Author PicAuthor Pic
John Turner
Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute.

Mr. Turner is the Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute. Mr. Turner was one of the team members at the start of the development of MTConnect and has spent his entire career in the field of industrial automation, machine tools, and control technologies.   He spent over 30 years with GE and GE Fanuc Automation in a wide variety of management roles in sales, marketing, product development and operations.   While at GE Fanuc, Mr. Turner’s team developed and deployed the first commercially available MTConnect Agent/Adapter called mi-Link. Additionally, he was previously Vice President of Engineering and COO for CimWorks, a subsidiary of GE Fanuc Automation providing hardware and software solutions for the Statistical Process Control (SPC Quality) market. In 2009, Mr. Turner formed FAC&T where he applies his knowledge and expertise to advancing the state of manufacturing technology specializing in the area of shop floor productivity.

Mr. Turner is the Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute. Mr. Turner was one of the team members at the start of the development of MTConnect and has spent his entire career in the field of industrial automation, machine tools, and control technologies.   He spent over 30 years with GE and GE Fanuc Automation in a wide variety of management roles in sales, marketing, product development and operations.   While at GE Fanuc, Mr. Turner’s team developed and deployed the first commercially available MTConnect Agent/Adapter called mi-Link. Additionally, he was previously Vice President of Engineering and COO for CimWorks, a subsidiary of GE Fanuc Automation providing hardware and software solutions for the Statistical Process Control (SPC Quality) market. In 2009, Mr. Turner formed FAC&T where he applies his knowledge and expertise to advancing the state of manufacturing technology specializing in the area of shop floor productivity.

Posts by John Turner
Technology
By John TurnerAug 08, 2022

Building an Advanced Cybersecurity Plan: Identification and Authentication

The definition and management of the credentials used to access the resources within a company's network requires their own set of rules within an access control strategy. Here are some important security elements to consider with usernames and passwords.

5m read
Technology
By John TurnerJun 17, 2022

Building an Advanced Cybersecurity Plan: Electronic Media Protection

Any advanced cybersecurity plan should address electronic media in both the IT and the OT networks. Devices like CDs, flash drives, and more are problematic since each is an interface to your company’s network, introducing possible security threats.

7m read
Technology
By John TurnerJun 03, 2022

Building an Advanced Cybersecurity Plan: Access Control

Access control in an advanced cybersecurity plan go well beyond usernames and passwords. It means defining, implementing, and monitoring rules to control which persons and systems may access resources within your company’s network and computer systems.

5m read
Technology
By John TurnerMay 06, 2022

Building an Advanced Cybersecurity Plan: Interaction Mapping

To build or enhance your company's cybersecurity plan, one of the first steps to consider is mapping out all access points to your company’s systems and network, including the interaction points between various systems within and outside the network.

5m read
Technology
By John TurnerMay 02, 2022

Building an Advanced Cybersecurity Plan: Engagement and Reinforcement

Cybersecurity protects your – and your clients' – assets. This series dives into how you can integrate a successful cybersecurity plan. From company culture to training and maintaining your personnel, creating a safe business environment starts here.

5m read
Technology
By John TurnerMar 22, 2022

Time To Rethink Your Cybersecurity Plan?

Proactively addressing cybersecurity can turn a “necessary evil” into a competitive advantage. Implementing a solid cybersecurity plan can reassure existing customers that they have made the right choice in choosing your company as a supplier.

5m read
Technology
By John TurnerJan 28, 2022

CMMC: What Is It and Why Should Every Manufacturing Company Be Paying Attention

CMMC stands for Cybersecurity Maturity Model Certification. This is an initiative of the Department of Defense (DOD) to address cybersecurity concerns at non-governmental organizations participating in the DOD supply chain.

5m read
Technology
By John TurnerJan 06, 2022

OT Networks Face Security Threats From All Points on the Compass

Regardless of whether or not there is a single or multiple points of connection between the two network environments, the objective of the security functions applied at these connection points is to control the flow of information across that barrier ...

5m read
Technology
By John TurnerDec 08, 2021

Protecting an OT vs. IT Network: Performance Differences

A topic that is often not considered is the differences in the performance requirements between the IT and OT network environments.

5m read
Technology
By John TurnerNov 23, 2021

Protecting an OT vs IT Network: Practice and Procedure Differences

The types of equipment connected to OT networks (manufacturing) are fundamentally different than the equipment connected to an IT network (office). This difference represents a whole new set of challenges for IT professions attempting to extend their ...

5m read