Product Certification
Over 60 new products received functional safety or cybersecurity certification this year. Those products and more…
Product Certification
Over 60 new products received functional safety or cybersecurity certification this year. Those products and more…
The solenoid valve manufacturer provides an FMEDA report that lists “useful life = 12 years.” Useful life is a reliability engineering term that indicates a point in time when the failure rate of a device will begin increasing rather rapidly. Why do we care about this time interval? That…
What constitutes a good coding guideline?
Serious software development for functional safety requires a coding standard or coding guideline. Most organizations have one, but how do you know if it’s good?
You need to look beyond the boilerplate and physical code layout that are often defined in a coding…
When building a product such as an anti-lock braking system for an automobile, or a railroad, or process control safety system, making sure that the product works as specified is a big part of functional safety. When it is time for the system to engage to prevent an accident,…
I am often asked “who says exida can certify a product?” The best answer is of course “the marketplace.” End user owner/operators ask for an exida certificate because they understand why technical competency is so important when evaluating design quality. Then instrumentation manufacturers get an exida certificate because exida…
Part 3 covered the design of tests, resulting in one or more Module Test Plans. To execute a test plan, one would start with the test plan and a test results template (which could be a copy of the test plan as indicated previously), document the general test information…
There is a lot of concern around cyber security in Industrial Control Systems. With new threats like Stuxnet and Flame, the perceived risk to critical infrastructure has increased dramatically. There are increased calls for legislation and new methods for dealing with these threats. The history of how we have…
The Test Plan
Assessment requires evidence that module tests are designed properly, run properly, and have been successfully run. Documented test results are also required. In order to meet these requirements it is generally a good idea to document a test plan for each module. Information that applies…
Last week you learned about what exactly a module is, and examples of different types of modules. Now we will move on to interfaces, the need for module testing, and code coverage requirements.
An interface, such as the 3D printer’s communication interface, or the format of the 3D data…
A recent, disturbing trend I’ve seen in industrial control system (ICS) security is that, in response to concerns about the security of their ICS & SCADA systems, companies are performing penetration (pen) testing on operational systems. Often times they request these services as one of the first steps in…
3D printers are cool! I watched a TED talk this past year about them. I know they have been around for over 30 years, but I still think they’re cool. As I watched, I thought of the wheel for my dishwasher’s roll-out rack, which had…
Now that you know the step-by-step process of product certification, now let’s take a look at the actual information on the certificate.
In the left panel (gray background) you will find an exida certification logo. …
So you downloaded a product certificate from the exida website and you are trying to understand the information documented in the certificate. Also, you likely want to know what stands behind the certificate and what was involved in the certification of the product.
I’m not…
If you were going to build a bridge, you would want to make sure that it did not fall down if there were too many cars on the bridge. One way that this is accomplished is to overdesign. If the bridge is expected to hold at most 20,000 pounds,…
The exida explains blog has been around for over five years and gives expert and sometimes candid insight into the world functional safety, alarm management, and industrial cybersecurity.