exida explains Blog

Don’t Let Your Safe Operating Limits Leave You S-O-L (Out of Luck)

Don’t Let Your Safe Operating Limits Leave You S-O-L (Out of Luck)

As the name implies, the purpose of Safe Operating Limits (SOL) is to define the limits beyond which a process will not intentionally be operated and at which troubleshooting ceases, replaced by pre-determined actions to bring the process to a…

Read More...

Back to Basics! 04 - Safety Instrumented System (SIS)

Back to Basics! 04 - Safety Instrumented System (SIS)

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety.  We'll start with some more general terms and descriptions and make our way to…

Read More...

CACE Specialties, Now That’s New!

CACE Specialties, Now That’s New!

Cyberattacks have become the new norm for industrial control systems. A recent study found that 54% (more than half) of companies surveyed had experienced a cyber-attack on their Industrial control system within the last two years[1]. 

The need for…

Read More...

Back to Basics! 03 - Safety Instrumented Function (SIF)

Back to Basics! 03 - Safety Instrumented Function (SIF)

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety.  We'll start with some more general terms and descriptions and make our way to…

Read More...

Back to Basics! 02 - Safety Integrity Level (SIL)

Back to Basics! 02 - Safety Integrity Level (SIL)

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety.  We'll start with some more general terms and descriptions and make our way to…

Read More...

China Probes Factory as Death Toll Rises

China Probes Factory as Death Toll Rises

Walking into work last week and seeing this article reassured me why I work at exida.  Incidents, like this recent one at a pesticide plant in eastern China, are why we push every day to help educate people…

Read More...

Back to Basics! 01 - Functional Safety

Back to Basics! 01 - Functional Safety

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety.  We'll start with some more general terms and descriptions and make our way to…

Read More...

exida Failure Rates are Higher Than TÜV Italia. Who Is Right?

exida Failure Rates are Higher Than TÜV Italia. Who Is Right?

An owner-operator engineer compared the failure rates for two similar products from an exida certificate with those from a TÜV Italia certificate.  exida numbers were an order of magnitude higher.  Who is right?  

There are some relevant fundamental facts in the…

Read More...

Where Do You Stand with Functional Safety?

Where Do You Stand with Functional Safety?

This year, make your New Year’s resolution safety! 

Take a moment this year and think about where you currently stand with functional safety. And actually, be honest with yourself. REALLY honest. Do you proof test on time, or does…

Read More...

What can OT learn from IT data breaches?

What can OT learn from IT data breaches?

Does your organization even have a CISO position?

Cybersecurity continues to be an overlooked aspect in organizations—including those owning ICS (Industrial Control System) production facilities. Anyone following the news has most assuredly heard of the plethora of…

Read More...

Setting Goals for 2019: Are You Thinking About Functional Safety?

Setting Goals for 2019: Are You Thinking About Functional Safety?

When I went to set my goals for 2019, I set both personal and professional goals. One of my professional goals is to clean off my desk, but another is to get more people to think about functional safety…

Read More...

Who gives exida the authority to publish SILSafeData?

Who gives exida the authority to publish SILSafeData?

SILSafe Data

SILSafeData contains upper and lower bound ranges of dangerous undetected failure rates for many automation devices. It was created by exida using statistical analysis of FMEDA failure rate predictions. The component…

Read More...

Cyberattacks Succeed Where Humans and Systems Are Weak

Cyberattacks Succeed Where Humans and Systems Are Weak

Have you noticed that over the last several years, cybersecurity seems to be “trending?” 

Companies of all sizes are starting to learn how to prevent, or at least minimize, these attacks. They hire third-party experts and attend trainings to…

Read More...

Does Your ICS Service Provider Need Training?

Does Your ICS Service Provider Need Training?

Today’s owner operators and lease operators of industrial production facilities frequently employ service providers for projects and upgrades, as well as operations and maintenance. These contractors often travel to many sites, carry their own copies of source code and…

Read More...

Bridging the OT / IT Cybersecurity Gap

Bridging the OT / IT Cybersecurity Gap

Personnel responsible for protecting organizational assets within Operations Technology (OT) groups would seem to have the same mission as those responsible for protecting organizational assets within Information Technology (IT) groups, and be tightly aligned. Spending any amount of time…

Read More...