exida

exida explains Blog

Threat Modeling:  How to Succeed at this High Value and High Effort Cybersecurity Activity

Threat Modeling:  How to Succeed at this High Value and High Effort Cybersecurity Activity

Threat Modeling (TM) is a process for identifying and prioritizing potential cybersecurity threats to software, hardware or a system.   Contributing to the high value of TM is: 

  • The ability to identify threats early in the design process when they are less expensive to address 
  • Methodically prioritizing threats helps…

    Read More...

FMEA Evolution – Has the essence of FMEA been lost?

FMEA Evolution – Has the essence of FMEA been lost?

Has your FMEA entered the realm of the paperwork exercise that we force ourselves to do for no real reason than someone says we must do it?

I have enjoyed analysis using FMEA. I first learned it existed when I was working for Ford. FMEA was the first Ford…

Read More...

How Does Mission Time Work with Proof Testing to Impact SIL Verification?

How Does Mission Time Work with Proof Testing to Impact SIL Verification?

I have been asked this question many times by various clients over the years.  This comes down to whether a perfect proof test is assumed or not.  Let us remember that Mission Time is defined as the amount of time we expect a set of SIF equipment to run until a…

Read More...

FMEA Mistakes

FMEA Mistakes

I find YouTube to be a good source of information on many subjects. Want to know how to fix a widget? There are probably a few videos on that exact subject.  Technical subjects are also there.  I was searching on “FMEA” and found an interesting looking video on the “Read More...

Risky Business:  IEC 62443 and Legacy Products

Risky Business:  IEC 62443 and Legacy Products

When it comes to developing secure products, the IEC 62443 series of standards provide a lot of guidance and best practices which can be applied while developing the product.  This is essentially an approach to designing security into the product rather than trying to add it on at the…

Read More...

The value of RPN Numbers in a DFMEA
  • by Dr. William Goble, CFSE
  • Thursday, August 15, 2024
  • Certification

The value of RPN Numbers in a DFMEA

I learned about the Failure Modes and Effects Analysis (FMEA) process for designs some decades ago. I was Supervisor of an Embedded System development group.  There seemed to be a lot of evidence that an FMEA on a design was a really good way to identify issues (problems) early…

Read More...

Environmental Impact on Failure Rates
  • by Valerie Motto
  • Monday, August 05, 2024
  • Software

Environmental Impact on Failure Rates

Good component failure rate data is a cornerstone of good quality reliability metric analysis. As mentioned in a previous exida whitepaper, one of the shortcomings of reliability databases has been the inability to handle variations in the operating environment. A sensor monitoring a flame and the processor interpreting the signal…

Read More...

Why is Memory Management important for Functional Safety?

Why is Memory Management important for Functional Safety?

What is Memory Mapping?

Memory mapping is a technique used in computer systems to manage memory resources safely, it involves creating a virtual address space that corresponds directly to the physical memory or to a portion of it, this allows programs to access memory in a way that is…

Read More...

Why do we do probabilistic models to predict risk reduction?  Check the box only?

Why do we do probabilistic models to predict risk reduction?  Check the box only?

I had an engineer from a European Certification Body ask me why exida would bother paying any attention to these failure rate numbers, especially on mechanical devices? He said that he does not know anyone who actually uses them! To answer why exida pays attention to failure rates, we…

Read More...

Have we reached peak C?

Have we reached peak C?

The C programming language has undoubtably extremely successful. It consistently ranks highly in the various rankings of most popular programming languages however these studies seem to be measured. C is not a language that is naturally suited to having safety requirements given to it. So, unsuited is it to…

Read More...

What Does Root Cause Analysis Really Mean?

What Does Root Cause Analysis Really Mean?

This is an intriguing question.  One that I often ask my classes when I’m teaching our FSE100 Functional Safety course. Very often, they do not know or do not fully understand what this means and why it is important.

The IEC61511 standard requires that any failures that occur within the…

Read More...

What is a Pragmatic Approach to Cybersecurity?

What is a Pragmatic Approach to Cybersecurity?

Now that we have a little bit of context on what's driving our current cybersecurity landscape. The next question is, “where does this pragmatic approach come in?  What is a pragmatic approach? What does the word pragmatic mean? The dictionary definition is dealing with things sensibly and realistically in a…

Read More...

Many Different Forces are Influencing ICS Cybersecurity Adoption

Many Different Forces are Influencing ICS Cybersecurity Adoption

When we look at some of the challenges that are facing  control systems, we also have to think about what forces are influencing how asset owners adopt cybersecurity. We'll talk about four of those main drivers that play a role in cybersecurity implementation. 

National Standards…

Read More...

Machine Safety Goals

Machine Safety Goals

From a machine safety management perspective, what goals are you looking to establish? Building a company safety culture, building awareness of the hazards, building the "buy in" to do things right and do things consistently is very important. It can't be done by a single person.  It takes the…

Read More...

Forces Influencing Machine Safety Adoption

Forces Influencing Machine Safety Adoption

What is driving machine safety adoption? What are some of the key questions that companies are trying to answer when it comes to machine safety? For industrial facilities, whether it's a chemical plant, or a machine application, it ultimately comes down to facility risk management. Companies want to provide…

Read More...