Insurance Companies are hedging their bets through premiums while the Manufacturing Industry is placing their wagers on luck.
The worlds of gambling and insurance are similar in many ways. Both are built upon elements…
Insurance Companies are hedging their bets through premiums while the Manufacturing Industry is placing their wagers on luck.
The worlds of gambling and insurance are similar in many ways. Both are built upon elements…
The Oldsmar Water Treatment Facility in Pinellas County Florida was compromised by hackers on February 5th. Hackers took advantage of the TeamViewer application that was still installed on the water facilities network to gain…
When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to…
Successful alarm rationalization combines both art and science. From the scientific point of view, rationalization follows a systematic process that applies alarm management principles to determine whether an alarm is justified (needed) and to…
The increasing global adoption of alarm management standards (ISA-18.2 and IEC 62682) is bringing the importance of alarm rationalization to the forefront. Rationalization is defined as the “process to review potential alarms using the…
This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here. Certification provides you with the opportunity to work with an experienced…
The March / April 2020 issue of Intech contains an excellent article by Nick Sands and Donald Dunn, the co-chairs for the ISA-18 committee.
The article reviews some of the most frequently…
It’s interesting that the majority of the time when people talk about functional safety, they are usually thinking about hardware: what sensors to use, which logic solver, what actuator, solenoid or valve to…
As many of you will know, one of the most common form of nuisance to operators working industrial controls are repeating or chattering alarms. On a typical plant, repeating alarms may account for around…
exida has traditionally been involved in industries such as oil and gas, chemicals, power generation and automotive. While these are a diverse set of industries, many of the techniques that we use such…
This is the next in a series of blogs and papers on the benefits of cyber certification. Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the…
Both Process Safety Analysis (PHA) and Layer of Protection Analysis (LOPA) occur in the early stage of the Functional Safety Lifecycle, detailed in both IEC 61511 and IEC 61508.…
One of the more important tasks in the alarm management lifecycle is auditing of the alarm system configuration. Auditing preserves your investment in rationalization, checks for changes that bypassed the MOC process, and helps…
Experience is a good teacher. But how do you get the experience?
Formal classroom or online training is often available for more general skills, but on-the-job training usually provides a more in-depth path to…