exida - Functional Safety Services, IACS Cybersecurity, Alarm Management, IEC 61508 Certification

Search

20 results for the keyword search: ""

Blog Entry: Getting Realistic Failure Rate Data - Part 5

Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…


News Item: Alarm Rationalization with SILAlarm Course to be Held in Calgary

The exida course “Alarm Rationalization with SILAlarm” is scheduled to be held on September 9-10, 2015 in Calgary, AB Canada. Attendees will learn how to conduct alarm rationalization of greenfield (new) or brownfield (existing) applications in order to optimize performance of their alarm systems. The class immerses participants in discussion…


Recorded Webinars: exida Automation Cybersecurity (ACS) Certificate Program

This webinar will introduce and discuss the exida Automation Cybersecurity (ACS) program. This is a certificate program that addresses a growing need to provide confirmation that an attendee showed competency by retaining the knowledge presented in a training course. The ACS program will also provide an analysis of where the candidate’s strengths and weaknesses lie. This program will also help a participant judge their competency level if interested in obtaining a certification like the Certified Automation Cybersecurity Expert (CACE) or Certified Automation Cybersecurity Specialist (CACS).


Blog Entry: I Did Not Lock the Car Door

I was driving one of exida’s top risk experts from Europe to a business meeting. We parked and I locked the car door. He commented “I noticed you did not lock the car door when you parked at the exida office.” He was right. In an area I do not…


Blog Entry: Getting Realistic Failure Rate Data - Part 4

Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…


Blog Entry: That Could Never Happen! What are the Odds?

I often walk through my quiet neighborhood streets on weekday evenings or weekend mornings. These are the times when I don’t expect much traffic, and my expectations are usually met. The probability of a dangerous event that would injure me seems pretty low (risk assessment), since I am usually on…


Recorded Webinars: Designing a Useful and Effective Proof Test: Part 2

A continuation of the “Designing a Useful and Effective Proof Test,” this webinar will look at how to handle final elements that are made up of several distinct devices. We will review functional failure modes by device and provide a methodology on how to determine the overall proof test effectiveness when multiple devices are used. The webinar will also map failure modes from components, to devices, and elements to illustrate how accurate proof test coverage values can be determined.


Blog Entry: Can Wireless be used in Functional Safety?

exida just completed certification of a new sensor product that uses wireless communication to signal a safety logic solver of a potential problem. Shortly after the certificate was posted , a challenge arose: “How can wireless be used for safety?” Well, it is different. A designer must be fully aware…


Blog Entry: Performing a Cybersecurity Risk Assessment as a Component of the PHA

There are three main components of the safety lifecycle : analysis, realization, and operation. We will be taking a look at the analysis phase, particularly related to the cyber industry. To start, the first thing to do in both safety and security is do a detailed process, hazard and risk…


Woodward Industrial Controls - DVP5000 / DVP10000

IEC 61508 in the Safety Automation Equipment List


Recorded Webinars: Designing a Useful and Effective Proof Test

Proof testing is an important part of the management of safety instrumented functions. As an activity required by the functional safety standards, more and more end users are implementing proof tests, but there is often confusion on what should be included in the test and what coverage should be claimed. This webinar will look at techniques to determine what functionality to test as well as coverage. The webinar will also map failure modes from components, to devices, and to elements to illustrate how accurate proof test coverage values can be determined.


News Item: exida Announces Business Partnership with Qingdao Moses Automation Control System Technology Co., LT

exida is very pleased to partner with Qingdao Moses in China , a high-tech enterprise that specializes in providing products and service of industrial automation process control system integration, DCS maintenance and operation, industry network information security protection as well as industrial data acquisition and transmission. Qingdao Moses in China…


Blog Entry: Getting Realistic Failure Rate Data - Part 3

Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…


Blog Entry: The Evolution of Coding Standards

Sometimes it seems that things change slowly in the world of functional safety. If you look at many of the technical references in IEC 61508 you will find that most come from the 1980s and 1990s. There is even one reference that dates back to 1950! With the rate technology…


Recorded Webinars: Master the Destiny of Your Alarm System with a Master Alarm Database

The adoption of standards on alarm management (ISA-18.2 and IEC 62682) have introduced a new term into the lexicon of automation professionals - the “master alarm database,” which is defined as the “authorized list of rationalized alarms and associated attributes.” In this webinar we will talk about what a master alarm database (MADB) is, how one is created, what information it should/could contain, how it can be used to create alarm response procedures, and how it can be integrated into a management of change process. We will also look at how it can be used to document the results of alarm rationalization (e.g., alarm priority, classification, limit, cause, consequence, and corrective action) and other useful design data (e.g., safe operating limits, associated interlocks, maximum design temperatures/pressures). Additionally the webinar will examine how the MADB can be used as the source for updating the control system with the optimized alarm settings resulting from rationalization.


Woodward Industrial Controls - Large Electric Sonic Valve

IEC 61508 in the Safety Automation Equipment List


Blog Entry: Getting Realistic Failure Rate Data - Part 2

Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…


Blog Entry: Getting Realistic Failure Rate Data - Part 1

Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…


Blog Entry: Close Enough? Not so Much

Performing a SIL Verification calculation on preliminary design information can be a very useful tool to dial in the Safety Instrumented Function (SIF), Safety Requirements Specification (SRS) content , and define critical elements for the field component purchase specifications. Conceptual verification is typically performed quickly with general design information. The…


GasSecure AS - GS01 and GS01_EA Wireless Gas detectors

IEC 61508 in the Safety Automation Equipment List


Page 95 of 146 pages. ‹ First  < 93 94 95 96 97 >  Last ›