The Control article "Six Sigma Alarm Management" highlights an end user's experience applying Six Sigma practices to their alarm management effort. This white paper by TiPS explores why Six Sigma is such a good companion for an alarm management program and outlines various ways Six Sigma can be incorporated into the alarm management workflow.
This paper describes an end-user project at Arla Foods with the use of the B2MML schemas as a corporate standard for communication between business systems and ES systems. This presentation presents the real-life experiences using the B2MML schemas. The focus is on the Schedule and Performance schemas. A short introduction on the general use of S88 and S95 within Arla Foods is also included.
Automating manufacturing using S88 concepts across all of the operational manufacturing boundaries has become the standard way of doing business. The current states of the technologies used in these automations require individuals with unique capabilities, or success is not always certain. Each operational area has its own unique needs, and not only requires a high minimum capability in that area, but the ability to coordinate across areas as well.
This paper will address what it takes to identify levels of capability, and the benefits of taking advantage of this capability. What to look for in evaluating an organizations capability in delivering automation will also be discussed, as well as the results of not knowing your automation suppliers real capabilities.
Power-over-Ethernet is fast becoming the best solution for powering industrial networks. This paper describes the benefits of using PoE for control applications on the factory floor, including utilization of an RPS, time and cost savings, ease of implementation, versatility of plant design, and safety advantages.
The National Institute of Standards and Technology (NIST) has established an Industrial Control System Security Project to improve the security of public and private sector Industrial Control Systems (ICSs).
Although multivariable control is now a wellestablished technology, new applications are still being found on which to apply it.In this paper, details will be presented on how Honeywells Profit Controller was found to be particularly applicable to the offshore production process.
The application of Model Predictive Control (MPC) is often considered for multi-variable continuous processes. However, the benefit of applying MPC to a batch process can often be just as significant as a continuous process. In this presentation we will show how MPC is being applied in a pharmaceutical manufacturing facility for the control of one cut of a batch distillation column. The primary benefit of using MPC is to reduce batch cycle time. The performance that can be achieve with MPC vs. traditional techniques for this application will be examined.
Human operators are a key part of any process control system. As such, they constitute part of a complex, causal chain of overall system processing. Human machine interfaces (HMIs) form a key link in that chain by bridging the physical world where processes reside with the perceptual reconstruction and representation of those processes in the heads of human operators and supervisors.
If an HMI design gives rise to a flawed or inaccurate representation of a process, then error and suboptimal task performance may result. HMIs have become increasingly important links in this chain for two reasons. First, the arrival of distributed control systems (DCS) in the 1970s distanced operators from the physical entities they controlled, requiring all interaction be mediated by HMIs. Second, the ongoing introduction of complex automation into process control is increasingly changing human operators into supervisors. Supervision has complex decision-making requirements that must all be conveyed via HMIs.
Download this entire white paper to learn more.
Dirk Beer, Harvey Smallman, Cindy Scott, Mark Nixon
This paper explores some of the Buncefield recommendations along with the applicable safety standards and translates those into tangible solutions that can be applied to prevent accidents such as the massive explosion at the Buncefield oil storage and transfer depot in Hemel Hempstead, United Kingdom.
The Control article "Six Sigma Alarm Management" highlights an end user's experience applying Six Sigma practices to his alarm management effort. This white paper by TiPS, explores why Six Sigma is such a good companion for an alarm management program and outlines various ways Six Sigma can be incorporated into the alarm management workflow.
This white paper explains why application whitelisting is being rapidly adopted as a security and control solution for SCADA systems. In three major sections, the paper: 1) Provides a detailed perspective on how application whitelisting technology works. 2) Discusses the use and benefits of whitelisting technologies in SCADA and Energy environments. 3) Explains how the technology is adapting to function in environments where controlled software changes are needed.
A recipe control of a continuous distillation plant was a challenge in its design, simulation, validation and successful exploitation. The plant was used for solvent recovery in an Active Pharmaceutical Ingredients Production Facility (API).
Following S88 models, which were used as tools in structuring a specific process cell, which had several trains with batch operating units, it was decided to apply and extend the same approach on the continuous processes as well.
Effective Feb. 2, 2010, the PHMSA rule: 49 CFR Parts 192, 195 Pipeline Safety: Control Room Management/Human Factors imposes control room management requirements for all regulated gas and hazardous liquid pipelines. This paper gives an overview of requirements and time line to comply. Learn more.
Continuous level measurement is about one thing, e.g. answering the question "how much stuff do I have". There are many applications where you need to know how much material is in a bin, silo or other vessel type. Usually the desired engineering unit is expressed in terms of volume or weight. "Measuring" volume or weight is not always the most practical approach, sometimes it isn't even viable. Take those silos you have, how do you weigh the ingredients if the silos weren't installed with load systems? Not an easy or inexpensive question to answer. So what do we do? This is where continuous level measurement sensors and systems come into play and offer a viable and cost effective approach.
The purpose of this white paper is to discuss and inform about the application considerations when you need to measure the level of material continuously or simply determine on a continuous basis how much stuff you have in your vessels.
The purpose of this paper is to trace the history of the development of process control, advanced process control and related applied engineering technologies, and to discuss the reasons why the industry has encountered difficulties. This paper also presents some recommendations to improve the likelihood of successful APC project implementation, and make some predictions about the future direction of the technology.
A number of previously unknown security vulnerabilities in the ICONICS GENESIS32 and GENESIS64 products have been publically disclosed. The release of these vulnerabilities included proof-of-concept (PoC) exploit code.
While we are currently unaware of any malware or cyber attacks taking advantage of these security issues, there is a risk that criminals or political groups may attempt to exploit them for either financial or ideological gain.
The products affected, namely GENESIS32 and GENESIS 64 are OPC Web-based human-machine interface (HMI) / Supervisory Control and Data Acquisition (SCADA) systems. They are widely used in critical control applications including oil and gas pipelines, military building management systems, airport terminal systems, and power generation plants.
Of concern to the SCADA and industrial control systems (ICS) community is the fact that, though these vulnerabilities may initially appear to be trivial, a more experienced attacker could exploit them to gain initial system access and then inject additional payloads and/or potentially malicious code. At a minimum, all these vulnerabilities can be used to forcefully crash system servers, causing a denial-of-service condition. What makes these vulnerabilities difficult to detect and prevent is that they expose the core communication application within the GENESIS platform used to manage and transmit messages between various clients and services.
This White Paper summarizes the current known facts about these vulnerabilities. It also provides guidance regarding a number of possible mitigations and compensating controls that operators of SCADA and ICS systems can take to protect critical operations.
What the 3S CoDeSys vulnerabilities are and what an attacker can do with them
How to find out what control/SCADA devices are affected
The risks and potential consequences to SCADA and control systems
The compensating controls that will help block known attack vectors
A number of security vulnerabilities in the CoDeSys Control Runtime System were disclosed in January 2012. In October 2012, fully functional attack tools were also released to the general public.
While CoDeSys is not widely known in the SCADA and ICS field, its product is embedded in many popular PLCs and industrial controllers. Many vendors are potentially vulnerable, and include devices used in all sectors of manufacturing and infrastructure. As a result, there is a risk that criminals or political groups may attempt to exploit them for either financial or ideological gain.
This White Paper summarizes the currently known facts about these vulnerabilities and associated attack tools. It also provides guidance regarding a number of mitigations and compensating controls that operators of SCADA and ICS systems can take to protect critical operations.