In a blog , posted today on the ISA Interchange , Iwan van Beurden and William M. Goble describe how the two fundamental concepts of the ANSI/ISA S84.01-1996 , the Safety Lifecycle and Probabilistic Performance Metrics, have shaped the functional safety landscape. “These two fundamental concepts are to this day…
ISASecure in the Security Automation Equipment List
API 581 in the Safety Automation Equipment List
This webinar will teach you some simple and easy to implement diagnostics you can specify today to enhance your designs and increase the risk reduction.
This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in…
Modern control systems make it easy (maybe too easy) to add alarms without significant effort, cost, or consideration for whether they are truly needed. This has led to alarm systems that often hinder, rather than help, operators by subjecting them to nuisance alarms, alarm floods, incorrectly prioritized alarms, and general alarm overload. Alarm rationalization, a proven alarm management technique and one of the stages of the ISA-18.2 / IEC 62682 alarm management lifecycle, can help address these issues and create an optimal, effective alarm system.
The presentation will touch on best practices for rationalization as well as the most common pitfalls. It will also demonstrate how effective alarm rationalization can lead to reduced downtime, reduced operational risk (insurance premiums), and reduced cost of operations, while improving operational discipline and operator effectiveness.
ISASecure in the Security Automation Equipment List
ISASecure in the Security Automation Equipment List
When thinking about SIS requirements, most people tend to focus on the physical hardware and connectivity. However, the application program requires, equally the same care and attention. This webinar highlights some of the key requirements for the application program, as well as some of the Dos and Don’ts when it comes to approach, structure and type of languages used. The use of design guidelines, checklists and procedures can help with ensuring that the application program is written efficiently, is easily tested and maintained.
This webinar will review the key differences between the various risk assessment techniques and focus on the advantages of quantitative risk assessment, how to apply to your designs and check your designs achieve sufficient margin.
This webinar will take a look at some of the key issues around robotics functional safety, cyber security, product liability and certification of your robotics and automation projects. We’ll examine key hazards you need to consider and strategies to mitigate them.
The March / April 2020 issue of Intech contains an excellent article by Nick Sands and Donald Dunn, the co-chairs for the ISA-18 committee. The article reviews some of the most frequently asked questions on alarm management: What is alarm management? Which alarm management standard do I follow: ISA-18.2, IEC…
IEC 62443-4-1, ISASecure SDLA in the Security Automation Equipment List
Working from home and keeping a safe distance are the norms in this surreal period of time. We often get requests from our clients about conducting remote workshops, like HAZOP, LOPA or alarm rationalization workshops. Today I would like to focus on alarm rationalization and sharing the challenges we face during remote workshops. In the end, I will make a few suggestions about the keys to organizing a successful remote workshop.
IEC 62443 in the Security Automation Equipment List
The latest 2020 4th Quarter release of the exida Safety Equipment Reliability Handbook (SERH) Database, which is embedded in the exida exSILentia® Integrated Safety Lifecycle tool, incorporates several equipment items typically found in the mining industry including Position Encoders and MCCs/VFDs with Safe Torque Off. “As part of the continuous…
Join our next webinar 'The Virtual Start-Up' on Thursday the 3rd December to hear Derek, William Corcoran, Chris O'Brien and Peter Culbert discussing exida's launch in the Midwest Ireland in the middle of the pandemic, the overall experience, support structures and benefits for a US Based company to set up…
The exida exSILentia® team is pleased to announce the all new SILalarm module in the latest exSILentia® 4.10 release. The latest release incorporates the exida SILalarm™ tool functionality as a module within exSILentia®. Users can now access a single tool to perform their process safety and functional safety lifecycle tasks…
When performing Safety Integrity Level (SIL) Verification in exSILentia, each Safety Instrumented Function (SIF) should be clearly defined by its name, description, and tag. Also, each sensor group, logic solver group and final element group will need to be defined. This can become an inconvenience when a large number of SIFs are to be verified. It is my desire in this webinar to show a faster and more efficient way to load this type of data into exSILentia using its import feature.
It’s interesting that the majority of the time when people talk about functional safety , they are usually thinking about hardware: what sensors to use, which logic solver, what actuator, solenoid or valve to select; what voting architecture, etc. What often gets overlooked, initially, is the application program. Essentially, when…