Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…
The exida course “Alarm Rationalization with SILAlarm” is scheduled to be held on September 9-10, 2015 in Calgary, AB Canada. Attendees will learn how to conduct alarm rationalization of greenfield (new) or brownfield (existing) applications in order to optimize performance of their alarm systems. The class immerses participants in discussion…
This webinar will introduce and discuss the exida Automation Cybersecurity (ACS) program. This is a certificate program that addresses a growing need to provide confirmation that an attendee showed competency by retaining the knowledge presented in a training course. The ACS program will also provide an analysis of where the candidate’s strengths and weaknesses lie. This program will also help a participant judge their competency level if interested in obtaining a certification like the Certified Automation Cybersecurity Expert (CACE) or Certified Automation Cybersecurity Specialist (CACS).
I was driving one of exida’s top risk experts from Europe to a business meeting. We parked and I locked the car door. He commented “I noticed you did not lock the car door when you parked at the exida office.” He was right. In an area I do not…
Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…
I often walk through my quiet neighborhood streets on weekday evenings or weekend mornings. These are the times when I don’t expect much traffic, and my expectations are usually met. The probability of a dangerous event that would injure me seems pretty low (risk assessment), since I am usually on…
A continuation of the “Designing a Useful and Effective Proof Test,” this webinar will look at how to handle final elements that are made up of several distinct devices. We will review functional failure modes by device and provide a methodology on how to determine the overall proof test effectiveness when multiple devices are used. The webinar will also map failure modes from components, to devices, and elements to illustrate how accurate proof test coverage values can be determined.
exida just completed certification of a new sensor product that uses wireless communication to signal a safety logic solver of a potential problem. Shortly after the certificate was posted , a challenge arose: “How can wireless be used for safety?” Well, it is different. A designer must be fully aware…
There are three main components of the safety lifecycle : analysis, realization, and operation. We will be taking a look at the analysis phase, particularly related to the cyber industry. To start, the first thing to do in both safety and security is do a detailed process, hazard and risk…
IEC 61508 in the Safety Automation Equipment List
Proof testing is an important part of the management of safety instrumented functions. As an activity required by the functional safety standards, more and more end users are implementing proof tests, but there is often confusion on what should be included in the test and what coverage should be claimed. This webinar will look at techniques to determine what functionality to test as well as coverage. The webinar will also map failure modes from components, to devices, and to elements to illustrate how accurate proof test coverage values can be determined.
exida is very pleased to partner with Qingdao Moses in China , a high-tech enterprise that specializes in providing products and service of industrial automation process control system integration, DCS maintenance and operation, industry network information security protection as well as industrial data acquisition and transmission. Qingdao Moses in China…
Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…
Sometimes it seems that things change slowly in the world of functional safety. If you look at many of the technical references in IEC 61508 you will find that most come from the 1980s and 1990s. There is even one reference that dates back to 1950! With the rate technology…
The adoption of standards on alarm management (ISA-18.2 and IEC 62682) have introduced a new term into the lexicon of automation professionals - the “master alarm database,” which is defined as the “authorized list of rationalized alarms and associated attributes.” In this webinar we will talk about what a master alarm database (MADB) is, how one is created, what information it should/could contain, how it can be used to create alarm response procedures, and how it can be integrated into a management of change process. We will also look at how it can be used to document the results of alarm rationalization (e.g., alarm priority, classification, limit, cause, consequence, and corrective action) and other useful design data (e.g., safe operating limits, associated interlocks, maximum design temperatures/pressures). Additionally the webinar will examine how the MADB can be used as the source for updating the control system with the optimized alarm settings resulting from rationalization.
IEC 61508 in the Safety Automation Equipment List
Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…
Over the course of several blogs , I will talk about getting realistic failure rate data, where this failure data comes from, and how different methods of failure data analysis compare. I think if you understand this, you will begin to get a very good feel of what it takes…
Performing a SIL Verification calculation on preliminary design information can be a very useful tool to dial in the Safety Instrumented Function (SIF), Safety Requirements Specification (SRS) content , and define critical elements for the field component purchase specifications. Conceptual verification is typically performed quickly with general design information. The…
IEC 61508 in the Safety Automation Equipment List