exida explains Blog

Pipeline Safety and Security – Why are we still not prepared?

Pipeline Safety and Security – Why are we still not prepared?

Safety Application Shortcuts - Do You Really Want to Hurt Me?

Safety Application Shortcuts - Do You Really Want to Hurt Me?

No, you probably don’t want to hurt me.  But if your product is used in a safety application, and my job depends on your product doing its job, will it hurt me if it fails?

With…

Read More...

Learning From History So We Don’t Repeat It – New Tools

Learning From History So We Don’t Repeat It – New Tools

According to numerous industry studies, significant improvement has been made over the last 20 -30 years in occupational safety, but not so much in operational safety (process safety).  New process safety incidents continue to occur…

Read More...

What is SIL (Safety Integrity Level)?

What is SIL (Safety Integrity Level)?

The term SIL is rapidly spreading to Request for Proposals (RFP) and purchase requirements in many industries.  But in many of those industries, few have heard about SIL and fewer have a grasp of the…

Read More...

Why Sharing Components Between SIS & BPCS Is Not A Good Idea

Why Sharing Components Between SIS & BPCS Is Not A Good Idea

This is a topic which comes up time and again, especially when reviewing legacy systems.  Although IEC61511 doesn’t preclude the use of shared devices, it does however provide guidance under Clause 11 of what…

Read More...

Strong Safety Culture Translates to Lower Insurance Premiums

Strong Safety Culture Translates to Lower Insurance Premiums

Insurance Companies are hedging their bets through premiums while the Manufacturing Industry is placing their wagers on luck.

The worlds of gambling and insurance are similar in many ways. Both are built upon elements…

Read More...

Attack on Florida Water System Highlights Weak Security Protections for Critical Infrastructure

Attack on Florida Water System Highlights Weak Security Protections for Critical Infrastructure

The Oldsmar Water Treatment Facility in Pinellas County Florida was compromised by hackers on February 5th. Hackers took advantage of the TeamViewer application that was still installed on the water facilities network to gain…

Read More...

IEC 62443 - The Evolution of IACS Cybersecurity

When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to…

Read More...

Alarm Rationalization: An Art or a Science? – Common Rationalization Mistakes

Alarm Rationalization: An Art or a Science? – Common Rationalization Mistakes

Successful alarm rationalization combines both art and science. From the scientific point of view, rationalization follows a systematic process that applies alarm management principles to determine whether an alarm is justified (needed) and to…

Read More...

Rationalize Your Alarm Management Problems Away

Rationalize Your Alarm Management Problems Away

The increasing global adoption of alarm management standards (ISA-18.2 and IEC 62682) is bringing the importance of alarm rationalization to the forefront. Rationalization is defined as the “process to review potential alarms using the…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here.  Certification provides you with the opportunity to work with an experienced…

Read More...

Alarm Management Frequently Asked Questions (FAQs)

Alarm Management Frequently Asked Questions (FAQs)

The March / April 2020 issue of Intech contains an excellent article by Nick Sands and Donald Dunn, the co-chairs for the ISA-18 committee. 

The article reviews some of the most frequently…

Read More...

The Dos and Don’t of SIS Application Programming

The Dos and Don’t of SIS Application Programming

It’s interesting that the majority of the time when people talk about functional safety, they are usually thinking about hardware: what sensors to use, which logic solver, what actuator, solenoid or valve to…

Read More...

Why should I use an Alarm Deadband?

Why should I use an Alarm Deadband?

As many of you will know, one of the most common form of nuisance to operators working industrial controls are repeating or chattering alarms. On a typical plant, repeating alarms may account for around…

Read More...

IEC 62443 Cybersecurity Certification for Medical Devices

IEC 62443 Cybersecurity Certification for Medical Devices

exida has traditionally been involved in industries such as oil and gas, chemicals, power generation and automotive.  While these are a diverse set of industries, many of the techniques that we use such…

Read More...