Threat Modeling (TM) is a process for identifying and prioritizing potential cybersecurity threats to software, hardware or a system. Contributing to the high value of TM is: The ability to identify threats early in the design process when they are less expensive to address Methodically prioritizing threats helps focus mitigation…
I have been asked this question many times by various clients over the years. This comes down to whether a perfect proof test is assumed or not. Let us remember that Mission Time is defined as the amount of time we expect a set of SIF equipment to run until a major overhaul is required, usually based upon the useful life of the devices. This time is set by the end user. Some companies are still not appreciating how greatly they will overstate the risk reduction of the Safety Instrumented Function (SIF) by assuming perfect proof testing since Mission Time then has no impact.
Therefore, what is perfect proof testing and what does this mean? We will discuss this among other things in this webinar.
IEC 61508 in the Safety Automation Equipment List
Has your FMEA entered the realm of the paperwork exercise that we force ourselves to do for no real reason than someone says we must do it? I have enjoyed analysis using FMEA. I first learned it existed when I was working for Ford. FMEA was the first Ford Technical…
IEC 61508 in the Safety Automation Equipment List
I have been asked this question many times by various clients over the years. This comes down to whether a perfect proof test is assumed or not. Let us remember that Mission Time is defined as the amount of time we expect a set of SIF equipment to run until…
A Design Failure Mode and Effect Analysis (DFMEA) for Functional Safety-Design Deviation and Mitigation Analysis (DDMA)
A variation of the DFMEA method has evolved from the application of Functional Safety requirements to the DFMEA process. exida calls this method DDMA – Design Deviation and Mitigation Analysis. DDMA maintains the essential objective of DFMEA to identify potential design issues early in the development and make design changes to add important mitigations. DDMA substitutes information from functional safety engineering process steps thereby replacing work in the DFMEA. When expert knowledge is added to DDMA by using the ARCHxTM tool from exida to support this process, exida calls the method Design Expert Deviation and Mitigation Analysis (DexDMATM).
This webinar describes an evolution of the DFMEA process where some traditional items are not required and replaced by new items derived from Functional Safety standards.
I find YouTube to be a good source of information on many subjects. Want to know how to fix a widget? There are probably a few videos on that exact subject. Technical subjects are also there. I was searching on “FMEA” and found an interesting looking video on the “…
exida's Cybersecurity Team Lead, Patrick O'Brien, will be particiapting in a panel titled Crowdstrike Event: What Lessons the OT Industry Can Learn From an IT Event at the ISA Automation Summit & Expo in Charleston, South Carolina, US 30 September – 3 October. Crowdstrike Event: What Lessons the OT Industry…
Hazards Australasia in conjunction with Chemeca are jointly hosting a process safety conference from 29 September to 1 October 2024, at Mantra on View at the Gold Coast. In process safety we must ensure we adequately assess and manage the change to avoid intolerable or unintended risk. This year marks…
The goal of performing a failure modes, effects, and diagnostics analysis (FMEDA) is to predict important reliability and safety metrics including failure rates for each failure mode, automatic diagnostic effectiveness, useful life, latent fault test effectiveness. This information is used for many purposes including identification of weak areas in a design, warranty cost prediction, etc. But perhaps most importantly, FMEDA results are used to calculate the safety integrity of equipment designed for Functional Safety applications. These safety integrity metrics are an essential part of functional safety certification.
As valuable as the FMEDA results are, many find that the engineering time needed to perform a quality FMEDA is excessive. How can we do better? There are several techniques that are used by top FMEDA professionals to not only reduce engineering hours but increase analysis quality. One of the most effective techniques is to organize the FMEDA input information into functional blocks, with functions and failure modes for each block documented. exida calls this the Functional Failure Mode FMEDA process.
IEC 61508, ISO 26262 in the Safety Automation Equipment List
IEC 61508, ISO 13849 in the Safety Automation Equipment List
IEC 62443 in the Security Automation Equipment List
exida Innovation LLC is pleased to announce the release of our enhanced software suite, OEMx 2.5 . OEMx is a set of software tools used in the development of electronic/programmable electronic and electro-mechanical products designed for optimal functional safety qualified automation systems. This release contains a set of enhancements for…
Different environmental factors will have an impact on failure rates of the electronic and mechanical components that are used to build device we use for automation and safety protection. To incorporate these impacts, exida provides a tool that can generate a custom Environmental Profile to be used in a Failure Modes, Effects, and Diagnostics Analysis (FMEDA). exida’s Component Reliability Database is embedded in the OEMxTM tool.
ISO 26262 in the Safety Automation Equipment List
It's back! exida is hosting another symposium on automotive safety October 23-25, 2024 at the Arabella Alpenhotel Spitzingsee in Germany. Come and join us to discuss the latest and innovative topics in the automotive industry. Let us discuss the newest developments for safe autonomous driving using artificial intelligence, the amazing…
in the Safety Automation Equipment List
When it comes to developing secure products, the IEC 62443 series of standards provide a lot of guidance and best practices which can be applied while developing the product. This is essentially an approach to designing security into the product rather than trying to add it on at the end.…