1 Robot</title>
		<link>https://automatech.com/exploring-the-versatile-capabilities-of-the-standard-bots-ro1-robot/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 15:19:14 +0000</pubDate>
				<category><![CDATA[Automation]]></category>
		<category><![CDATA[Blog Posts]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=32059</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/exploring-the-versatile-capabilities-of-the-standard-bots-ro1-robot/">Exploring the Versatile Capabilities of the Standard Bots RO1 Robot</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Power of American Innovation: The Standard Bots Edge</title>
		<link>https://automatech.com/the-power-of-american-innovation-the-standard-bots-edge/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 14:47:43 +0000</pubDate>
				<category><![CDATA[Automation]]></category>
		<category><![CDATA[Blog Posts]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=32054</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/the-power-of-american-innovation-the-standard-bots-edge/">The Power of American Innovation: The Standard Bots Edge</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>New Legislation Makes Cobots an Even Greater Financial Advantage for Manufacturers</title>
		<link>https://automatech.com/cobots-new-legislation/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Thu, 06 Nov 2025 15:56:54 +0000</pubDate>
				<category><![CDATA[Automation]]></category>
		<category><![CDATA[Blog Posts]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=31830</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/cobots-new-legislation/">New Legislation Makes Cobots an Even Greater Financial Advantage for Manufacturers</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Strengthening Data Security: Embracing Cloud-Based Historian and Cybersecurity Best Practices</title>
		<link>https://automatech.com/cloud-based-historian-and-cybersecurity/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Wed, 21 Jun 2023 18:25:59 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IIoT & Cloud Solutions]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=30524</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/cloud-based-historian-and-cybersecurity/">Strengthening Data Security: Embracing Cloud-Based Historian and Cybersecurity Best Practices</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Automation-related Myths about Version Control and Backups</title>
		<link>https://automatech.com/automation-myths-backups/</link>
		
		<dc:creator><![CDATA[Karrie Williams]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 20:57:16 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://automatech.com/?p=30081</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/automation-myths-backups/">Automation-related Myths about Version Control and Backups</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Breaking Down the Cyber Journey: A Guide to Adopting Systems that Work For You</title>
		<link>https://automatech.com/blog-cyber-journey/</link>
		
		<dc:creator><![CDATA[hughkelly]]></dc:creator>
		<pubDate>Fri, 01 Jan 2016 10:38:21 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://new.automatech.com/?p=2171</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog1.jpg" /></p>
<p>Gaining a clear understanding of how to focus your time and energy continues to become cumbersome. With the everchanging landscape of technology, staying competitive is already complex enough. Now add Cybersecurity to the mix and things get even more convoluted. Recently, AutomaTech and Nozomi Networks hosted a webinar on how to navigate the complex Log4Shell vulnerability. During the webinar, the audience was asked a series of questions designed to better understand three main elements of an organization’s cyber strategy within IT/OT/ and IoT: organizational readiness, technology adoption, and technology expertise. This post is designed to help ignite the conversation around where you may be in your own cyber journey and how to further evolve.</p>
<p>The post <a rel="nofollow" href="https://automatech.com/blog-cyber-journey/">Breaking Down the Cyber Journey: A Guide to Adopting Systems that Work For You</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Considerations for Running Critical Applications Successfully and Securely in the Cloud</title>
		<link>https://automatech.com/critical-applications-cloud/</link>
		
		<dc:creator><![CDATA[hughkelly]]></dc:creator>
		<pubDate>Fri, 01 Jan 2016 04:34:33 +0000</pubDate>
				<category><![CDATA[Blog Posts]]></category>
		<category><![CDATA[IIoT & Cloud Solutions]]></category>
		<guid isPermaLink="false">http://new.automatech.com/?p=2259</guid>

					<description><![CDATA[<p><img src="http://www.shape5.com/demo/images/general/blog/blog2.jpg" /></p>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed dictum dolor ac turpis porttitor condimentum. Morbi diam dui, venenatis ac massa id, ultrices pharetra nisl. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur quis tellus quis enim viverra vulputate ac sed dui. Phasellus molestie tempus purus, quis tempus sem pharetra varius. Morbi nisi dui, iaculis et accumsan ac, aliquet id velit. Nullam convallis imperdiet lacus id sodales. </p>
<p>The post <a rel="nofollow" href="https://automatech.com/critical-applications-cloud/">Considerations for Running Critical Applications Successfully and Securely in the Cloud</a> appeared first on <a rel="nofollow" href="https://automatech.com">AutomaTech</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
