exida

exida explains Blog

Four Ways to Pick a Winning Alarm Rationalization Team

Four Ways to Pick a Winning Alarm Rationalization Team

“Who should participate in alarm rationalization?” 

It finally happened. Alarm management problems at the plant led to an incident and now management wants action. You have “volunteered” to put together a staffing plan to execute alarm rationalization. You have heard it can be a resource-intensive process, so you want…

Read More...

Competency and IEC61511

Competency and IEC61511

Many of you who follow exida’s blogs and webinars will know that we often talk about the requirement for competency.  In fact, the 2016 edition of IEC61511 specifically addresses competency in more detail now than the 2003 version.  The strong emphasis on competency is because the IEC61511 committee recognized that…

Read More...

Most Failures are Systematic - NOT!
  • by Dr. William Goble, CFSE
  • Wednesday, February 16, 2022
  • Certification

Most Failures are Systematic - NOT!

At exida we have studied hundreds of sets of field failure data from various sources.  Some of these data sets have indicated differences in failure rates by two orders of magnitude for the same product type!  After tracing through the data collection process for many of these field failure data sets,…

Read More...

Demystifying the Threat Modeling Process

Demystifying the Threat Modeling Process

The thought of tackling a threat model (TM) might not be the most appetizing to some people.   Doing a quick Internet search, someone could get stuck under a mountain of acronyms and terms.  I mean, what is a CVSS anyway?  And then there are the diagrams, attack trees and feedback loops that…

Read More...

Machinery Hazards and Risk Assessment Techniques

Machinery Hazards and Risk Assessment Techniques

Machinery related hazards continue to result in hundreds of deaths and thousands of serious injuries each year. In 2019, 2,963 deaths occurred in the construction, transportation and warehousing, agriculture, forestry, fishing and hunting, and manufacturing industries in the United States1. Additionally, serious injuries continue to pose a major challenge…

Read More...

If an Alarm Occurs and the Operator doesn’t Ack it, was it really an Alarm?

If an Alarm Occurs and the Operator doesn’t Ack it, was it really an Alarm?

Similar to the thought experiment “If a tree falls in a forest and no one is around to hear it, does it make a sound?”, we ask - If an alarm is generated, and the operator fails to acknowledge it, was it really an alarm? A prevalence of unacknowledged…

Read More...

Measuring Performance – Why Are We Not Doing This?

Measuring Performance – Why Are We Not Doing This?

Part of the changes to the IEC61511 standard in 2016, some five (5) years ago now, was to emphasize the need to do a better job with regards to the Operations and Maintenance phase of the safety lifecycle.  One of the key aspects of the Operation and Maintenance phase…

Read More...

Can Nuisance Alarms “Break” the Operator?

Can Nuisance Alarms “Break” the Operator?

Study after study finds that something like 80% of industrial incidents (give or take) are caused by Human Error. Incidents involving human error often include a failure of the operator to respond to an alarm, which is often directly or indirectly caused by nuisance alarms. Poor alarm management has…

Read More...

FAQ: More Failures with Actuated Valves than what published failure rates indicate?

FAQ: More Failures with Actuated Valves than what published failure rates indicate?

During a recent exida webinar we received the following question:

We tend to see more failures with actuated valves, than what manufacturers published failure rates would indicate! Any reason?

There are several reasons. Some manufacturers publish data based on field return data where they classify failures caused by customers…

Read More...

“Data is King” – Introducing the Sovereign of Component Reliability Databases
  • by Todd Stauffer
  • Thursday, August 12, 2021
  • Software

“Data is King” – Introducing the Sovereign of Component Reliability Databases

With the drive for digitalization and the Internet of Things the expression “Content is King”, coined by Bill Gates, has now been replaced by “Data is King”. This is especially TRUE in functional safety where the safety and reliability predictions generated from a Failure Modes, Effects & Diagnostics Analysis…

Read More...

Closing Two Common IEC 62443 Compliance Gaps

Closing Two Common IEC 62443 Compliance Gaps

Two common gaps exida encounters when evaluating vendor compliance against the IEC 62443-4-1, IEC 62443-4-2 and IEC 62443-3-3 standards are:

  1. Inadequate or unclear Security Guidelines.    
  2. A lack of documentation on the security audit records (AKA logs).   

Improving compliance in these areas is also a very cost-effective…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here , part 2 here, and part 3 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and…

Read More...

Can Checklists Prevent Human Error?

Can Checklists Prevent Human Error?

Spend Your Product Development Time Wisely

Spend Your Product Development Time Wisely

Want to improve your safety lifecycle and be more compliant with IEC 61508?  Focus on the things that have the most benefit.  Like what?  What are some of these valuable things?  

One of the major deficiencies I see while doing certification assessments is…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here and part 2 here.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber…

Read More...